SlideShare a Scribd company logo
1 of 4
Download to read offline
Crime in the Internet Age
David A. Nachtigall
808 Travis St., 24th Floor,
Houston, TX 77002
(713) 229-0008
Criminals are notoriously crafty, using every tool and trick at their disposal to take
advantage of others. In the Internet age, criminals are quick to prey on users, triggering
a shift in unlawful activity from the streets to behind keyboards and screens.
A Digital Shift
According to the 2014 Internet Crime Report published by the Federal Bureau of
Investigation and conducted by the National White Collar Crime Center, the United States
is the world’s leading country in terms of cybercrime-related reports. The survey revealed
that of the 269,422 reported cases, 123,684 involved a monetary loss averaging at
$2,971 each.
“I think we’re going to be seeing more and more the true face of criminality that is now
on the Internet. Part of it may be the migration of criminality from showing up at your
door to going online,” says Halifax Regional Police Chief Jean-Michel Blais. Nova Scotia
authorities observed an increase in the number of internet crimes over the past few
years, but California, Florida, and Texas remain as the country’s most cybercrime-prone
states.
New Old Crimes
Blais says that the minority of cybercrimes in his state involve digitally-reliant activities
such as hacking or phishing, adding that most reports concern “old crimes” using the
Internet as a tool. “Fraud, harassment, resale of stolen goods, internet child exploitation
— old crimes have new digital weapons in the hands of the next generation of thugs.
Policing has to change to combat that,” he said.
The chief mentions how society is experiencing a change in demographics, citing elder
abuse as a common pitfall; where inexperienced boomers are falling victim to scams
perpetrated by a primarily millennial crowd. Blais, however, adds that anyone can fall
prey to cybercrime, especially for individuals on both ends of the spectrum—heavy
internet users and the inexperienced.
Blais mentions how law enforcement is shifting into the digital medium as well. He
mentions how international agencies are collaborating with local institutions to curb the
spread of Internet crime. Canada’s RCMP and the United States’ FBI are rolling out
aggressive programs to challenge cybercrime, but Blasi stresses the importance of
awareness of vigilant internet use in dealing with the digital shift in criminality. “I would
fully expect that landscape to continue to evolve in years to come,” he says.
RESOURCES:
https://dntriallaw.com
https://www.fbi.gov/about-us/investigate/cyber

More Related Content

What's hot

“The Powers That E - CIO”
“The Powers That E - CIO”“The Powers That E - CIO”
“The Powers That E - CIO”Jeff Kaplan
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaGannett
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian modelM S Siddiqui
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulationsWAQAR AHMED
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestXO Communications
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Hutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesHutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesKeri Strahler
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Reportnationalconsumersleague
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to InformationDavid Lewis
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
5555555555555555555555555555555555555555555555555555555555
55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
5555555555555555555555555555555555555555555555555555555555Clarksville Middle School
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastbattery-fast. com
 

What's hot (20)

“The Powers That E - CIO”
“The Powers That E - CIO”“The Powers That E - CIO”
“The Powers That E - CIO”
 
New digital tools for investigative journalism aaja
New digital tools for investigative journalism aajaNew digital tools for investigative journalism aaja
New digital tools for investigative journalism aaja
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian model
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulations
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
Level 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public InterestLevel 3 Global Crossing Merger Not in Public Interest
Level 3 Global Crossing Merger Not in Public Interest
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Hutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy FeesHutchinson News - Editorial Copy Fees
Hutchinson News - Editorial Copy Fees
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to Information
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
5555555555555555555555555555555555555555555555555555555555
55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555
5555555555555555555555555555555555555555555555555555555555
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfast
 
CYBER SAFETY PPT
 CYBER SAFETY PPT CYBER SAFETY PPT
CYBER SAFETY PPT
 
SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2
 

Viewers also liked

Hoodies or altar boys notes
Hoodies or altar boys notesHoodies or altar boys notes
Hoodies or altar boys notesCharis Creber
 
Hoodies or altar boys
Hoodies or altar boysHoodies or altar boys
Hoodies or altar boysCharis Creber
 
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boysjphibbert1979
 
Representation essay
Representation essayRepresentation essay
Representation essayJadeMelady
 
Gender & Crime Booklet
Gender & Crime BookletGender & Crime Booklet
Gender & Crime Bookletmattyp99
 
Gender (Crime & Deviance)
Gender (Crime & Deviance)Gender (Crime & Deviance)
Gender (Crime & Deviance)Beth Lee
 
Crime and deviance and the media
Crime and deviance and the mediaCrime and deviance and the media
Crime and deviance and the mediasmccormac7
 
7 Moral Panics: Mods and Rockers / Stan Cohen
7 Moral Panics: Mods and Rockers / Stan Cohen7 Moral Panics: Mods and Rockers / Stan Cohen
7 Moral Panics: Mods and Rockers / Stan Cohenmattyp99
 
Gender and crime
Gender and crimeGender and crime
Gender and crimesmccormac7
 

Viewers also liked (14)

Hoodies or altar boys notes
Hoodies or altar boys notesHoodies or altar boys notes
Hoodies or altar boys notes
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Hoodies or altar boys
Hoodies or altar boysHoodies or altar boys
Hoodies or altar boys
 
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys
'Hoodies or Altar Boys', Newspaper Representations of Teenage Boys
 
Representation essay
Representation essayRepresentation essay
Representation essay
 
Crime,media & criminology
Crime,media & criminologyCrime,media & criminology
Crime,media & criminology
 
Moral Panic Intro
Moral Panic IntroMoral Panic Intro
Moral Panic Intro
 
Gender & Crime Booklet
Gender & Crime BookletGender & Crime Booklet
Gender & Crime Booklet
 
Gender (Crime & Deviance)
Gender (Crime & Deviance)Gender (Crime & Deviance)
Gender (Crime & Deviance)
 
Feminism gender & crime
Feminism gender & crimeFeminism gender & crime
Feminism gender & crime
 
Crime and deviance and the media
Crime and deviance and the mediaCrime and deviance and the media
Crime and deviance and the media
 
7 Moral Panics: Mods and Rockers / Stan Cohen
7 Moral Panics: Mods and Rockers / Stan Cohen7 Moral Panics: Mods and Rockers / Stan Cohen
7 Moral Panics: Mods and Rockers / Stan Cohen
 
Moral Panic
Moral PanicMoral Panic
Moral Panic
 
Gender and crime
Gender and crimeGender and crime
Gender and crime
 

Similar to Crime in the Internet Age

cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...AJHSSR Journal
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Bigger Price
 

Similar to Crime in the Internet Age (20)

Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
Law enforcement agencies grappling with spike in multi-million-dollar cyber s...
 

Recently uploaded

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 

Recently uploaded (20)

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 

Crime in the Internet Age

  • 1. Crime in the Internet Age David A. Nachtigall 808 Travis St., 24th Floor, Houston, TX 77002 (713) 229-0008
  • 2. Criminals are notoriously crafty, using every tool and trick at their disposal to take advantage of others. In the Internet age, criminals are quick to prey on users, triggering a shift in unlawful activity from the streets to behind keyboards and screens. A Digital Shift According to the 2014 Internet Crime Report published by the Federal Bureau of Investigation and conducted by the National White Collar Crime Center, the United States is the world’s leading country in terms of cybercrime-related reports. The survey revealed that of the 269,422 reported cases, 123,684 involved a monetary loss averaging at $2,971 each. “I think we’re going to be seeing more and more the true face of criminality that is now on the Internet. Part of it may be the migration of criminality from showing up at your door to going online,” says Halifax Regional Police Chief Jean-Michel Blais. Nova Scotia authorities observed an increase in the number of internet crimes over the past few years, but California, Florida, and Texas remain as the country’s most cybercrime-prone states.
  • 3. New Old Crimes Blais says that the minority of cybercrimes in his state involve digitally-reliant activities such as hacking or phishing, adding that most reports concern “old crimes” using the Internet as a tool. “Fraud, harassment, resale of stolen goods, internet child exploitation — old crimes have new digital weapons in the hands of the next generation of thugs. Policing has to change to combat that,” he said. The chief mentions how society is experiencing a change in demographics, citing elder abuse as a common pitfall; where inexperienced boomers are falling victim to scams perpetrated by a primarily millennial crowd. Blais, however, adds that anyone can fall prey to cybercrime, especially for individuals on both ends of the spectrum—heavy internet users and the inexperienced. Blais mentions how law enforcement is shifting into the digital medium as well. He mentions how international agencies are collaborating with local institutions to curb the spread of Internet crime. Canada’s RCMP and the United States’ FBI are rolling out aggressive programs to challenge cybercrime, but Blasi stresses the importance of awareness of vigilant internet use in dealing with the digital shift in criminality. “I would fully expect that landscape to continue to evolve in years to come,” he says.