The Growth and Development of Computer Crimes

Introduction

The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime associated with computers. Unfortunately, the cyber security men have a very cumbersome task to curb this new form of crime. This is because cyber crime is a very complicated type of violation to control. First of all, it is not easy to identify the perpetrator of the crime. It may range from just an innocent young teenager hacker who is out to adventure to a well organized gang with a sole purpose to commit crime. To make matters worse, parents get worried more against internet predators, online child predators and pedophiles. The bright side of the matter, however, is that law enforcing agencies are working hand in hand to alleviate cyber crime. In this paper, I am going to examine in detail the growing crimes related to computers as well as diagnose some of the measures that can be put in place to counteract the vice.

Hacking

You may ask yourself a question, who are these hackers? They are all over. We hear about them in the news time and again. “…Or worse yet, maybe you or your family or your friends have been the victim of hacking” (Schwartau, 2000). Dangers of being hacked are open to all computer users. It is almost inevitable to elude this reality once you belong to this global society. Unfortunately there is a lot of misconception on hacking activities. Most people have had access to wrong information on hacking. Schwartau (2000) argues that “hacking is not really what you thought it was after all.” He emphasizes that hacking is deeply entrenched in the society we live in. The impact of this cyber crime, he adds, has more severe repercussions to every individual beyond our universal understanding. Hacking is a very serious vice that may end up consuming the societal fabric long before it is realized.

The society has changed and transformed through a series of stages, one of it being information technology. There is even greater need to conform and be flexible to the challenges brought about by this information age. In a sad note, however, “we have created a global society where economists don’t yet understand the global economy” (Schwartau, 2000). The World Wide Web consists of computer network everywhere. This vast network controls sensitive activities like money transfer, movement of automobile machines like planes, and educational value to our children. Sincerely speaking, computers influence our daily activities in a variety of ways. Therefore, any crime associated with computers (hacking for instance) results in major consequences to every member in the society. The United States of America Department of Defense in April 1998 “announced that it had been hacked 250,000 times in one week” (Schwartau 2000). The media failed to report on that occurrence appropriately. To them, it seemed like it was not significant. However, according to Schwartau (2000), “this event marked the first time the D.o.D openly admitted to attacks on such a vast scale.”

There are several threats and risks that computer enthusiasts face in this global village. Outsiders who seek information from our computers without permission may pose a real threat to information security. Unfortunately, most hackers “are insiders-white collar criminals, disgruntled employees harboring real or imagined grievances” (Nichols, Ryan & Ryan, 2000). Another source of hackers may come from those who lose their patriotism and betray their countries. They do this with a promise “for money or ideological incentives” (Nichols et al., 2000). This explains why our information systems are highly vulnerable to both internal and external threats. It also gives us an objective view point why hacking is a very protracted form of cyber crime which may not be eradicated but rather it can only be minimized to lower levels. Nichols et al., (2000) unanimously agree that “threats to information and information systems are paired with a specific line of attack or set of vulnerabilities”

To deal with hacking more effectively, both threat and vulnerability factors should be put into consideration. “We cannot depend on elimination of a vulnerability to neutralize a threat, or elimination of a threat to mean that vulnerability can be tolerated safely” (Nichols et al., 2000). It is also very important to note that computer crimes can be used to commit a wide range of criminal activities such as “credit card fraud, counterfeiting, bank embezzlement, and theft of secret documents” (Nichols et al., 2000). If someone physically steals a data disk carrying a 2.0MB of important information, it amounts to theft. Equally, getting access to restricted sites in a computer is considered crime. This is why the society is so vulnerable and at the same time faces potential risks in this information age.

There have been several anti-hacking activities both in the past until to the present attempting to tame the vice. A case in point is the renowned “Operation Sundevil” of the 1990 which received a lot of public recognition (Bruce 1994). It was characterized by countrywide computer crackdown and had much success. According to Bruce (1994), “Operation Sundevil” was not intended to combat “hacking” in the sense of computer intrusion…” The Chicago Computer Fraud and Abuse Task Force strategies were directed towards eradicating hacking. However, “Operation Sundevil” “was a crackdown on those traditional scourges of the digital underground.” (Bruce 1994). It took a different approach in facing out stealing of credit card and misuse of telephone codes. This operation left an indelible mark in the fight against hacking although its efforts were not directed towards anti-hacking. To fight this present age crime, decisive efforts by the relevant arms of governments are paramount. Nevertheless, regular cooperation among anti-hacking agencies is required.

Children Vulnerability

Parents are a worried lot. For those parents who think that their children are safe from cyber crime, they are wrong. All children who can read and write are vulnerable to this risk. According to Hitchcock & Page (2002), “any child can become an online victim of child predators, harassment, stalking, pornography and more”. Worst among children is the online pornography. It is then followed by enticement and the least risky threat is molestation.

Community policing in reporting any child related sex exploitation seem to be the basic solution to this. “The NCMEC…added CyberTipline to its website…for the public to report…child sexual exploitation. It has worked” (Hitchcock & Page, 2002). This organization is said to have recorded thirty seven thousand complaints since it was launched. It is, however, quite difficult to prosecute online cyber offenders and so most perpetrators go unpunished. Children should be well informed that “everyone you meet online is a stranger, even your friends” (Hitchcock & Page, 2002). Unless those friends get the approval of their parents, they remain to be strangers and no serious business can take place. In addition, helpful information for children who browse through the web is that they should not believe on every detail from online acquaintances. Some messages may be full of lies and misleading. According to Hitchcock & Page (2002), “they should not give out personal information online to strangers”. The same information might be used against them or their family members by these computer criminals.

Computer Protection

Finally, protecting your computer against possible threats is a worthy step to take. Consider these intruders into your computer; the Trojan, virus and hackers. They are nuisance and form a big network of cyber crime. A Trojan, for example, “is a program designed to perform functions in a computer without the computer user knowing it’s there” (Hitchcock & Page, 2002). This can be very destructive both to an individual user and to a corporate organization. Data loss and computer software damage are some of the obvious impacts. Viruses will similarly wipe out data because they are programs meant to disrupt safe and comfortable working of computers.

Hackers are “people who want to taste a Web site or internet connection just to see if they can break in…” (Hitchcock & Page, 2002). Some hackers do this for purpose of fun while others are well organized gangs out to create havoc to information security like credit card counterfeiting.

Stay Safe

It is still possible to avoid, even if not completely, the crimes related to the use of computers. Hitchcock & Page (2002) suggests that you should “select a gender-neutral user name for the first part of your email address or chart or discussion forums.” This will conceal your identity to cyber criminals and let you not be a victim in waiting.

Conclusion

In summing up this literature review, all of us must acknowledge the grim reality of the negative challenges brought about by the invention, growth, and development of computers. Whereas we have been fully absorbed in the comfort of Information and Communication Technology age, to an extent of being oblivious of the potential dangers and risks, it is high time individuals, corporate, and government agencies take a decisive step in addressing this twenty first century crime.

Our email addresses should be maintained as a private entity and should be used for people well known to us. This will keep fraudsters at bay. Other ways through which these criminals can catch up with you is through personal ads, free news letters, greeting cards, and guest books. Every possible caution should be taken when handling these online material exchanges.

Reference List

Bruce, S. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Champaign, Ill. Project Gutenberg.

Hitchcock, Jayne A.; Page, L. (2002). Net Crimes & Misdemeanors: Outmaneuvering the Spammers, Swindlers, and Stalkers Who Are Targeting You Online. Medford: N. J. Information Today.

Nichols, Randall K.; Ryan, Daniel J.; Ryan, Julie J.C.H (2000). Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves. New York: McGraw-Hill Professional.

Schwartau, W. (2000). Cyber Shock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s Mouth Press.

Cite this paper

Select style

Reference

StudyCorgi. (2022, February 13). The Growth and Development of Computer Crimes. https://studycorgi.com/the-growth-and-development-of-computer-crimes/

Work Cited

"The Growth and Development of Computer Crimes." StudyCorgi, 13 Feb. 2022, studycorgi.com/the-growth-and-development-of-computer-crimes/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'The Growth and Development of Computer Crimes'. 13 February.

1. StudyCorgi. "The Growth and Development of Computer Crimes." February 13, 2022. https://studycorgi.com/the-growth-and-development-of-computer-crimes/.


Bibliography


StudyCorgi. "The Growth and Development of Computer Crimes." February 13, 2022. https://studycorgi.com/the-growth-and-development-of-computer-crimes/.

References

StudyCorgi. 2022. "The Growth and Development of Computer Crimes." February 13, 2022. https://studycorgi.com/the-growth-and-development-of-computer-crimes/.

This paper, “The Growth and Development of Computer Crimes”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.