Victims of Internet Scams
Victims of Internet Scams
Internet scams have been on the rise in the current times due to the advancement in technology which exposes more victims to the perpetrators of these crimes. There are many diverse forms on internet scams which range from emails to social media scams (Ashworth & Horder, 2013). These crimes rely on the use of the internet Most of these crimes are aimed at stealing money or confidential information from the victims using different methods to take advantage of the online users. The various methods of used by the perpetrators include E-Mail compromise, Data Breach, Malicious software, and spoofing (Ashworth & Horder, 2013).
Types Of Computer Crimes and Provides Examples of Current Cases Involving That Type of Crime
Computer crimes are categorized into three categories, which include using the computer as a target, using the computer as the instrument to commit the crime, and incidentals crimes (Ashworth & Horder, 2013). Using the computer as a target involves altering the data to the system or network, which can prevent the user of the computer in accessing certain services. Perpetrators of these crimes focus on the computer as the target negatively impacting the reputation of an organization or an individual (Ashworth & Horder, 2013). For a business organization, this can prevent the organization from availing their products or services to the public or clients accessing the organization’s products. Most of these crimes involve high profile organizations or individuals and may include copyright infringement and hacking (Ashworth ; Horder, 2013).
This involves accessing privacy and confidential information, which may lead to problems if exposed to the public (Ashworth ; Horder, 2013). This is because organizations and individuals store their private information on these computers, which may be done by unleashing a virus into the computer through an email (Ashworth ; Horder, 2013). In 2014, Sony Pictures a major entertainment company was hit with a virus, which led to a lot of sensitive information being stolen from the company (Elson, 2017). There were claims that North Korea was behind the plot due to a film, which the company had planned to release. The second computer crime involves using the computer as the instrument to commit the crime, which may include sending instructions to the computer to override the security measures installed (Taylor, Fritsch, ; Liederbach, 2015).
The attacker may use a malicious program to damage the computer or steal information from the user of the computer. An attacker may also mislead a user using a fake account or an organization to take advantage of a user who may not be aware of the fraud (Taylor, Fritsch, ; Liederbach, 2015). This involves manipulating the computer process to gain access to the computer system. A perpetrator may also use impersonation where he/she poses as a customer requiring attention whereby he/she takes advantage of the employees of an organization to divulge information, which may grant the perpetrator access to the computer system (Taylor, Fritsch, ; Liederbach, 2015). In 2015, Russian hackers stole £650 million from banks globally where the perpetrators used impersonation where they posed as online banking staff where they were able to authorize fraudulent cash transfers (Elson, 2017).
The third type of computer crime is incidentals crimes where the computer is not necessary used or connected to the network but the presence of the computer makes the crime to happen easily and also enable the perpetrator to have access to sensitive information (Taylor, Fritsch, ; Liederbach, 2015). This may include fraudulent bank transactions and interfering with stored in formation in computers. These crimes enable the perpetrator to give false information to the victim through manipulation of accurate data, which may result in a transaction based on false information (Taylor, Fritsch, ; Liederbach, 2015). An example of this type of computer crime is the JP and Morgan Chase hacking conglomerate in 2015 where three men used fake documents to facilitate cash transactions for criminals and money laundering using different global companies which was an illegal activity (Elson, 2017).
Computer Crime Laws And Enforcement Agencies That Are In Charge Of Addressing Internet Scams And Other Computer Crimes
Most countries have enacted laws to protect the public from computer crimes. In the United States for example, there is the Computer Fraud and Abuse Act (CFAA), which was enacted in 1986 (Hill ; Marion, 2016). This law prohibits the access of computers without the proper authorization and provides punishments to perpetrators of computer crimes (Hill ; Marion, 2016). The Act has been amended over time to address the diverse methods of computer crimes across the United States. Criminal activities under this act include accessing a computer without the proper authorization or going beyond the authorized level (Hill ; Marion, 2016).
Intention to defraud or access a protected computer without the approved access and transmitting information or code of a protected computer without proper authorization is also a criminal activity under this Act (Kerr, 2018). One of the agencies tasked with addressing computer crimes is the Federal Bureau of Investigation (FBI), which is responsible for investigating cyber crimes both locally and internationally (Kerr, 2018). Due to the growing aspect of the crime, computer crimes are becoming more dangerous and sophisticated which is why computer crime laws have been implemented to protect users of computers (Kerr, 2018).
Technology has also advanced over the last couple of years resulting in a large number of individuals engaging in online activities, which increases the risk of being taken advantage of by the perpetrators of these acts (Hill ; Marion, 2016). It is also important to protect organizations, which rely on online business as a way of reaching their customers. Interpol is also involved in the fighting against cyber crimes where the agency has collaborated with other agencies in the United States as well as across the world to fight this crime (Hill ; Marion, 2016). These include the FBI, National Cyber Crime Unit, and the government of the United States, which provides important resources to the agency, which are helpful in addressing computer crimes (Hill ; Marion, 2016).
Ashworth, A., ; Horder, J. (2013). Principles of criminal law. Oxford, United Kingdom: Oxford University Press.
Elson, D. (2017). The Sun. Attack of the Hack. Five of the worst cases of cyber crime the world has ever seen – from data theft of one BILLION Yahoo users to crippling the NHS. Retrieved from https://www.thesun.co.uk/tech/4120942/five-of-the-worst-cases-of-cyber-crime-the-world-has-ever-seen-from-data-theft-of-one-billion-yahoo-users-to-crippling-the-nhs/
Hill, J. B., ; Marion, N. E. (2016). Introduction to cybercrime: Computer crimes, laws, and policing in the 21st century. Santa Barbara, CA: Praeger.
Kerr, O. S. (2018). Computer crime law. St. Paul, MN: West Academic Publishing.
Taylor, R. W., Fritsch, E. J., ; Liederbach, J. (2015). Digital crime and digital terrorism. Boston: Pearson.