Cyber Crimes

Only available on StudyMode
  • Topic: Malware, Fraud, Online predator
  • Pages : 11 (3795 words )
  • Download(s) : 67
  • Published : March 12, 2013
Open Document
Text Preview
he Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted. Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime.

What is cyber crime
| |Parents, teachers, non-profits, government, and industry have been working hard to protect kids online. However, | | |we also need to think about protecting the Internet from kids who might abuse it. | | |The Department of Justice categorizes computer crime in three ways: | | |The computer as a target - attacking the computers of others (spreading viruses is an example). | | |The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such| | |as fraud or illegal gambling). | | |The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen | | |information. | | |Reports of alleged computer crime have been a hot news item of late. Especially alarming is the realization that | | |many of the masterminds behind these criminal acts are mere kids. In fact, children no longer need to be highly | | |skilled in order to execute cyber crimes. "Hacker tools" are easily available on the Net and, once downloaded, | | |can be used by even novice computer users. This greatly expands the population of possible wrongdoers. Children | | |(and in some cases - their parents) often think that shutting down or defacing Web sites or releasing network | | |viruses are amusing pranks. Kids might not even realize that what they are doing is illegal. Still other kids | | |might find themselves hanging out online with skilled hackers who share hacking tools with them and encourage | | |them to do inappropriate things online. Unfortunately, some of these kids don't realize that they are committing | | |crimes until it is too late. Even more distressing and difficult to combat is the fact that some in the media | | |portray the computer criminal as a modern day Robin Hood. Nothing could be further from the truth. | | |So what are cyber crimes? Can the law enforcement authorities find criminals online? How can you create context | | |for your children to understand what cyber crimes are? The following information (and areas throughout the site) | | |will help familiarize you with unethical and illegal online behavior. Additionally, to learn...
tracking img