SlideShare a Scribd company logo
1 of 7
CyberCrime
    Computer-Related Crimes
                          Deana Green
                          Kaplan University


CJ-216: Computer, Technology, and Criminal Justice Information Systems
                        Professor Jeffrey Leh
                         September 21, 2011
What is a computer-related
                  crime?


It’s considered a computer-
related crime when one uses
the computer to commit more
traditional crimes (Foster, 2005)
such as fraud, solicitation, and
stalking.
Fraud
                                         …”deceit, trickery, sharp practice, or breach of confidence,
                                         perpetrated for profit or to gain some unfair or dishonest
                                         advantage” (“Fraud”, n.d.).




  Elements of the crime (“The Basis of
  Computer Fraud”, n.d.):
     Attacker gains access by use of malicious programs (spyware)
     Spyware monitors a user’s activity and collects personal information
     Information can be used to obtain credit accounts and medical benefits
     in the victim’s name
     Attacker may accomplish stealing someone’s identity, completely.




Computer fraud is oftentimes one of the most difficult computer crimes to investigate
because cyber criminals are able to hide behind a computer screen to do their misdeeds,
using sophisticated spyware software. It is even more challenging for the victim to find
justice once their information has been stolen and used.
Computer-Aided
                                                             Solicitation
                                  Scott Nicholas Martel faces up to 10 years
                                  in prison for child pornography and
                                  computer-aided solicitation of a minor
                                  (“Eunice Man, 2011).




      Elements of the crime:
      Offender creates an online identity and mingles with minors in
      chatrooms
      Swapping of pictures and videos with the minor
      Makes arrangements to meet with anticipation of engaging in sexual act
      with the minor




According to the Louisiana Code (2009), when a person 17 years or older communicates,
by way of a computer, with a minor child at least 2 years younger with the intent to lure
the minor into sexual misconduct, is considered computer-aided solicitation of a minor.
Cyberstalking
             ”the use of the Internet, e-mail, or other electronic communications devices to stalk
                               another person” (“Cyberstalking”, 1999, para. 5).




  Elements of the crime:
Harassing or threatening behavior that an individual engages in repeatedly
Motivated by a desire to exert control over their victims
May begin when the victim attempts to break off the relationship
Can easily locate private information about a potential victim, sometimes for a
small fee
           Internet has a wealth of information available such as unlisted phone
            numbers, addresses, social security numbers
           May use bulletin boards or networking sites to attain harassing support
            from others on the victim

Law enforcement have many issues with trying to identify, locate, and arrest the cyber-
offenders because of the lack of direct contact between the cyberstalker and the
victim. The offender has the capability to present himself as someone else or even get
others to harass the victim on the offender’s behalf. There are also so many ways to
be completely anonymous in harassing the victim, which poses a greater challenge for
law enforcement (“Cyberstalking”, 1999).
Hacking
          The intentional access of a computer to obtain unauthorized information to modify or
                                  cause damage to others’ data or files.




 Elements of the crime:

Unauthorized access to steal or damage information
Sometimes motivated by a desire to access bank accounts or business files
May begin with an intense knowledge of computers and software piracy
Hacking can lead to other crimes such as identity theft and programming attacks


                                                                              1983 movie, “War Games”, a young man
                                                                              almost starts World War III by accidentally
                                                                              hacking into a government system.




  The difficulty in tracking down a hacker is the fact that he has the ability to be on
  “stealth” mode. There is software available for the hacker to use in order to remain
  anonymous. Usually, by the time he’s caught, the damage is already done.
References

1. Cyberstalking:
A
new
challenge
for
law
enforcement
and
Industry.
(1999).

Retrieved
September
24,
2011,
from
Justice.gov
website:
http://www.justice.gov/
criminal/cybercrime/cyberstalking.htm


2. fraud.
(n.d.).
Dictionary.com
Unabridged.
Retrieved
September
27,
2011,
from

Dictionary.com
website:
http://dictionary.reference.com/browse/fraud

3.

What
is
computer
fraud.
(n.d.).
Spam
Laws.com.
Retrieved
September
23,
2011,

from
Spam
Laws
website:
http://www.spamlaws.com/computer-fraud.html

More Related Content

What's hot

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 

What's hot (20)

Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 

Similar to Greendeana unit 8 project cj216 copy

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 

Similar to Greendeana unit 8 project cj216 copy (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Greendeana unit 8 project cj216 copy

  • 1. CyberCrime Computer-Related Crimes Deana Green Kaplan University CJ-216: Computer, Technology, and Criminal Justice Information Systems Professor Jeffrey Leh September 21, 2011
  • 2. What is a computer-related crime? It’s considered a computer- related crime when one uses the computer to commit more traditional crimes (Foster, 2005) such as fraud, solicitation, and stalking.
  • 3. Fraud …”deceit, trickery, sharp practice, or breach of confidence, perpetrated for profit or to gain some unfair or dishonest advantage” (“Fraud”, n.d.). Elements of the crime (“The Basis of Computer Fraud”, n.d.): Attacker gains access by use of malicious programs (spyware) Spyware monitors a user’s activity and collects personal information Information can be used to obtain credit accounts and medical benefits in the victim’s name Attacker may accomplish stealing someone’s identity, completely. Computer fraud is oftentimes one of the most difficult computer crimes to investigate because cyber criminals are able to hide behind a computer screen to do their misdeeds, using sophisticated spyware software. It is even more challenging for the victim to find justice once their information has been stolen and used.
  • 4. Computer-Aided Solicitation Scott Nicholas Martel faces up to 10 years in prison for child pornography and computer-aided solicitation of a minor (“Eunice Man, 2011). Elements of the crime: Offender creates an online identity and mingles with minors in chatrooms Swapping of pictures and videos with the minor Makes arrangements to meet with anticipation of engaging in sexual act with the minor According to the Louisiana Code (2009), when a person 17 years or older communicates, by way of a computer, with a minor child at least 2 years younger with the intent to lure the minor into sexual misconduct, is considered computer-aided solicitation of a minor.
  • 5. Cyberstalking ”the use of the Internet, e-mail, or other electronic communications devices to stalk another person” (“Cyberstalking”, 1999, para. 5). Elements of the crime: Harassing or threatening behavior that an individual engages in repeatedly Motivated by a desire to exert control over their victims May begin when the victim attempts to break off the relationship Can easily locate private information about a potential victim, sometimes for a small fee  Internet has a wealth of information available such as unlisted phone numbers, addresses, social security numbers  May use bulletin boards or networking sites to attain harassing support from others on the victim Law enforcement have many issues with trying to identify, locate, and arrest the cyber- offenders because of the lack of direct contact between the cyberstalker and the victim. The offender has the capability to present himself as someone else or even get others to harass the victim on the offender’s behalf. There are also so many ways to be completely anonymous in harassing the victim, which poses a greater challenge for law enforcement (“Cyberstalking”, 1999).
  • 6. Hacking The intentional access of a computer to obtain unauthorized information to modify or cause damage to others’ data or files. Elements of the crime: Unauthorized access to steal or damage information Sometimes motivated by a desire to access bank accounts or business files May begin with an intense knowledge of computers and software piracy Hacking can lead to other crimes such as identity theft and programming attacks 1983 movie, “War Games”, a young man almost starts World War III by accidentally hacking into a government system. The difficulty in tracking down a hacker is the fact that he has the ability to be on “stealth” mode. There is software available for the hacker to use in order to remain anonymous. Usually, by the time he’s caught, the damage is already done.

Editor's Notes

  1. \n
  2. http://legal-dictionary.thefreedictionary.com/Computer+Crime\n
  3. http://dictionary.reference.com/browse/fraud?&qsrc=\nhttp://www.spamlaws.com/computer-fraud.html\n
  4. http://dictionary.reference.com/browse/fraud?&qsrc=\nhttp://www.spamlaws.com/computer-fraud.html\n
  5. http://www.cyberguards.com/CyberStalking.html\n
  6. http://www.cyberguards.com/CyberStalking.html\n
  7. \n