Sei sulla pagina 1di 1

Cyber Crimes

Cybercrimes are criminal acts that use the computer or Internet. These types of crimes are prevalent in modern
technological society and are becoming more high profile as a greater number of serious crimes are committed. The U.S.
Department of Justice recognizes three types of cybercrimes: those that use the computer as a weapon; those that use
the computer as an accessory to a crime; or those that make the computer a target of a crime. Most crimes are
traditional in nature and use a computer or the Internet to break the law.

Identity Theft Identity theft involves stealing an individual’s personal information, then using that
information to either use their financial resources without their consent, or to open new financial or credit accounts,
enabling the identity thief to use the victim’s credit without their knowledge. Information commonly stolen to make
these crimes possible include the individual’s name, date of birth, social security number, and/or credit card numbers.

Phising/Spoofing Unlawfully accessing a computer without authorization and sending multiple e-mails; resending
multiple commercial email messages with the intent to deceive recipients; or falsifying header information in multiple
email messages.

Blackmail/Extortion Using the Internet to threaten to cause damage with the intent to extort from any
person any money or other thing of value.

Fraud
In the digital age, many criminals easily commit fraud against unsuspecting victims by misrepresenting the facts. For
example, an employee intentionally inputs false information into the company database or intranet. Or consider the
"Nigerian prince email," where an online predator attempts to steal money from targeted consumers by gaining access
to a shared bank account.

Illegal Gambling Engaging in the business of betting or wagering on any sporting event or contest over the
Internet.

Computer Viruses
Computer hackers are digital age criminals that can bring down large infrastructures with a single keystroke emitting a
computer virus. The most common way for the makers of computer viruses to propagate their virus programs is to
attach or embed them in emails. When the email is opened, the virus activates and does whatever it was programmed
to do, such as steal valuable hard drive disk space, destroy data on the recipient’s computer, access personal
information, or to send information (or itself) out to other computers using the original victim’s contact list.
Prostitution Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in
prostitution.

Criminal Copyright Infringement Infringing a copyright for financial gain...or by distributing a work being
prepared for commercial distribution on a computer network.

Cyberbullying
Cyberbullying occurs when someone uses the internet, a cell phone, email, instant messaging, chat rooms, or social
networks, such as Facebook and Twitter, to harass, demean, embarrass, or intimidate someone else. It is commonly a
crime committed by kids and teens, as their growing access to electronic communication makes it possible to make fun
of or ostracize others. The problem spreads like wildfire as the bully can hide behind the anonymity of a login identity,
while encouraging other kids to join in the “fun” of harassing the victim.

Potrebbero piacerti anche