Web-Based Criminal Activity Overview
114 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT considered a form of online crime?

  • Industrial espionage
  • Eco-terrorism
  • Identity theft
  • Public speaking (correct)
  • Cyber vandalism involves interference with the lawful use of computers.

    True

    What type of crime involves threats such as extortion and cyber bullying?

    Threatening communications

    The illegal practice of manipulating stock markets is known as __________.

    <p>stock manipulation</p> Signup and view all the answers

    Match the following types of online crimes with their descriptions:

    <p>Identity theft = Stealing personal information to impersonate someone Cyber terrorism = Using the internet to carry out politically motivated attacks Credit card fraud = Unauthorized use of someone else's credit card information Eco-terrorism = Using sabotage to promote environmental causes</p> Signup and view all the answers

    Which of the following is NOT a traditional method of proprietary information theft?

    <p>Employee training</p> Signup and view all the answers

    Disgruntled employees can be a source of trade secrets theft.

    <p>True</p> Signup and view all the answers

    What is the FBI's estimate regarding foreign intelligence operations targeting the U.S.?

    <p>Over 120 foreign governments have intelligence operations targeting the U.S.</p> Signup and view all the answers

    Political espionage can involve monitoring communications from __________.

    <p>government officials</p> Signup and view all the answers

    Match the method of theft with its description:

    <p>Insider theft = Theft by employees or authorized personnel Social engineering = Manipulating people to gain confidential information Dumpster diving = Searching through waste to find sensitive information Malware = Software designed to disrupt or damage computer systems</p> Signup and view all the answers

    Which group is primarily associated with cyber terrorism?

    <p>Political or religious extremists</p> Signup and view all the answers

    Cyber terrorism entails non-disruptive attacks aimed at acquiring information.

    <p>False</p> Signup and view all the answers

    Name one common method used in cyber terrorism.

    <p>Viruses or worms.</p> Signup and view all the answers

    Which of the following is illegal in all states and prohibited by federal law?

    <p>Child pornography</p> Signup and view all the answers

    Child enticement and exploitation is a crime that law enforcement has had little success in preventing.

    <p>False</p> Signup and view all the answers

    What does the term 'child pornography' generally refer to?

    <p>Visual depiction of a lascivious exhibition of the genitals or pubic area or sexually explicit conduct of a minor</p> Signup and view all the answers

    The ease of access to online gambling, including access by ______, raises concerns about its legality.

    <p>minors</p> Signup and view all the answers

    Match the following crimes with their descriptions:

    <p>Child pornography = Visual depiction of sexual conduct involving minors Online pharmacies = Used for purchasing drugs privately Online gambling = Accessibility raises concerns about legality Child enticement = Stings using fake identities to catch offenders</p> Signup and view all the answers

    What is a common challenge in prosecuting child pornography cases?

    <p>First Amendment issues</p> Signup and view all the answers

    The Internet Gambling Prohibition & Enforcement Act of 2006 effectively eliminates online gambling.

    <p>False</p> Signup and view all the answers

    What is the strategy employed by law enforcement in sting operations for child enticement?

    <p>Pretending to be a child to arrange a meeting</p> Signup and view all the answers

    What is web-cramming?

    <p>Unauthorized charging of consumers via monthly telecommunication fees</p> Signup and view all the answers

    ISP Jacking involves connecting users to their selected Internet service providers.

    <p>False</p> Signup and view all the answers

    What technique involves stealing fractions of a cent from numerous accounts?

    <p>Salami technique</p> Signup and view all the answers

    ______ involves the manipulation of data packets to mimic a third party.

    <p>IP Spoofing</p> Signup and view all the answers

    What is insider trading?

    <p>Using confidential information for personal gains in stock trading</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Web-Cramming = Unauthorized monthly charges Data Diddling = Fraud via data manipulation e-Fencing = Sale of stolen goods online Fraudulent Instruments = Counterfeiting and forgery through tech</p> Signup and view all the answers

    Securities fraud can result from the dissemination of false information.

    <p>True</p> Signup and view all the answers

    Define e-Fencing in the context of neo-traditional crime.

    <p>Sale of stolen goods through technological means.</p> Signup and view all the answers

    Which of the following is NOT a step in the money laundering process?

    <p>Diversion</p> Signup and view all the answers

    The primary purpose of layering in money laundering is to return funds to the legitimate economy.

    <p>False</p> Signup and view all the answers

    What is the first step in the money laundering process?

    <p>Placement</p> Signup and view all the answers

    Money laundering is often a critical element for __________ crime to function.

    <p>organized</p> Signup and view all the answers

    Which action is part of combating money laundering?

    <p>Finding</p> Signup and view all the answers

    Match the following aspects of technology with their implications for modern society:

    <p>Increasing connectivity = Expands vulnerability to cyber attacks Technical expertise = Decreasing importance Government apathy = Contributes to rising cyber crime Storage capabilities = Facilitates illicit activities</p> Signup and view all the answers

    Holding Internet service providers accountable for inadequate record maintenance is a method to combat money laundering.

    <p>True</p> Signup and view all the answers

    What is one responsibility of financial institutions in combating money laundering?

    <p>Maintaining adequate security</p> Signup and view all the answers

    Which of the following is an example of online crime that disrupts lawful computer use?

    <p>Distributed Denial of Service (DOS) attacks</p> Signup and view all the answers

    Cyber bullying is classified as a type of online crime.

    <p>True</p> Signup and view all the answers

    What crime involves the unauthorized theft of someone's personal information for financial gain?

    <p>Identity theft</p> Signup and view all the answers

    ______ refers to illegal activities involving the transfer of funds through malpractices to hide their origin.

    <p>Money laundering</p> Signup and view all the answers

    Match the following online crimes with their descriptions:

    <p>Cyber stalking = Repeated and unwanted communications causing distress Auction fraud = Dishonest schemes to exploit buyers in online auctions Child pornography = Illegal explicit material involving minors Cyber terrorism = Violent actions intended to intimidate for political objectives</p> Signup and view all the answers

    Which of the following is NOT a traditional method of proprietary information theft?

    <p>Hacking into secure servers</p> Signup and view all the answers

    Disgruntled employees can contribute to the theft of trade secrets.

    <p>True</p> Signup and view all the answers

    What type of crime involves deliberate attacks against information systems intended to disrupt services?

    <p>Cyber terrorism</p> Signup and view all the answers

    ___________ refers to techniques like shoulder surfing and dumpster diving to acquire sensitive information.

    <p>Social engineering</p> Signup and view all the answers

    Match the following methods of theft with their descriptions:

    <p>Insider threats = Theft carried out by employees or those with access Malware = Software designed to disrupt or damage computer systems Social engineering = Manipulative tactics to deceive individuals into divulging information Equipment theft = Physical removal of devices that store sensitive data</p> Signup and view all the answers

    Which foreign intelligence agency was noted for monitoring Presidential communications?

    <p>Israeli intelligence</p> Signup and view all the answers

    Political espionage is not considered an international threat.

    <p>False</p> Signup and view all the answers

    What is a common result of political espionage according to FBI estimates?

    <p>Foreign governments targeting U.S. intelligence operations.</p> Signup and view all the answers

    What is a major challenge in prosecuting child pornography cases?

    <p>Difficulty in defining the content</p> Signup and view all the answers

    Child pornography is legal in some states in the United States.

    <p>False</p> Signup and view all the answers

    What strategy do law enforcement officials use in sting operations to combat child enticement?

    <p>Pretending to be a child</p> Signup and view all the answers

    The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling ________.

    <p>illegal</p> Signup and view all the answers

    What type of materials can online pharmacies be used to purchase illegally?

    <p>Anabolic steroids</p> Signup and view all the answers

    Match the following crimes with their descriptions:

    <p>Child Pornography = Visual depiction of minors in sexually explicit acts Online Gambling = Gambling conducted over the internet Child Enticement = Attempt to lure a child into inappropriate situations Online Pharmacies = Purchases made for drugs via internet platforms</p> Signup and view all the answers

    Online gambling is easily accessible to minors.

    <p>True</p> Signup and view all the answers

    What law enforcement strategy has proven effective against child exploitation?

    <p>Sting operations or honeypots</p> Signup and view all the answers

    What is cyberstalking?

    <p>Willful and repeated following or harassing of a person through electronic means</p> Signup and view all the answers

    Cyberbullying is illegal under Federal law.

    <p>False</p> Signup and view all the answers

    Name one form of online fraud that involves misrepresentation.

    <p>Internet auction fraud</p> Signup and view all the answers

    Cyberharassment focuses on actual harm suffered, including _____ of character.

    <p>defacement</p> Signup and view all the answers

    Match the following types of online fraud with their descriptions:

    <p>Nondelivery of goods = Failure to deliver an item sold online Fee-stacking = Adding hidden charges to a transaction Shill bidding = Seller submits bids to artificially inflate price Misrepresentation = Giving false information about an item's condition</p> Signup and view all the answers

    Which of the following methods is part of online credit card fraud?

    <p>Skimming</p> Signup and view all the answers

    Online fraud affects only a specific demographic group.

    <p>False</p> Signup and view all the answers

    What is the primary goal of online fraud?

    <p>To receive unwarranted compensation or gratification</p> Signup and view all the answers

    What is the first step in the money laundering process?

    <p>Placement</p> Signup and view all the answers

    Layering in money laundering involves returning funds to the legitimate economy.

    <p>False</p> Signup and view all the answers

    Name one critical action in combating money laundering.

    <p>Freezing accounts</p> Signup and view all the answers

    The practice of using networks to obscure the origins of funds is known as __________.

    <p>layering</p> Signup and view all the answers

    Match the steps of money laundering to their descriptions:

    <p>Placement = Point of entry of illicit funds Layering = Using networks to obscure origins of funds Integration = Return of funds to the legitimate economy</p> Signup and view all the answers

    Which of the following is a method to combat money laundering?

    <p>Enforcing 'Know Your Customers' regulations</p> Signup and view all the answers

    Computers are becoming less important in conducting cyber crime.

    <p>False</p> Signup and view all the answers

    What is one reason for the increase in computer crime?

    <p>Increasing connectivity of infrastructures</p> Signup and view all the answers

    What is the primary legal challenge in prosecuting child pornography cases?

    <p>First Amendment issues</p> Signup and view all the answers

    Child pornography is legal in some states in the United States.

    <p>False</p> Signup and view all the answers

    What type of crime involves law enforcement pretending to be a child to catch predators?

    <p>Child enticement/exploitation</p> Signup and view all the answers

    Online gambling raises concerns about access for __________.

    <p>minors</p> Signup and view all the answers

    Match the following types of neo-traditional crime with their descriptions:

    <p>Child Pornography = Illegal visual depictions involving minors Online Gambling = Access to gambling services via the internet Child Enticement = Predatory behavior to lure minors Online Pharmacies = Purchases of medications online, both legal and illegal</p> Signup and view all the answers

    Which act makes online gambling illegal, but is difficult to enforce?

    <p>Internet Gambling Prohibition &amp; Enforcement Act of 2006</p> Signup and view all the answers

    Online pharmacies are only used for legitimate purchases.

    <p>False</p> Signup and view all the answers

    What is a common type of substance illegally purchased through online pharmacies?

    <p>Anabolic steroids</p> Signup and view all the answers

    During which era did viruses primarily target DOS machines?

    <p>Floppy Era</p> Signup and view all the answers

    Worms are primarily used to create DoS attacks.

    <p>True</p> Signup and view all the answers

    What type of malware makes digital resources inaccessible as part of extortion?

    <p>Ransomware</p> Signup and view all the answers

    The use of compromised computers linked to the Internet for attacks is known as a __________.

    <p>botnet</p> Signup and view all the answers

    Match the following malware types with their descriptions:

    <p>Virus = A program that replicates by inserting copies into other programs. Worm = A standalone malware that replicates without user intervention. Ransomware = Malware that restricts access to data in exchange for ransom. Spam = Unwanted electronic messages typically sent in bulk.</p> Signup and view all the answers

    Which malware type specifically infects documents and templates?

    <p>Macro Virus</p> Signup and view all the answers

    All spam is harmless and does not impact electronic messaging systems.

    <p>False</p> Signup and view all the answers

    What level of education may affect vulnerability to ransomware attacks?

    <p>Less educated individuals</p> Signup and view all the answers

    Which of the following is NOT a step in the money laundering process?

    <p>Discipline</p> Signup and view all the answers

    Frozing accounts is a strategy used to combat money laundering.

    <p>True</p> Signup and view all the answers

    What is the primary goal of layering in money laundering?

    <p>To obscure the origins of illicit funds</p> Signup and view all the answers

    The process of money laundering typically includes three stages: Placement, Layering, and __________.

    <p>Integration</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Placement = Point of entry of illicit funds Layering = Using networks to obscure origins of funds Integration = Return of funds to legitimate economy Frozing = Blocking access to financial accounts</p> Signup and view all the answers

    What is one accountability measure for Internet service providers regarding money laundering?

    <p>Maintaining adequate records</p> Signup and view all the answers

    Technology has no impact on the increase of computer crime.

    <p>False</p> Signup and view all the answers

    What role do financial institutions play in combating money laundering?

    <p>They are responsible for maintaining security and adhering to regulations.</p> Signup and view all the answers

    What is cyberstalking?

    <p>Repeatedly following or harassing someone electronically</p> Signup and view all the answers

    Cyberbullying is illegal in all states under federal law.

    <p>False</p> Signup and view all the answers

    What is a common method of online credit card fraud?

    <p>Skimming</p> Signup and view all the answers

    _____________ is characterized by intentional deception or misrepresentation to receive unwarranted compensation.

    <p>Online fraud</p> Signup and view all the answers

    Match the following illegal online practices with their examples:

    <p>Cyberstalking = Repeated harassment via electronic means Online Fraud = Nondelivery of goods in an auction Cyberbullying = Aggressive act using electronic contact Cyberharassment = Focusing on actual harm suffered</p> Signup and view all the answers

    Which of the following describes shill bidding?

    <p>Seller submitting bids to increase item price</p> Signup and view all the answers

    What type of communication does cyberharassment focus on?

    <p>Actual harm suffered</p> Signup and view all the answers

    Online auction fraud includes misrepresentation about the condition of an item.

    <p>True</p> Signup and view all the answers

    What is the primary tactic used in the salami technique of fraud?

    <p>Stealing fractions of a cent from numerous accounts</p> Signup and view all the answers

    ISP jacking involves disconnecting users from their selected Internet service providers to generate long distance charges.

    <p>True</p> Signup and view all the answers

    What is data diddling?

    <p>Fraud via data manipulation that often involves rerouting data representing financial transactions.</p> Signup and view all the answers

    _______ refers to the sale of stolen goods through technological means.

    <p>e-Fencing</p> Signup and view all the answers

    Match the following terms to their definitions:

    <p>Insider Trading = Using confidential information to make stock trades for personal gain Stock Manipulation = Dissemination of false information to influence stock prices IP Spoofing = Manipulating data packets to impersonate a third party Fraudulent Instruments = Counterfeiting and forgery using technology</p> Signup and view all the answers

    Which of the following describes web-cramming?

    <p>The unauthorized charging of consumers through telecommunication fees</p> Signup and view all the answers

    The insider trading practice is legal if the information is publicly available.

    <p>False</p> Signup and view all the answers

    What is the main characteristic of securities fraud?

    <p>Disseminating false information to trick individuals into buying stocks at inflated prices.</p> Signup and view all the answers

    Study Notes

    Web-Based Criminal Activity

    • Computer crime involves more than Internet-based activities
    • It includes financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety
    • Online crime includes interference with lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud, and ancillary crimes.
    • Examples of interference with lawful use of computers include eco-terrorism, DOS attacks, use of malware, cyber vandalism, cyber terrorism, spam, and etc.
    • Examples of theft of information and copyright infringement include industrial espionage, ID theft, and ID fraud.
    • Examples of dissemination of contraband or offensive materials include pornography, child pornography, online gaming, and treasonous or racist material.
    • Examples of threatening communications include, extortion, cyber stalking, cyber harassment, and cyber bullying.
    • Examples of fraud include auction fraud, credit card fraud, theft of services, and stock manipulation.
    • Examples of ancillary crimes include money laundering and conspiracy.

    Theft of Information, Data Manipulation, and Web Encroachment

    • Traditional methods of proprietary information theft can occur due to insiders, social engineering, theft of equipment, and malware.
    • Concerns about trade secrets and copyrights include having value independent of whatever owner produces and theft can come from disgruntled employees, competitors, and government entities.
    • Seriousness of political espionage includes FBI estimates that over 120 foreign governments have intelligence operations targeting the U.S.

    Cyber Terrorism

    • A deliberate, politically, or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target
    • Typical array of methods used against the U.S. Government include viruses and worms.

    Neo-Traditional Crime

    • Child pornography is difficult to define but refers to any visual depiction of a lascivious exhibition of the genitals or pubic area or sexually explicit conduct of a minor
    • Child pornography is illegal in all states and is prohibited by federal law making it legally difficult to prosecute.
    • Law enforcement has had great success with sting operations or "honeypots" by using the same strategy as predators of pretending to be a child and arranging for a meeting.
    • Online pharmacies are used to make legitimate and illegitimate purchases privately and conveniently
    • Ease of access for minors and open all day make online gambling popular
    • e-Banking making it easier to play and potential for billions in profit also contributed to online gambling popularity.
    • The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling illegal but it is difficult to enforce due to lack of public, international cooperation.
    • Web-Cramming is the unauthorized charging of consumers via monthly telecommunication fees.
    • ISP Jacking is disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers to generate long distance charges for those using dial-up.

    Fraud via Data Manipulation

    • Data Diddling is a method of fraud via data manipulation involving redirecting or rerouting data representing monies or economic exchanges.
    • The salami technique is a method of stealing a fraction of a cent from millions of accounts, designed to go undetected.
    • IP Spoofing is manipulation of data packets between computers to mimic a third party and falsely gain access to funds.

    Securities Fraud and Stock Manipulation

    • Instant access to stock values and statistics encourages day-trading, buying stock with little or no actual knowledge of the company
    • Dissemination of false information is used to trick individuals to purchase stock at inflated prices.
    • Insider trading involves individuals with access to confidential information unavailable to the public who use it to make stock purchases/sales, for personal gain.

    Ancillary Crimes

    • Money Laundering is an enterprise or practice of engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income.
    • Money Laundering is typically a critical element for organized crime.
    • Steps in the money laundering process include: placement, layering, integration.
    • Combating money laundering is accomplished by finding, freezing, and forfeiting.

    Conclusions

    • Technology both enhances and threatens modern society.
    • Computer crime is increasing due to computers being equivalent to storage warehouses, Increasing connectivity & interdependence of infrastructures, technical expertise being decreasingly important, increasing number of threat groups with sophisticated methodologies & advance technology, and government apathy.

    Web-Based Criminal Activity

    • Computer crimes are not limited to Internet-based activities but can include financial losses, threats to personal security, industrial espionage, and threats to international and public safety.
    • Online crime can include interference with lawful use of computers, such as eco-terrorism, denial of service (DoS) attacks, malware use, cyber vandalism, cyber terrorism, and spam.
    • Online crime can also include theft of information and copyright infringement, such as industrial espionage, ID theft, and ID fraud.
    • Dissemination of contraband or offensive materials, such as pornography, child pornography, online gaming, and treasonous or racist material is a common web-based crime.
    • Threatening communications like extortion, cyberstalking, cyber harassment, and cyberbullying are frequent crimes.
    • Online fraud such as auction fraud, credit card fraud, theft of services, and stock manipulation are other web-based crimes.
    • Ancillary crimes, such as money laundering and conspiracy, can be facilitated by the internet.

    Theft of Information, Data Manipulation, and Web Encroachment

    • Traditional methods of information theft can occur through insiders, social engineering, theft of equipment, and malware.
    • Trade secrets and copyrights are valuable forms of intellectual property subject to theft from disgruntled employees, competitors, and government entities.
    • Political espionage is a serious concern, with foreign governments targeting the U.S. for intelligence gathering.

    Cyber Terrorism

    • Cyber terrorism is a deliberate, politically or religiously motivated attack against data compilations, computer programs, and information systems.
    • The goal of cyber terrorism is to disrupt or deny service to a target or to acquire information that disrupts the social, physical, or political infrastructure of a target.
    • Common methods used in cyber terrorism include viruses and worms.

    Neo-Traditional Crime

    Child Pornography

    • It is challenging to define, but generally refers to any visual depiction of a lascivious exhibition of the genitals or pubic area or sexually explicit conduct of a minor.
    • It's difficult to prosecute due to potential First Amendment issues regarding freedom of speech.
    • It's illegal in all states and prohibited by federal law.

    Child Enticement/Exploitation

    • Law enforcement utilizes "honeypots" where officers pretend to be children to arrange meetings with potential predators.

    Online Pharmacies

    • Used for both legitimate and illegitimate purchases of substances like anabolic steroids, amphetamines, and painkillers.

    Online Gambling

    • Easy accessibility, including for minors.
    • Operates 24/7.
    • Facilitated by e-banking.
    • Potentially generates billions in profit.
    • The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal, but enforcement is challenging.

    Threatening and harassing communications

    • Cyberstalking: Willful, malicious, and repeated following or harassing another person via electronic means.
    • Cyberharassment: Focuses on the actual harm suffered, including defacement of character.
    • Cyberbullying: Aggressive, intentional acts carried out using electronic forms of contact repeatedly and over time against a victim who cannot easily defend themselves.

    Online Fraud

    • Intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification.
    • It affects people across various demographics.
    • It exists in various forms, including internet auction fraud and online credit card fraud.

    Internet Auction Fraud

    • Nondelivery of goods.
    • Misrepresentation of the condition of an item.
    • Addition of hidden charges (fee-stacking).
    • Shill bidding (where the seller submits bids to drive up the price).

    Online Credit Card Fraud

    • Skimming (installing devices to steal information from cards).
    • RFID (taking information from "wave and pay" devices).

    Ancillary Crimes

    Money Laundering

    • The practice of deliberately engaging in financial transactions to conceal the identity, source, and/or destination of income.
    • Crucial for organized crime to function.

    Process of Money Laundering

    • Placement (point of entry of illicit funds).
    • Layering (using networks to obscure the origins of funds).
    • Integration (return of funds to the legitimate economy).

    Combating Money Laundering

    • Finding, freezing, and forfeiting funds.

    Strategies Used to Combat Money Laundering

    • Holding Internet service providers accountable for not maintaining adequate records.
    • Making financial institutions responsible for insufficient security.
    • Enforcing "Know Your Customers" regulations.

    Conclusions

    • Technology enhances and threatens modern society.
    • Computer crime is increasing for various reasons, including:
      • Computers resembling storage warehouses of data.
      • Increased connectivity and interdependence of infrastructures.
      • Decreasing importance of technical expertise for committing crimes.
      • Rise in threat groups with sophisticated methodologies and advanced technology.
      • Government apathy.

    Malware Evolution

    • Malware has evolved through different eras, each with its own characteristics and impact.
    • The Classical Era (1960s-1970s): Primarily involved pranks or accidental distribution.
    • The Floppy Era (1980s-1990s): Targeted DOS machines and was disseminated mainly through floppy disks.
    • The Macro Era (1990s-2000s): Targeted documents and templates instead of programs.
    • The Internet Era (2000-present): Characterized by more sophisticated malware that exploits vulnerabilities in systems.

    Worms, DoS, and Botnets

    • Worms are used to facilitate large-scale DoS attacks.
    • DoS (Denial of Service) and DDOS (Distributed Denial of Service) Attacks: Overwhelm servers, often through mail-bombing.
    • Botnets and Zombie Armies: Compromised computers connected to the internet are used as a network (botnet) for theft, extortion, or DDOS attacks.

    Spam

    • Spam is the abuse of electronic messaging systems across multiple platforms, consuming resources.

    Ransomware

    • Ransomware is malware that makes digital resources inoperable or inaccessible, extracting payment from the victim.
    • Its effectiveness is influenced by user education (less educated users are more vulnerable) and the sophistication of the ransomware (some are not easily addressed by standard software remedies).

    Neo-Traditional Crime: Child Pornography

    • Child pornography involves visual depictions of sexually explicit conduct of minors.
    • It is difficult to define and prosecute due to First Amendment concerns about freedom of speech but is illegal in all states and prohibited by federal law.

    Neo-Traditional Crime: Child Enticement/Exploitation

    • Law enforcement utilizes "honeypots", posing as children to attract and apprehend predators.

    Neo-Traditional Crime: Online Pharmacies

    • Used to purchase both legitimate and illegitimate substances (anabolic steroids, amphetamines, painkillers).
    • Provide convenience and privacy for users.

    Neo-Traditional Crime: Online Gambling

    • Offers ease of access, including for minors.
    • It is available 24/7.
    • e-banking facilitates participation.
    • Generates significant profits.
    • The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal, but enforcing the law is difficult due to limited international cooperation.

    Neo-Traditional Crime: Threatening and Harassing Communications

    • Cyberstalking: Wilful, malicious, and repeated harassment via electronic means.
    • Cyberharassment: Focuses on the harm inflicted, including defamation of character.
    • Cyberbullying: Aggressive, intentional acts using electronic forms of contact, repeated over time against a victim who cannot easily defend themselves. It is illegal only in some states, not under federal law.

    Neo-Traditional Crime: Online Fraud

    • Intentional deception, misrepresentation, or falsehood for unwarranted compensation or gratification.
    • Covers a wide range of practices.

    Neo-Traditional Crime: Internet Auction Fraud

    • Nondelivery of goods.
    • Misrepresentation of the condition of an item.
    • Hidden charges (fee-stacking).
    • Shill bidding (seller submits bids to inflate the price).

    Neo-Traditional Crime: Online Credit Card Fraud

    • Skimming: Installing devices to steal card information (like at ATMs).
    • RFID (Radio Frequency Identification): Taking information from "wave and pay" devices.

    Neo-Traditional Crime: Web-Cramming/ISP Jacking

    • Web-Cramming: Unauthorised charging of consumers via monthly telecommunication fees.
    • ISP Jacking: Disconnecting users from their chosen internet service providers, redirecting them to illegitimate servers to generate long-distance charges.

    Neo-Traditional Crime: Fraud via Data Manipulation

    • Data Diddling: Any fraudulent method involving data manipulation.
    • Salami Technique: Stealing small amounts from numerous accounts to avoid detection.
    • IP Spoofing: Manipulating data packets to mimic a third party and gain access to funds.

    Neo-Traditional Crime: Securities Fraud and Stock Manipulation

    • Individuals with access to confidential information (insider trading) use it to gain an unfair advantage.
    • False information is disseminated to trick individuals into buying stock at inflated prices.

    Neo-Traditional Crime: e-Fencing and Fraudulent Instruments

    • e-Fencing: Sale of stolen goods online.
    • Fraudulent instruments: Counterfeiting and forgery using technology.

    Ancillary Crimes: Money Laundering

    • It involves concealing the source, identity, and/or destination of illegal income.
    • Placement: Putting illegal funds into the financial system.
    • Layering: Using networks to disguise the origin of funds.
    • Integration: Reintroducing funds into the legitimate economy.

    Ancillary Crimes: Combating Money Laundering

    • Finding: Identifying money laundering activities.
    • Freezing: Stopping transactions and holding accounts.
    • Forfeiture: Confiscation of funds.
    • Holding internet service providers accountable for inadequate record-keeping.
    • Holding financial institutions responsible for inadequate security.
    • Enforcing "Know Your Customers" regulations.

    Conclusions

    • Technology both enhances and threatens modern society.
    • Computer crime is increasing due to:
      • Computers being data warehouses.
      • Increasing connectivity and interdependence of infrastructures.
      • Decreasing technical expertise required.
      • Increasing number of threat groups with sophisticated methodologies and advanced technology.
      • Government apathy.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the vast realm of computer crime that extends beyond just Internet-related activities. This quiz examines the various forms of online crime including financial losses, threats to personal security, and the proliferation of harmful materials. Test your knowledge on topics such as cyber terrorism, industrial espionage, and online harassment.

    More Like This

    Cybercrime Study Notes Quiz
    10 questions
    Cybercrime and Computer Security
    28 questions

    Cybercrime and Computer Security

    WellManagedButtercup5958 avatar
    WellManagedButtercup5958
    Use Quizgecko on...
    Browser
    Browser