CyberCrime
    Computer-Related Crimes
                          Deana Green
                          Kaplan University


CJ-216: Computer, Technology, and Criminal Justice Information Systems
                        Professor Jeffrey Leh
                         September 21, 2011
What is a computer-related
                  crime?


It’s considered a computer-
related crime when one uses
the computer to commit more
traditional crimes (Foster, 2005)
such as fraud, solicitation, and
stalking.
Fraud
                                         …”deceit, trickery, sharp practice, or breach of confidence,
                                         perpetrated for profit or to gain some unfair or dishonest
                                         advantage” (“Fraud”, n.d.).




  Elements of the crime (“The Basis of
  Computer Fraud”, n.d.):
     Attacker gains access by use of malicious programs (spyware)
     Spyware monitors a user’s activity and collects personal information
     Information can be used to obtain credit accounts and medical benefits
     in the victim’s name
     Attacker may accomplish stealing someone’s identity, completely.




Computer fraud is oftentimes one of the most difficult computer crimes to investigate
because cyber criminals are able to hide behind a computer screen to do their misdeeds,
using sophisticated spyware software. It is even more challenging for the victim to find
justice once their information has been stolen and used.
Computer-Aided
                                                             Solicitation
                                  Scott Nicholas Martel faces up to 10 years
                                  in prison for child pornography and
                                  computer-aided solicitation of a minor
                                  (“Eunice Man, 2011).




      Elements of the crime:
      Offender creates an online identity and mingles with minors in
      chatrooms
      Swapping of pictures and videos with the minor
      Makes arrangements to meet with anticipation of engaging in sexual act
      with the minor




According to the Louisiana Code (2009), when a person 17 years or older communicates,
by way of a computer, with a minor child at least 2 years younger with the intent to lure
the minor into sexual misconduct, is considered computer-aided solicitation of a minor.
Cyberstalking
             ”the use of the Internet, e-mail, or other electronic communications devices to stalk
                               another person” (“Cyberstalking”, 1999, para. 5).




  Elements of the crime:
Harassing or threatening behavior that an individual engages in repeatedly
Motivated by a desire to exert control over their victims
May begin when the victim attempts to break off the relationship
Can easily locate private information about a potential victim, sometimes for a
small fee
           Internet has a wealth of information available such as unlisted phone
            numbers, addresses, social security numbers
           May use bulletin boards or networking sites to attain harassing support
            from others on the victim

Law enforcement have many issues with trying to identify, locate, and arrest the cyber-
offenders because of the lack of direct contact between the cyberstalker and the
victim. The offender has the capability to present himself as someone else or even get
others to harass the victim on the offender’s behalf. There are also so many ways to
be completely anonymous in harassing the victim, which poses a greater challenge for
law enforcement (“Cyberstalking”, 1999).
Hacking
          The intentional access of a computer to obtain unauthorized information to modify or
                                  cause damage to others’ data or files.




 Elements of the crime:

Unauthorized access to steal or damage information
Sometimes motivated by a desire to access bank accounts or business files
May begin with an intense knowledge of computers and software piracy
Hacking can lead to other crimes such as identity theft and programming attacks


                                                                              1983 movie, “War Games”, a young man
                                                                              almost starts World War III by accidentally
                                                                              hacking into a government system.




  The difficulty in tracking down a hacker is the fact that he has the ability to be on
  “stealth” mode. There is software available for the hacker to use in order to remain
  anonymous. Usually, by the time he’s caught, the damage is already done.
References

1. Cyberstalking:
A
new
challenge
for
law
enforcement
and
Industry.
(1999).

Retrieved
September
24,
2011,
from
Justice.gov
website:
http://www.justice.gov/
criminal/cybercrime/cyberstalking.htm


2. fraud.
(n.d.).
Dictionary.com
Unabridged.
Retrieved
September
27,
2011,
from

Dictionary.com
website:
http://dictionary.reference.com/browse/fraud

3.

What
is
computer
fraud.
(n.d.).
Spam
Laws.com.
Retrieved
September
23,
2011,

from
Spam
Laws
website:
http://www.spamlaws.com/computer-fraud.html

Greendeana unit 8 project cj216 copy

  • 1.
    CyberCrime Computer-Related Crimes Deana Green Kaplan University CJ-216: Computer, Technology, and Criminal Justice Information Systems Professor Jeffrey Leh September 21, 2011
  • 2.
    What is acomputer-related crime? It’s considered a computer- related crime when one uses the computer to commit more traditional crimes (Foster, 2005) such as fraud, solicitation, and stalking.
  • 3.
    Fraud …”deceit, trickery, sharp practice, or breach of confidence, perpetrated for profit or to gain some unfair or dishonest advantage” (“Fraud”, n.d.). Elements of the crime (“The Basis of Computer Fraud”, n.d.): Attacker gains access by use of malicious programs (spyware) Spyware monitors a user’s activity and collects personal information Information can be used to obtain credit accounts and medical benefits in the victim’s name Attacker may accomplish stealing someone’s identity, completely. Computer fraud is oftentimes one of the most difficult computer crimes to investigate because cyber criminals are able to hide behind a computer screen to do their misdeeds, using sophisticated spyware software. It is even more challenging for the victim to find justice once their information has been stolen and used.
  • 4.
    Computer-Aided Solicitation Scott Nicholas Martel faces up to 10 years in prison for child pornography and computer-aided solicitation of a minor (“Eunice Man, 2011). Elements of the crime: Offender creates an online identity and mingles with minors in chatrooms Swapping of pictures and videos with the minor Makes arrangements to meet with anticipation of engaging in sexual act with the minor According to the Louisiana Code (2009), when a person 17 years or older communicates, by way of a computer, with a minor child at least 2 years younger with the intent to lure the minor into sexual misconduct, is considered computer-aided solicitation of a minor.
  • 5.
    Cyberstalking ”the use of the Internet, e-mail, or other electronic communications devices to stalk another person” (“Cyberstalking”, 1999, para. 5). Elements of the crime: Harassing or threatening behavior that an individual engages in repeatedly Motivated by a desire to exert control over their victims May begin when the victim attempts to break off the relationship Can easily locate private information about a potential victim, sometimes for a small fee  Internet has a wealth of information available such as unlisted phone numbers, addresses, social security numbers  May use bulletin boards or networking sites to attain harassing support from others on the victim Law enforcement have many issues with trying to identify, locate, and arrest the cyber- offenders because of the lack of direct contact between the cyberstalker and the victim. The offender has the capability to present himself as someone else or even get others to harass the victim on the offender’s behalf. There are also so many ways to be completely anonymous in harassing the victim, which poses a greater challenge for law enforcement (“Cyberstalking”, 1999).
  • 6.
    Hacking The intentional access of a computer to obtain unauthorized information to modify or cause damage to others’ data or files. Elements of the crime: Unauthorized access to steal or damage information Sometimes motivated by a desire to access bank accounts or business files May begin with an intense knowledge of computers and software piracy Hacking can lead to other crimes such as identity theft and programming attacks 1983 movie, “War Games”, a young man almost starts World War III by accidentally hacking into a government system. The difficulty in tracking down a hacker is the fact that he has the ability to be on “stealth” mode. There is software available for the hacker to use in order to remain anonymous. Usually, by the time he’s caught, the damage is already done.
  • 7.

Editor's Notes

  • #2 \n
  • #3 http://legal-dictionary.thefreedictionary.com/Computer+Crime\n
  • #4 http://dictionary.reference.com/browse/fraud?&qsrc=\nhttp://www.spamlaws.com/computer-fraud.html\n
  • #5 http://dictionary.reference.com/browse/fraud?&qsrc=\nhttp://www.spamlaws.com/computer-fraud.html\n
  • #6 http://www.cyberguards.com/CyberStalking.html\n
  • #7 http://www.cyberguards.com/CyberStalking.html\n
  • #8 \n