TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Greendeana unit 8 project cj216 copy
1. CyberCrime
Computer-Related Crimes
Deana Green
Kaplan University
CJ-216: Computer, Technology, and Criminal Justice Information Systems
Professor Jeffrey Leh
September 21, 2011
2. What is a computer-related
crime?
It’s considered a computer-
related crime when one uses
the computer to commit more
traditional crimes (Foster, 2005)
such as fraud, solicitation, and
stalking.
3. Fraud
…”deceit, trickery, sharp practice, or breach of confidence,
perpetrated for profit or to gain some unfair or dishonest
advantage” (“Fraud”, n.d.).
Elements of the crime (“The Basis of
Computer Fraud”, n.d.):
Attacker gains access by use of malicious programs (spyware)
Spyware monitors a user’s activity and collects personal information
Information can be used to obtain credit accounts and medical benefits
in the victim’s name
Attacker may accomplish stealing someone’s identity, completely.
Computer fraud is oftentimes one of the most difficult computer crimes to investigate
because cyber criminals are able to hide behind a computer screen to do their misdeeds,
using sophisticated spyware software. It is even more challenging for the victim to find
justice once their information has been stolen and used.
4. Computer-Aided
Solicitation
Scott Nicholas Martel faces up to 10 years
in prison for child pornography and
computer-aided solicitation of a minor
(“Eunice Man, 2011).
Elements of the crime:
Offender creates an online identity and mingles with minors in
chatrooms
Swapping of pictures and videos with the minor
Makes arrangements to meet with anticipation of engaging in sexual act
with the minor
According to the Louisiana Code (2009), when a person 17 years or older communicates,
by way of a computer, with a minor child at least 2 years younger with the intent to lure
the minor into sexual misconduct, is considered computer-aided solicitation of a minor.
5. Cyberstalking
”the use of the Internet, e-mail, or other electronic communications devices to stalk
another person” (“Cyberstalking”, 1999, para. 5).
Elements of the crime:
Harassing or threatening behavior that an individual engages in repeatedly
Motivated by a desire to exert control over their victims
May begin when the victim attempts to break off the relationship
Can easily locate private information about a potential victim, sometimes for a
small fee
Internet has a wealth of information available such as unlisted phone
numbers, addresses, social security numbers
May use bulletin boards or networking sites to attain harassing support
from others on the victim
Law enforcement have many issues with trying to identify, locate, and arrest the cyber-
offenders because of the lack of direct contact between the cyberstalker and the
victim. The offender has the capability to present himself as someone else or even get
others to harass the victim on the offender’s behalf. There are also so many ways to
be completely anonymous in harassing the victim, which poses a greater challenge for
law enforcement (“Cyberstalking”, 1999).
6. Hacking
The intentional access of a computer to obtain unauthorized information to modify or
cause damage to others’ data or files.
Elements of the crime:
Unauthorized access to steal or damage information
Sometimes motivated by a desire to access bank accounts or business files
May begin with an intense knowledge of computers and software piracy
Hacking can lead to other crimes such as identity theft and programming attacks
1983 movie, “War Games”, a young man
almost starts World War III by accidentally
hacking into a government system.
The difficulty in tracking down a hacker is the fact that he has the ability to be on
“stealth” mode. There is software available for the hacker to use in order to remain
anonymous. Usually, by the time he’s caught, the damage is already done.