Home Computer Crime

Computer Crime

Computer Crime

Computer Crime

What is a Computer Crime?


A computer crime refers to any illegal activity that involves a network and a coordinating computer. In an instance of computer crime, the computer may have been used during the actual commission of a crime, or the information latent within the computer may be the target of an attack. 
Net crime, which is a term used within the broader context of computer crime, refers more precisely to a criminal exploitation of the Internet. Issues surrounding these illegal actions, particularly those crimes within the field of copyright infringement, hacking, child grooming, and child pornography, have become high profile. In addition to these forms of computer crime, other illegal activities involving privacy are regarded as serious cyber-crimes. These types of computer crimes involve the disruption or tampering with confidential information. When private information is unlawfully retrieved or intercepted by an unauthorized party, the aggressor would face criminal computer crime charges.  

Types of Computer Crimes 
Computer crime encompasses a wide range of illegal activities. However, in general, the field may be subdivided into one of two types of categories: 1.) computer crimes that target networks or devices directly; and 2) a computer crime that is facilitated by a computer network or device. The primary target in the latter classification is independent of the computer network or device.  
The following are examples of computer crimes that primarily target networks or devices:
Computer Viruses
Forms of malicious code, such as Malware
Denial-of-service attacks 
The following are examples of computer crimes that will only use computer networks or devices: 
Fraud 
Identity Theft
Cyberstalking 
Information Warfare 
Phishing Scams. 
Fraud: This type of computer crime encompasses any dishonest misrepresentation of fact that intends to lead another individual to incur some form of loss. Fraud can result from altering computer input in an unauthorized manner or by entering unauthorized instructions or processes. In addition, altering, suppressing, destroying, or stealing output to conceal unauthorized transactions is a form of fraud. This form of computer crime can also be present by altering or misusing system tools or software packages or by tampering with a system’s code.  
Cyber terrorism: This form of computer crime, in general, can be defined as an act of terrorism committed through the use of the Internet or other computer resources. Through this definition, a simple act of distributing propaganda throughout the Internet or distributing threats can be considered an act of cyber terrorism. In addition, hacking activities directed towards families, entities, organizations, or individuals within networks, which creates a widespread sense of fear or panic, a demonstration of power, or the retrieval of unauthorized information directed towards the destruction of a person’s life is regarded as cyber terrorism. 
Cyber Stalking: Stalking is defined as a prolonged, intrusive method of harassment with obsessive, methodological, threatening, or sociopathic tendencies. Stalking can take place in a variety of circumstances ranging from physical stalking to virtual stalking. Physical stalking can include the inappropriate following, monitoring, or encroaching with regard to a victim. Online stalking can include harassment through email, the illicit collection of data or media belonging to another individual, or the unauthorized access of an individual’s computer network or server. 
Phishing: The criminal activity known as Phishing is classified as a variety of fraud that exists within a digital, virtual, or computational setting. Phishing is the unlawful, unethical, and illegal methodology facilitated by individuals with the intention of soliciting private, personal, and privileged information from individuals unfamiliar, unsuspecting, or unaware of the Phishing operation taking place. 

Online Predators At A Glance

Online Predators At A Glance

What are Online Predators?

Online Predators are defined as individuals who participate or engage in predatory, exploitative behavior through an online presence. In many cases, Online Predators utilize computational networking systems in the form of the Internet to take advantage of or prey upon their victims. Online behavior that is classified as predatory can range from sex crimes to fraud:
Financial Online Predators aim to take advantage of unsuspecting victims, which are most commonly individuals who are unfamiliar with the operation of computer systems, the flow of virtual information, or overtly-trusting in nature. It is not uncommon for these types of Online Predators to solicit participation in fraudulent activity or illegally extracted personal information with the intent of committing a crime.
Online Sex Predators are classified as those preying upon the weaknesses of victims within an online forum, which can range from chat rooms to illicit web sites. These types of Online Predators typically prey upon children or minors with the intent of committing illegal, sexual crimes.
Online Sexual Predators
Although Online Predators can exist in a variety of forms, the most common type(s) of Online Predators engage in criminal activity that is both sexual and illicit in nature. The methodology expressed by a majority of Online Sexual Predators entails the manipulation and deception of their victims. These victims are oftentimes minors or children. The following are amongst the most common crimes committed by Online Sexual Predators:
The transmission of illicit and unlawful media – photography, audio, or video – to those considered to be below the age(s) of consent.
The engagement of a minor in sexually-explicit chat.
The arrangement of a meeting with a child or minor with the intent of performing an illegal, unlawful, and unethical sexual act.