Cybercrime: Project Chanology

Only available on StudyMode
  • Topic: Attack, Denial-of-service attack, Attack!
  • Pages : 5 (1435 words )
  • Download(s) : 47
  • Published : December 9, 2011
Open Document
Text Preview
Cybercrime: Project Chanology
In today’s world, we witness acts of violence and terrorism. We have grown accustomed to hearing about it in the media and on occasion, even witnessed it with our very eyes. Aside from violence and overall negativity on the physical realm, nowadays we are also witnessing crimes that are committed via the use of technology. Individuals are using malicious means to spread their message across and bring about transparency via the organizations they choose to target. A Brief History

What exactly is cybercrime? We throw around the word quite a lot these days seeing as how crimes are permeating the digital world. The dictionary definition for the word ‘cybercrime’ constitutes the general idea that a crime is being committed via the use of technology. However, what kinds of crimes are committed via the use of technology and how exactly are doers of such crimes punished? Types of Cybercrimes

There is quite a comprehensive range of activities that can be considered as cybercrimes. Some crimes target computer networks and devices while others use a network or device as a gateway to commit further crimes. Crimes that target computer systems would include viruses, malware, Trojans, DoS attacks, etc. Crimes that use computer networks or devices to commit further crimes consist of but are not limited to identity theft, fraud, phishing, etc. Why are cybercrimes so prevalent?

The availability of easily accessible attack tools, rapid information sharing in the cyber-criminal community, and the availability of educated hackers, in essence, are the reasons why cybercrimes are so rampant in today’s world (Kshetri, 2009). Easily accessibly tools open many doors for attackers. While many tools are geared towards more experienced attackers, quite a few are available for amateur wannabe hackers. The availability of such tools makes it even more of a serious issue. Users of such tools, known as script kiddies, simply acquire the programs and proceed to launch attacks with little to no regard as to what the consequences will be. Hence, script kiddies are one of the most dangerous types of attackers. They are not aware of the damage that they cause and this in itself is one of the dangerous aspects of an attack led by a script kiddie. The second reason, the fact that cyber-criminals are such a tight knit community, shows their willingness to group together to strengthen their attacks and formulate effective plans for attacks. Last but not least, the availability of intelligent and educated hackers creates an enormous barrier between the attackers themselves and individuals looking to prosecute them. Attackers that have honed their skills and ones that have the eagerness to infiltrate massive networks are the ones that are almost always never caught. One might ask why this is the case and the fact of the matter is, the more skilled an attacker is, the better chances he has of hiding traces of his wrongdoings. As a result, it is even more difficult to track their crimes on a playing field that is already so uneven. To give a general picture, hundreds of thousands of cybercrime incidents are reported each year and perhaps a handful of criminals behind such crimes are prosecuted (Wall, 2008). Why are cybercriminals not caught?

There are a multitude of reasons why a cybercriminal is not caught. From an economic standpoint, law enforcement agencies are not always equipped with the resources to track such criminals. The level of sophistication of the attacks may be so great that the agency has no resources to mitigate or solve the issue. On a more sociopolitical level, many countries have weak cybercrime laws that prevent the prosecution of individuals committing such crimes (Kshetri, 2009). It is also quite difficult to pinpoint exactly where the attack originated, seeing as how the network of computers that are connected to the Internet at one moment is too great a number. Attackers may use tools that...
tracking img