3. Computer crime is a top concern of the legal
community.
And despite greater consumer awareness and
advanced countermeasures, cybercrime
continues to climb. Everyday, smarter criminals
find creative ways to program disruptive viruses,
steal intellectual property, commit identity theft,
access financial information, and shut down
corporate computer systems.
4. COMPUTER CRIME
Computer crime involves both hardware and software,
cybercrime in three ways.
1. Criminals target the computer. These crimes could include theft of data, viruses,
or hardware theft.
2. Computers act as weapons to commit crimes. Criminals use computers and
technology to commit many kinds of traditional crime.
3. Computers also act as legal accessories, storing incriminating information.
5. MOBILE CYBERCRIMES AFFECT 80 PERCENT OF MEN
BETWEEN THE AGES OF 18 AND 31.
ABOUT 14 ADULTS BECOME NEW CYBERCRIME VICTIMS
EVERY SECOND.
BRILLIANT COMPUTER SKILLS NO LONGER CHARACTERIZE
COMPUTER CRIMINALS. CRIMINALS AND CHILDREN CAN
DOWNLOAD HACKING TOOLS AND USE THEM EASILY.
6. IDENTIFYING TYPES OF COMPUTER
CRIME
Cybercrime refers to any crime involving computers, mobile devices
or Internet services. The FBI investigates computer crimes, which
often cross borders and therefore pose jurisdictional problems for law
enforcement officers. Crimes fall into two general categories:
1. crimes made possible by computer networks and crimes that target
computers directly.
2. Crimes that use networks include the following offenses.
7. • Phishing scams
• Malware and viruses
• Denial of service for malicious mischief
• Identity theft and fraud
• Information theft
• Cyberstalking
Computer crimes cross international borders and often involve issues of
free speech, obscenity, and libelous or slanderous postings. More than
25 jurisdictions place limits on speech and ban certain types of
subversive, obscene or inflammatory material.
8. COMPUTER FRAUD
• Stealing computer information, changing, and deleting it qualify
as fraud.
• Fraudulent activity includes altering computer code for illegal
purposes.
• Criminal fraud also includes misusing software or changing
how it works.C
• omputer criminals target people online for various financial
scams, which have become so prevalent that many of these
crimes go unreported.
9. IDENTITY THEFT
People steal personal information in many ingenious
ways and use this information to apply for credit,
jobs, or get unauthorized access to personal
accounts or information. Common methods of
stealing information include the following techniques.
10. IDENTITY THEFT
• Phishing scams use emails, spam, phone calls and other communications
pretending to represent banks, utility companies or potential employers and ask
for personal information.
• Dumpster diving refers to criminals going through trash to find old bills and
personal communications.S
• kimming uses high-tech devices that steal credit information from debit and credit
cards when criminals swipe them.
• Criminals use a simple, low-tech method to divert mail—they simply fill out a
change of address card and send it to the post office to intercept communications.
• Simple theft involves stealing wallets or purses to get personal information.
• Pretexting offers prizes or rewards on mobile phones, but the hook always
requires confirming personal information
11. CYBERCRIME AND
PUNISHMENT
Cybercrimes run the gamut—from student mischief to international terrorism.
The increasingly severe penalties for these types of crimes serve as deterrents
as more people become aware of the consequences they might face.
Cybercrime causes major losses of time, money, and good reputations, and
judges and prosecutors have no choice but to treat these crimes with utmost
severity.
Substantive laws include crimes such as online gambling, child pornography,
theft of intellectual property, fraud, and identity theft.