Globalization has made the use of computer to grow drastically over the years. More people from different parts of the world are coming closer to one another through computers. The World Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of cyber crimes. Although law enforcement agencies have come up with security policies, the number of crimes related to computer theft and hacking is still alarming
Presiding Officer Training module 2024 lok sabha elections
Computer crimes
1. Running Head: DIGITAL COMPUTER CRIME
1
Digital Computer Crimes
Name
Institution
Course
Date
2. DIGITAL COMPUTER CRIME 2
Computer Crimes
Globalization has made the use of computer to grow drastically over the years. More people
from different parts of the world are coming closer to one another through computers. The World
Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of
cyber crimes. Although law enforcement agencies have come up with security policies, the number
of crimes related to computer theft and hacking is still alarming. Organizations, as well as
individuals are losing sensitive information to these crimes thus calling for imperative security
measures. Amongst computer crimes, there are four major ones that have become prevalent.
1. Hacking
Thus is a form of computer crime whereby a person’s PC or an organization’s main server is
broken into and sensitive information regarding these entities accessed without their permission
(Casey, 2011). Countries have taken measures to ensure that hacking is dealt with by classifying it
as a felony with heavy jail term punishment. The process requires the use of sophisticated softwares
to access computers from an unknown location.
2. Theft
This is the violation of copyrights regarding music, movies, softwares and games and persons
downloading such information without approval from recognized legal bodies. Also, peer sharing
sites that encourage piracy are also considered to be included as committing theft. Hence, theft is
mainly related to illegal downloading of softwares or other sensitive information without paying for
it.
3. Identity Theft
3. DIGITAL COMPUTER CRIME 3
This cyber crime is when a person accesses sensitive data information about another person’s
debit cards account, social security numbers and even bank accounts. They usually use this
information to buy online items and siphon money from the victims’ accounts. The victim could
even end up losing their credit history thus causing more problems.
4. Cyber Stalking
When a person is the subject of numerous online messaging streams and emails as well as
constant harassment texts through social media, they are being stalked through the internet. The
crime usually makes a person uncomfortable and unable to contact their friends through these
online social media sites.
Digital Crimes
Unlike computer crimes which are related to the computer and mainly affect its function or
information stored on the computer, digital crime is different. It usually revolves around every
hardware or software that is linked to the internet thus making the crime electronic in nature. There
are many forms of digital crimes ranging from spoofing to extortion. Sport betting is one form of
digital crime where people engage in business of betting on sports events over the internet. Since
the betting is regulated through software generating codes to increase credibility, the softwares
could be hacked and manipulated to favor one individual to win the bet.
Spoofing is when a person accesses another person’s computer without permission and
sending multiple emails to deceive recipients. The crime could be motivated by commercial gain or
blackmail and thus carries a heavy jail term punishment as well. Extortion as well is another digital
crime that is prevalent at this present time. A person can use the internet to threaten others either for
commercial gain or other valuable things (Jaishankar, 2011). For example, hackers can access
4. DIGITAL COMPUTER CRIME 4
sensitive private information from an organization and use it to extort the organization for a thing of
value or money, or else they make the information public.
Hacking and its Threats
Hacking poses an overall threat to the safety of a nation and almost every domain that the
nation is made of. It affects families, businesses, organizations, institutions, government
departments and even healthcare institutions as long as computers and other digital devices are
applied in these areas. To make matters worse, hacking encourages the increase of terrorism across
the globe. Research across all security areas show that the buying and selling of sensitive data
information that has been hacked is increasingly growing.
Through hacking of businesses such as banks, terrorism, and other social ills are able to
expand their agenda to the global scale. Online banking fraud which is as a result of hacking has
been found to £33m per year in the UK alone. This shows that hacking poses a threat that extends
from mere computer safety to a nationwide disaster. Hacking hence not only affects businesses but
acts as a pathway for committing other crimes.
Roles and Response of the U.S Government and Court System
The Federal Bureau of Investigations (FBI) which is a law enforcement agency of the
government is the major agency that deals with the investigation and prosecution of computer
crimes (Brenner, 2010). The department of Justice, which is closely linked to the U.S court system,
works in conjunction with the FBI to counter cyber crimes.
Also, through the legal system, there are a number of Acts that have been put in place to
counter such crimes. The Computer Fraud and Abuse Act, for example, which is the broadest
statute in the U.S tries to define multiple related cyber crimes such as espionage, computer
5. DIGITAL COMPUTER CRIME 5
trespassing, and hacking of government information among others. This Act also stipulates the
consequence as well as punishment that one is liable to when found guilty of these charges.
National agencies such as the FBI can work closely with international private organizations
such as Internet Service Providers (ISPs) to become more effective when dealing with cyber crimes.
Since the internet has increased globalization, the FBI should focus more on working with
international private agencies to gather information concerning hacking groups and their threat
potential.
6. DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.
7. DIGITAL COMPUTER CRIME 6
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers and the
Internet (3rd ed.). Waltham, MA: Academic Press.
Jaishankar, K. (2011). Cyber criminology: Exploring Internet crimes and criminal behavior. Boca
Raton, FL: CRC Press.
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.: Praeger.