Wednesday, July 17, 2019
 Cybercrim in Society Essay
Cybercrime With everything in society advancing rapidly, it should be of no surprise that technology is this instant utilise to commit crimes a chance uponst new(prenominal) people. Those crimes include identity theft, stealing money, outlaw(prenominal) gambling, and cyberstalking. This paper will limited review cybercrime and the releases thither be from handed-down crime and it will review the purpose of ward-heelers. There will as well as be collar cases reviewed to help bring light to what mental of cybercrimes atomic number 18 being committed around the world.Differences between Cybercrime and Traditional CrimeFor an individual to fully actualise the residuum between cybercrime and traditional crime, the individual inescapably to understand what cybercrime is. The definition of cybercrime is according to Oxford Dictionaries (2014), crime conducted via the net profit or some other computer vane (cybercrime). Cybercrime is committed by nags with the goal of fi nancial gain in min by stealing individualised nurture(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are humankindy opposite categories for cybercrime yet the of import quatern include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are supercharged on a state law take however, there are plenty of federal laws that dirty dog be violated through committing cybercrime.The main difference that needs to be known is that when cybercrimes are committed, the crimes are done so from the luxury of a hackers ho use or place of concern while traditionally crimes are non. Another difference worth noting is that cybercrime criminals have the ability to commit these crimes from different states, even internationally at some levels. When cybercrimes are committed liken that, it makes it hard to prosecute as the laws may vary from place to place. That is usually when federal laws are reviewed for a prosecution to happen.Purposes of HackingHacking dates back to the 1950s. This is want before the birth of the internet. Hacking began as a method or searching for shortcuts when encountering a computer issue. concord to Marriam Webster (2014), A hacker is a person who in secret gets access to a computer system in order to get information, lawsuit damage (para. Hacker). at once hacking of oftenreferred to a person wanting to cause havoc in a computer or m some(prenominal) computer systems for a modestness. Hacking has evolved everyplace the familys. In the beginning, hacking was often used to prank, cause mischief and curiosity. Hacking immediately has grown very large and has been categorized into the types of hacking. Although hackers use different methods of accessing unauthorized information, the most common reason for doing such things is for financial gain. Kevin Mitnick vs the USAKevin Mitnick began hacking at an primal age of 12. As this age he began qualification punch cards for the Los Angeles transit authority. Mitnick also fall in a phone phreak gang which conducted many pranks. The multitude discovered a modal value to take over the resound directory assistance and prank incoming callers. The crowd also changed the status of family phones to payphone status. A home telephone drug user would attempt to use the telephone tho a recording would request the user to deposit twenty cents. The group accessed a San Francisco run aground company and destroyed files. More than a year later, this crime was unsolved. It was not until a members girlfriend went to the police. This led to the arrest of Kevin Mitnick, age 17, and other members of the group.Mitnicks streak of hacks has landed him in jail quadruplicate times throughout his hacking spree. At the age of 16, Mitnick accessed a computer manufacturing company and sold their software. He went on the run for several years by a ccessing companies via computers to become identity documents. He was not convicted of these crimes. He was finally arrested for hacking into Nokia and Motorola and convicted. This arrest landed him in jail for four and-a-half years before being brought to trial. Upon his release in 2000, he was restricted from using any communication theory technology which was more advanced than a wire home phone. Mitnick contested this ban and won. He now owns Mitnick Security Consulting LLC. The RBS World Pay serversWorldPay is a wages Card Industry that helps businesses in allowances processing. WorldPay headquarters is base in Atlanta, Georgia and have work outed globally in London, Belfast, Edinburgh, Gateshead, Sweden, Singapore, Montreal and a few other countries. WorldPay stipend processing service enabled businesses to accept payments from customers from differentpayment types such as, Visa, MasterCard, discover, American Express, debit and gift cards, checks, electronic benefits Transfer, and direct debit. The WorldPay hacking was considered the most sophisticated attack so far in history. In November 2008, According to Baker, Associated hole (2012) hackers infiltrated the RBS WorldPay servers and accessed prepaid payroll card numbers, cracked their encrypted signal flag codes, raised the balances on the cards and distributed dozens of them to a team of people around the world.Within a matter of hours, the same group of hackers hit 2,100 automatic teller machine terminals in 280 cities around the world from the U.S. to Russia.to Italy to Japan. FBI tracked galvanic pile the hackers by narrowing down their suspects to one man who worked for the company and his name is Oleg Covelin. After he found a vulnerability in the computer profits that RBS WorldPay uses, he passed the information to Sergei Tsurikov of Tallinn, Estoria who then distributed 44 contrive cards to a team of cashers around the world. The hackers act to cover their tracks but the FBI t raced the hackers by using Cyber forensics and also with the help of foreign authorities and international banks. Sergei Tsurikov, Viktor Pleshchuk of St. Petersburg, Russia, and Oleg, Covelin of Chisinau, Moldova and three others from Estonia were indicted in the case in 2009. Three of the main suspects were convicted in Estonia and the other suspects are awaiting sentence.In conclusion, although traditional crime is still around, cybercrime is slowly making its way into society and the advancement of technology is helping that happen. The besides difference between the two types of crimes is the way they are committed. Hackers will not let anything stop them from achieving the last goal of successfully hacking a system. With the cases listed and reviewed it is clearly say that hacking and cybercrimes can be committed by anyone for any certain reason. No one can be sure that their information is completely safe but it is better to take precaution by not putting so much personal information on the web than it would be to not fear and end up the victim of cybercrime. Hackers continue to expand their knowledge on the systems to hack so that should fight society to expand the security for the web.ReferencesBaker, M. (2010). Policeone. Retrieved fromhttp//www.policeone.com/federal-law-enforcement/articles/2187579-FBI-gets-suspect-in-massive-cyber-crime-case/ Busch, A. (n.d.). Why Do People Hack. Retrieved fromhttp//www.ehow.com/about_4673738_why-do-people-hack.htmlHacker. Merriam-Webster.com. Merriam-Webster, n.d. Web. 3 May 2014.http//www.merriam-webster.com/dictionary/hackerMeriwether, D. (1995). Takedown.Retrieved from http//www.takedown.com/bio/mitnick.htmlOrphanides, K. (2011). Top 10 Most Spectacular Hacks. Retrieved fromhttp//www.expertreviews.co.uk/ full general/1285633/top-10-most-spectacular-hacks/2 Oxford Dictionaries. (2014). Retrieved fromhttp//www.oxforddictionaries.com/us/definition/american_english/cybercrime
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.