.

Saturday, March 30, 2019

Defining And Analysing Computer Crimes

Defining And Analysing reason machine discourtesysComputer annoyance comes in umteen distinguishable forms and can cause serious amounts of misuse. It has been near as long as the computer has and savages atomic number 18 al ways finding un precedentd ways to beat the system. With the constant advancements in engine room, it has become easier for criminals to hide acquaintance most their law- scandaliseing. Evidence is now handled and collected differently than it was in the past and requires a significant amount of cargonful forensic investigation.What is computer discourtesy?Computer plague is abominable activity that is connected on the net or through ne dickensrks. The department of justice has three separate categories in which computer evil can be labeled. The startle category is struggle computers of early(a)s, such(prenominal)(prenominal)(prenominal) as open uping a virus. The siemens category is utilise the computer to generate a crime which c ould also be committed the physiologic world, such as fraud or illegal gambling. The 3rd and last category is development the computer to store stolen or illegal study (Citizenship.org). at that place argon several different types of computer crime committed in the world today. Of those include fraud, identity stealth, phishing scams, malware, viruses, cyber stalking, and kid pornography. Computer crime has been around for nearly two centuries, with the first ever record occurring in the year 1820 (hubpages.com). With the continual advancements in technology, it has been made easier for criminals to hide reading ab by their crimes. Cyber crimes are handled differently than they fork up in the past because of this fact. When computers are endeavored, it can solely alter the system and most times it result even cause damage. Also, computers that have been attacked have the capability to spread the attack to other systems within the same network (CERT.org).Statistics on Co mputer crime jibe to Minnesotas Internet Crime Complaint Center (IC3) 2008 Internet Crime Report, a total of 3,578 ills came in. There are several different categories that the complaints are separated into. To name a few of those categories, at that place is check fraud, trending, deferred payment card fraud, Nigerian letter fraud, and identity theft. Here are few statistics that were collected during the year 2008Non Delivery of Merchandise/Payment was the top complaint and accounted for 31.9% of nevertheless internet crime called in.Auction fraud came in second accounting for 27.5% of all internet fraud78.5% of all perpetrators were male indoors the country, California is the home to the largest percentage of perpetrators accounting for 15.8%Of the world, the United States is home to 66.1% of all perpetratorsThis is just a small percentage of the statistics I discovered when see the website of the Federal authority of Investigation (fbi.org). According to the IC3, the rat e of computer crime continues to climb as the old age pass by. The group has been collecting training and statistics on internet crime for the past three years in hopes to find trends among perpetrators and crimes committed in nightspot to better solve the crimes of the future.Hacking What is it?The landmark plebeian scolding has several different meanings and it authority different things to different generations. In the fifties and 1960s, computer programmers viewed hacking as an skilful exercise and prefer to use the barrier cracking instead in order to separate themselves with the negative intension that came along with existence considered a taxi. The newfangled generation intents that hackers of today are doing the real work of exploration which was made necessary due to the precedent generation selling out (Thomas). According to the dictionary, the official definition of hacker is a computer enthusiast and a microcomputer user who attempts to authorise unauth orized access to proprietary computer systems (dictionary.com). Hacking has its own meaning to different throng. To some its a means of exploration and education to others its to a greater extent about playing childish, but costly, pranks on commonwealth and companies (Thomas).Hacking ThenHackers of the 1960s and mid-seventies were found to be university graduate students with a profound interest in computers. Hacking grew to be quite popular in the labs of rise up considered colleges such as the Massachusetts Institute of Technology (MIT), Cornell, and Harvard. Students would play around with computers on their college campus and solve problems that eventually led to the creation of the individual(prenominal) computer. It was the birth of something that would triplet to a bare-assed culture of innovative technological advances. Those who were able to hack were considered to be computer geniuses or nerds, rather than hackers (Thomas).Hacking NowHackers of today are viridity ly found to be in their teenage years. The reason for such age difference between the times is that fifty to sixty years ago, you could hardly find computers on college campuses whereas today, it is uncommon to find a domicile that does non own at least hotshot computer. They are more(prenominal) readily available for young children not yet in college to wear around with. Technology today is also very different than it apply to be. There are now discussions and PIN numbers in order to protect the user from having any schooling stolen. Security is stronger now, which is honourable for the common users of online systems such as eBay, online banking, or any other accounts which are password protected. However, as Thomas clearly states, protective cover today is a ambiguous sword. Although quite a little are more protected, it also protects the hackers from becoming easily determine (Thomas). Hackers are able to pip advantage of this and often continue to hack into system s of major companies, or even your psycheal computer at home.It seems that hacking was something more positive 60 years ago. It was used to discover new technology and helped to design and create more advanced machines and programs for people to use. It was something great that only those who were quite familiarityable were capable of doing. However, with such great accomplishments, it has been made easier for the younger generation to turn the term hacker into something negative. Thomas describes these hackers as new-school hackers and shortly a new hacking culture was born. Soon, hackers of the new generation began to use their knowledge against the world. They would meet to share what they have learned and would develop new ways to attack systems (Thomas). This new generation would turn hacking into crime that so many were volitioning to commit.Ethical Evaluation of HackingFrom what it seems, hacking can be used to do some(prenominal) good and problematical, which may make one wonder whether or not it can be viewed as ethical. I have everlastingly assumed that hacking was a bad thing and went along with its ever common negative connotation. I feel that people hack into systems to steal information from another party whether it be a large corporations secret files, or your next door neighbors bank account. From what Ive studied so far, hackers from the past acted on a more ethical basis than the hacker of today. They used their knowledge for the better and acted on good will to try and find new ways to improve the age of computers. In order to really turn over into it, I studied the ethics of hacking using two different running(a) ethical theories Kantianism and the fond Contract Theory.Hacking and KantianismKantianism has a lot to do with good will and the desire to do the indemnify thing. The reason for doing a certain(a) act, in this case hacking, should cultivate the desire to what is right. There are two categorical imperatives correlated w ith this supposition. The first states that if you act on moral rule, you must first see how it will affect the universal more laws. This means that before you commit an act, first think about what would happen if everyone were to commit this same act (Quinn). To put this into perspective, hackers fundamentally break security barriers to observe information which they are probably not allowed to see in the first place. If in that location is a rule that makes it okay for everyone to break security barriers, it would completely defeat the purpose of having a secure system set up in the first place. There would no longer be such a thing as unauthorized information. Everyone would be allowed to somehow break in to the system and read it. The company might as well just display this information freely, for the world to see. This would not be right as the information is protected for a reason. It is for certain peoples eyes, and their eyes only and is not for anyone else to see.The se cond categorical imperative states that you should treat some(prenominal) yourself and other as ends in themselves and not as a means to an end. This basically states that it is unethical to use someone for your benefit (Quinn). When relating this to the act of hacking, it tells us that we extremity to respect others and their right to privacy. When a hacker breaks into a system, they are using other peoples information to their benefit. They are invading privacy to get what they want, which is personal information.The first categorical imperative seems to correspond better with the topic, but both imperatives basically state the hacking is an unethical act. It is not right to disrespect people or to treat them unfairly, and when hacking occurs, that is exactly what happens. Therefore, according to the Kantianism, hacking is deemed to be unethicalHacking and the Social Contract TheoryThe affable exhort takes place in a civilized society and is based upon two things. The first th ing is that on that point is an establishment of moral rules to govern relations among citizens. The second thing is that there must be a government capable of enforcing such rules. The social cause theory states, Morality consists in the set of rules, governing how people are to treat one another that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well. This contract suggests that no man has authority over another and that no one lives above the law. The club is supposed to determine the rules for its members, and all who is part of that community must abide by such rules. In order for this theory to work, the laws must not only be stated, but enforced as well. This will prevent anyone from trying to cheat the system (Quinn).If hacking were to ever be considered socially acceptable, it would almost defeat the purpose of having secure systems. flock would have the right to invade other peoples privacy and basica lly steal what does not belong to them. This type of crime is not accepted in the physical world, so why should we choose to accept it in cyberspace? The dissolving agent to that is we should not. The social contract theory has much to do with respect for yourself and respect for others. It is not very respectful to be deceitful and steal information or items which do not belong to you. Therefore, according to the social contract theory, hacking is deemed to be unethical.How Does the FBI control Cyber Crime?The Federal Bureau of Investigation has a four-fold method that works to control and eliminate cyber crime. The first step in this process is to stop those behind the most serious computer invasions and the spread of malevolent code. Second, they must identify and put a stop to online internal predators that use the internet to meet and exploit children and to produce, possess, or share child pornography. The third step is to counteract operations that target United States inte llectual property, endangering our national security and competitiveness. Lastly, dismantle national and transnational organized criminal enterprises engaging in internet fraud (fbi.gov). Computer invasions are not taken lightly and it is very important that the FBI work to control such a crime. Here are some facts taken from the Federal Bureau of Investigation website on how serious these cyber crimes are takenA Cyber year at FBI Headquarters to address cyber crime in a duplicate and cohesive mannerSpecially trained cyber squads at FBI headquarters and in each of the 56 field offices, staffed with agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud reinvigorated Cyber Action Teams that travel around the world on a moments recognize to assist in computer intrusion cases and that gather vital intelligence agency that helps us identify the cyber crimes that are most dangerous to our national security and to our economy93 Computer Crimes Task Forces nationwide that combine progressive technology and the resources of our national, state, and local counterpartsA growing partnership with other federal agencies, including the Department of Defense, the Department of Homeland Security, and others-which share similar concerns and resolve in combating cyber crime.There are different levels of cyber crime, but we can never be too careful when it comes to protecting our people and our national security. There are several different ways of course in which the FBI will take action and that all depends on the type of cyber crime that is beingness committed. For example if it is trying to catch an online predator, a sting operation will be created and a member of the FBI will pose as a young child in hopes that someone will fall in to the trap. The FBI is entire of highly trained professionals that know what they are doing and work their h ardest to catch anyone who is being unlawful.How is Cyber Crime Different Than Physical Crime?Crime that takes place on in cyberspace is quite similar to physical crime. It is a person using their knowledge to break into another someone elses personal property. There are several laws against both types of crimes, and the penalties are just as grating in the cyber crime world as they are in the physical. Also, both of them have the potential to cause a lot of harm and damage to others.The difference between the two is the way that the victims, or potential victims, feel about such cyber and physical crime. In recent surveys, it states that more people believe that their chances of being victims of cyber crime are much higher than being victims of physical crime. Many people are scared to participate in online banking or to shop online in fear of someone intercepting and hacking into their accounts. Also, it has been found that people are very cautious when it comes to documents that contain personal information on them by completely destroying them or assuring that they are safely stored (crime- investigate.org). According to a survey conducted by IBM, more than half of the businesses located in the United States believe that cyber crime is more costly to them than physical crime. The ways in which it costs them are through lost revenue, loss of genuine and prospective customers, and loss of employee productivity (allaboutroimag.org).ConclusionCyber crime and hacking have been around for many years to date. It is something that developed as soon as the computing machine did. There have always been computer geniuses out there to use their knowledge for good, along with bad. After doing a lot of research and in my ethical evaluations, I have concluded that hacking is an unethical act. What started out as something that seemed like a good thing, quickly turned bad as soon as the personal computer became widely available. People began to use their knowledge again st others and today we are faced with more cyber crime than ever. It is important for us and our government to keep it under control as it can cause a lot of damage to anyone who becomes a victim.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.