SlideShare a Scribd company logo
1 of 7
Running Head: DIGITAL COMPUTER CRIME
1
Digital Computer Crimes
Name
Institution
Course
Date
DIGITAL COMPUTER CRIME 2
Computer Crimes
Globalization has made the use of computer to grow drastically over the years. More people
from different parts of the world are coming closer to one another through computers. The World
Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of
cyber crimes. Although law enforcement agencies have come up with security policies, the number
of crimes related to computer theft and hacking is still alarming. Organizations, as well as
individuals are losing sensitive information to these crimes thus calling for imperative security
measures. Amongst computer crimes, there are four major ones that have become prevalent.
1. Hacking
Thus is a form of computer crime whereby a person’s PC or an organization’s main server is
broken into and sensitive information regarding these entities accessed without their permission
(Casey, 2011). Countries have taken measures to ensure that hacking is dealt with by classifying it
as a felony with heavy jail term punishment. The process requires the use of sophisticated softwares
to access computers from an unknown location.
2. Theft
This is the violation of copyrights regarding music, movies, softwares and games and persons
downloading such information without approval from recognized legal bodies. Also, peer sharing
sites that encourage piracy are also considered to be included as committing theft. Hence, theft is
mainly related to illegal downloading of softwares or other sensitive information without paying for
it.
3. Identity Theft
DIGITAL COMPUTER CRIME 3
This cyber crime is when a person accesses sensitive data information about another person’s
debit cards account, social security numbers and even bank accounts. They usually use this
information to buy online items and siphon money from the victims’ accounts. The victim could
even end up losing their credit history thus causing more problems.
4. Cyber Stalking
When a person is the subject of numerous online messaging streams and emails as well as
constant harassment texts through social media, they are being stalked through the internet. The
crime usually makes a person uncomfortable and unable to contact their friends through these
online social media sites.
Digital Crimes
Unlike computer crimes which are related to the computer and mainly affect its function or
information stored on the computer, digital crime is different. It usually revolves around every
hardware or software that is linked to the internet thus making the crime electronic in nature. There
are many forms of digital crimes ranging from spoofing to extortion. Sport betting is one form of
digital crime where people engage in business of betting on sports events over the internet. Since
the betting is regulated through software generating codes to increase credibility, the softwares
could be hacked and manipulated to favor one individual to win the bet.
Spoofing is when a person accesses another person’s computer without permission and
sending multiple emails to deceive recipients. The crime could be motivated by commercial gain or
blackmail and thus carries a heavy jail term punishment as well. Extortion as well is another digital
crime that is prevalent at this present time. A person can use the internet to threaten others either for
commercial gain or other valuable things (Jaishankar, 2011). For example, hackers can access
DIGITAL COMPUTER CRIME 4
sensitive private information from an organization and use it to extort the organization for a thing of
value or money, or else they make the information public.
Hacking and its Threats
Hacking poses an overall threat to the safety of a nation and almost every domain that the
nation is made of. It affects families, businesses, organizations, institutions, government
departments and even healthcare institutions as long as computers and other digital devices are
applied in these areas. To make matters worse, hacking encourages the increase of terrorism across
the globe. Research across all security areas show that the buying and selling of sensitive data
information that has been hacked is increasingly growing.
Through hacking of businesses such as banks, terrorism, and other social ills are able to
expand their agenda to the global scale. Online banking fraud which is as a result of hacking has
been found to £33m per year in the UK alone. This shows that hacking poses a threat that extends
from mere computer safety to a nationwide disaster. Hacking hence not only affects businesses but
acts as a pathway for committing other crimes.
Roles and Response of the U.S Government and Court System
The Federal Bureau of Investigations (FBI) which is a law enforcement agency of the
government is the major agency that deals with the investigation and prosecution of computer
crimes (Brenner, 2010). The department of Justice, which is closely linked to the U.S court system,
works in conjunction with the FBI to counter cyber crimes.
Also, through the legal system, there are a number of Acts that have been put in place to
counter such crimes. The Computer Fraud and Abuse Act, for example, which is the broadest
statute in the U.S tries to define multiple related cyber crimes such as espionage, computer
DIGITAL COMPUTER CRIME 5
trespassing, and hacking of government information among others. This Act also stipulates the
consequence as well as punishment that one is liable to when found guilty of these charges.
National agencies such as the FBI can work closely with international private organizations
such as Internet Service Providers (ISPs) to become more effective when dealing with cyber crimes.
Since the internet has increased globalization, the FBI should focus more on working with
international private agencies to gather information concerning hacking groups and their threat
potential.
DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.
DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.

More Related Content

What's hot

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 

What's hot (20)

Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
computer crime
computer crimecomputer crime
computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 

Viewers also liked (12)

Mohicans
MohicansMohicans
Mohicans
 
Futur simple
Futur simpleFutur simple
Futur simple
 
Eia bosconia, daju
Eia bosconia, dajuEia bosconia, daju
Eia bosconia, daju
 
Healthcare
HealthcareHealthcare
Healthcare
 
Tarea7.sistemas
Tarea7.sistemasTarea7.sistemas
Tarea7.sistemas
 
Louisiana purchase
Louisiana purchaseLouisiana purchase
Louisiana purchase
 
Las Torres de Hanoi
Las Torres de HanoiLas Torres de Hanoi
Las Torres de Hanoi
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Passé compossé
Passé composséPassé compossé
Passé compossé
 
Energia y sustentabilidad
Energia y sustentabilidadEnergia y sustentabilidad
Energia y sustentabilidad
 
Normas de convivencia en el salón de clases
Normas  de convivencia en el salón de clasesNormas  de convivencia en el salón de clases
Normas de convivencia en el salón de clases
 

Similar to Computer crimes

Similar to Computer crimes (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Computer crimes

  • 1. Running Head: DIGITAL COMPUTER CRIME 1 Digital Computer Crimes Name Institution Course Date
  • 2. DIGITAL COMPUTER CRIME 2 Computer Crimes Globalization has made the use of computer to grow drastically over the years. More people from different parts of the world are coming closer to one another through computers. The World Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of cyber crimes. Although law enforcement agencies have come up with security policies, the number of crimes related to computer theft and hacking is still alarming. Organizations, as well as individuals are losing sensitive information to these crimes thus calling for imperative security measures. Amongst computer crimes, there are four major ones that have become prevalent. 1. Hacking Thus is a form of computer crime whereby a person’s PC or an organization’s main server is broken into and sensitive information regarding these entities accessed without their permission (Casey, 2011). Countries have taken measures to ensure that hacking is dealt with by classifying it as a felony with heavy jail term punishment. The process requires the use of sophisticated softwares to access computers from an unknown location. 2. Theft This is the violation of copyrights regarding music, movies, softwares and games and persons downloading such information without approval from recognized legal bodies. Also, peer sharing sites that encourage piracy are also considered to be included as committing theft. Hence, theft is mainly related to illegal downloading of softwares or other sensitive information without paying for it. 3. Identity Theft
  • 3. DIGITAL COMPUTER CRIME 3 This cyber crime is when a person accesses sensitive data information about another person’s debit cards account, social security numbers and even bank accounts. They usually use this information to buy online items and siphon money from the victims’ accounts. The victim could even end up losing their credit history thus causing more problems. 4. Cyber Stalking When a person is the subject of numerous online messaging streams and emails as well as constant harassment texts through social media, they are being stalked through the internet. The crime usually makes a person uncomfortable and unable to contact their friends through these online social media sites. Digital Crimes Unlike computer crimes which are related to the computer and mainly affect its function or information stored on the computer, digital crime is different. It usually revolves around every hardware or software that is linked to the internet thus making the crime electronic in nature. There are many forms of digital crimes ranging from spoofing to extortion. Sport betting is one form of digital crime where people engage in business of betting on sports events over the internet. Since the betting is regulated through software generating codes to increase credibility, the softwares could be hacked and manipulated to favor one individual to win the bet. Spoofing is when a person accesses another person’s computer without permission and sending multiple emails to deceive recipients. The crime could be motivated by commercial gain or blackmail and thus carries a heavy jail term punishment as well. Extortion as well is another digital crime that is prevalent at this present time. A person can use the internet to threaten others either for commercial gain or other valuable things (Jaishankar, 2011). For example, hackers can access
  • 4. DIGITAL COMPUTER CRIME 4 sensitive private information from an organization and use it to extort the organization for a thing of value or money, or else they make the information public. Hacking and its Threats Hacking poses an overall threat to the safety of a nation and almost every domain that the nation is made of. It affects families, businesses, organizations, institutions, government departments and even healthcare institutions as long as computers and other digital devices are applied in these areas. To make matters worse, hacking encourages the increase of terrorism across the globe. Research across all security areas show that the buying and selling of sensitive data information that has been hacked is increasingly growing. Through hacking of businesses such as banks, terrorism, and other social ills are able to expand their agenda to the global scale. Online banking fraud which is as a result of hacking has been found to £33m per year in the UK alone. This shows that hacking poses a threat that extends from mere computer safety to a nationwide disaster. Hacking hence not only affects businesses but acts as a pathway for committing other crimes. Roles and Response of the U.S Government and Court System The Federal Bureau of Investigations (FBI) which is a law enforcement agency of the government is the major agency that deals with the investigation and prosecution of computer crimes (Brenner, 2010). The department of Justice, which is closely linked to the U.S court system, works in conjunction with the FBI to counter cyber crimes. Also, through the legal system, there are a number of Acts that have been put in place to counter such crimes. The Computer Fraud and Abuse Act, for example, which is the broadest statute in the U.S tries to define multiple related cyber crimes such as espionage, computer
  • 5. DIGITAL COMPUTER CRIME 5 trespassing, and hacking of government information among others. This Act also stipulates the consequence as well as punishment that one is liable to when found guilty of these charges. National agencies such as the FBI can work closely with international private organizations such as Internet Service Providers (ISPs) to become more effective when dealing with cyber crimes. Since the internet has increased globalization, the FBI should focus more on working with international private agencies to gather information concerning hacking groups and their threat potential.
  • 6. DIGITAL COMPUTER CRIME 6 References Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the Internet (3rd ed.). Waltham, MA: Academic Press. Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca Raton, FL: CRC Press. Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.
  • 7. DIGITAL COMPUTER CRIME 6 References Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the Internet (3rd ed.). Waltham, MA: Academic Press. Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca Raton, FL: CRC Press. Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.