Computer crime, can it be stopped?


Cybercrime and my personal experience

I decided to investigate the topic of cybercrime on the Internet because I, like many consumers, pay bills, buy and conduct other types of personal and business transactions on the Internet. Two years ago, my credit card information was stolen after paying a cell phone bill on the Internet. Therefore, the question of whether or not cybercrime can be stopped is something that worries me and I continually ponder.

First, let me define computer crime: “Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target” (Wikipedia). If I was asked two years ago whether or not I thought cybercrime could be stopped, I would answer the question reflecting my negative experience and that answer would have been no.

However, I think it depends on the type of cybercrime. For example, if someone uses a computer to illegally obtain financial information, sell drugs, intimidate or solicit sex, locating and detaining those individuals would be a matter of tracing the unique identification numbers of the CPU and the location of the unit and blocking or delete the website. Depending on the severity of the cybercrime, the perpetrator could be arrested and convicted.

Today, there are several types of security software available for websites that detect suspicious activity and help filter spam. However, if the crime has to do with hacking, either because the hacker’s intention is to test their hacking skills, hack to make a statement, or destroy a particular website, this type of cyber crime is proving to be more challenging. . to prevent. Hackers are usually highly trained technicians.

Furthermore, whenever advanced malware becomes available, it is a matter of time before hackers discover ways to breach encryption and hack websites. “Most companies face multiple cyberattacks every day, many unknown to the public and many unknown to the companies themselves” (Walters, Riley).

Cyber ​​attacks on US companies in 2014

In 2014, an alarming number of large corporations experienced website hacking, resulting in hackers gaining access to consumer personal information. To this day, recovering and implementing security measures to prevent security breaches has proven challenging.

Just to give an idea of ​​how serious and prevalent the crime of hacking is, here is a list of corporations that were hacked in 2014: Target, Neiman Marcus, Michaels, Yahoo Mail, Aaron Brothers, AT&T, and eBay. According to the Federal Bureau of Investigation, “the series of recent data breaches at big-name companies like JPMorgan Chase, Home Depot and Target raises questions about the effectiveness of private sector information security.” FBI Director James Comey stated: “There are two types of big business in the United States.

There are those who have been hacked … and those who do not know they have been hacked “(FBI). It is the last part of Mr. Comey’s statement where he says,” those who do not know. “I find that puzzling. What else awaits in the shadows of the unknown? Could it be an attack on the entire Human Resources Administration database or on the system that disburses social security benefits? What if the Cybercrime became the new secret weapon of war for some? countries in an attempt to destroy the economy of others. Today, these are all great possibilities. Should we cease e-commerce activities on the Internet?

Fortunately, or unfortunately, the Internet has become the way people communicate, learn, shop, enjoy entertainment, and share information. Convenience outweighs all cybercrime-related problems.

Intimidation

Another type of cyber crime is bullying. This has been shown to be common among young people under the age of 18. It usually occurs on social media where people constantly post private information, stalk or joke negatively about other people in such a way as to cause embarrassment, devastation, fear, and in some cases harm.

The harasser cannot always be identified because the information is often posted anonymously and distributed quickly. Deleting the information has proven to be a challenge. Websites that are frequently used for cyberbullying include Facebook, Twitter, Instagram, and other websites that promote socializing as their primary focus. The fact that bullying is perpetrated through technology does not negate the terrible impact it has on victims. It is believed that “children who experience cyberbullying are more likely to: Use alcohol and drugs, miss school, experience bullying in person, be unwilling to attend school, receive poor grades, have lower self-esteem and have more health problems., “according to research by the National Center for Education Statistics and the Bureau of Justice Statistics (Department of Health).

Convictions in the United States for computer crimes

The Justice Department website contains a 2015 press release on arrests and convictions resulting from cybercrime. Some of the convictions include: “A CMU student pleads guilty to designing malicious software and selling it on a hacker forum; music pirating website operator pleads guilty to criminal copyright infringement; a former State Department employee charged with hacking and cyberstalking; New York man admits to spamming, Nine people charged with the largest known hacking and securities fraud scam, and, Estonian national pleads guilty in the Manhattan Federal Court of charges stemming from a cyber fraud scheme that infected millions of computers around the world “(FBI).

The list above represents a fraction of the cyber crimes that are listed on the website. Law enforcement agencies in many states in the United States have their own stories of arrests and convictions related to cybercrime.

Conclution

The Internet is a free kingdom in the whole world that is not controlled by any government. The intention of the Internet is to allow a source of freedom and the exchange of information without government regulations.

However, due to the increasing uses of the Internet to provide consumer goods and services, governments around the world will have to collaborate to find an end to cybercrime.

One government cannot violate laws on the Internet that could overlap with another’s government. Therefore, governments must find a way to unite and, if there are differences, they must put them aside to address and prevent cybercrime.

References

Computer crime. October 6, 2015.
Federal Office of Investigations. October 10, 2014. Printing. October 3, 2015.
Riley, Walter. “Cyber ​​attacks on US companies in 2014”. Newsletter October 27, 2014. Printing. October 3, 2015.
Stopbullying.gov. nd US Department of Health and Human Services Print. October 6, 2015.