CYBER CRIME LAW
Computer crime, or cyber crime, as it is more commonly called, refers to criminal activity that is carried out with the use of a computer and often the Internet. According to Symantec.com, there were over 1,600,000 reported or recorded cyber crime threats in the year 2008 alone, over a million more than the 2007 statistic. Educating yourself on the dangers of computer crime and how to avoid it just may save you from much grief and suffering. Cyber crime is an international issue, depriving online users of billions of dollars a year. Whether using traditional techniques, employing malicious software, using the Internet as a platform for illicit sexual activity or attempting to subvert governments, cyber criminals seek to conduct their crimes in total anonymity. Computer crime refers to any crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through theInternational Criminal Court.
* Well-trained fingers are no longer simply used to pick pockets or steal merchandise, but can also be used to execute scams by pressing buttons on a keyboard or clicking buttons on a mouse. Traditional pyramid schemes have induced greedy investors to become victims of online fraud. Internet auction fraud has also accounted for significant losses for online buyers who suffer non-delivery of merchandise as well as misuse of credit-card information. Schemes that were once practiced via snail mail are now practiced via email, such as the classic Nigerian letter scam or chain-letter scams. Malicious Software
* Designed to compromise the integrity of a computer system, malware attacks are used to deny users access to information while supplying essential information to perpetrators of such attacks. Users may be denied access to vital accounts, or they may unknowingly serve as zombies to subvert the systems of fellow users. Malware attacks may also be used by hackers who seek to gain access to sensitive information such as Social Security identification numbers or bank account numbers. * Networks of sexual predators engage in the transmission of sexually explicit images and information. Predators may indicate a willingness to travel, or state an eagerness to engage in sex with a minor. Sexual predators are sometimes known to frequent chat rooms, to engage in chats that seek to gain the confidence of fellow users while gradually exhibiting an exceedingly lewd tone. Individuals who routinely transmit child pornography over the Internet are likely to become subjects of FBI investigations. Political Agenda
* Cyber crime is sometimes used to undermine the effectiveness of a nation's government. President Obama has appointed a "cyber tsar" to promote Interneet security....
Please join StudyMode to read the full document