What is Computer cyber crime? | History of Cyber crime

Loading Blog...

The Criminal Playground - Computer Cybercrime

Criminal Playground.png Computer frauds or crimes take different patterns involving sabotage, revenge, vandalism, eavesdropping, theft, and also “data diddling", or the unauthorized altering of information before or after it is input into a computer system.

Computers now can be used to achieve crimes like credit card fraud, bank embezzlement, counterfeiting, and theft of confidential documents. The physical theft of a disk storing about 2.8 MB of diligent data is regarded as data theft.

Logging in a computer account with limited access and being caught there or deliberately leaving a trace of evidence in the form of a message with a description of what has now been done is an example of data diddling.

An employee traveling and leaving his or her laptop unattended while on the plane, only to find an empty drive slot to the tune of lost billing data, marketing plans, and client data, can be considered negligent, but this kind of incident is slowly increasing.

History of Computer Cybercrime.

History of Cybercrime.png

Another type of computer or cybercrime includes electronic funds transfer or embezzlement. The first person who was found guilty under the cybercrime Fraud and Abuse Act was Robert T. Morris Jr., who, as a Cornell, graduating student, launched a “worm” on the Internet. These “worms” float freely into the computer environment, striking programs such as viruses.

Some would even regard this as an act of vandalism. By multiplying, the worm interfered with nearly 6200 computers. Morris was found guilty and sentenced to three years’ probation, sanctioned to pay a $10,000 fine, imposed to perform 40 hours of community service, and required to pay $91 every month to cover his probation.

Computers can be used to play three (3) different roles in criminal or cybercrime activity. First, computers can also be targets of an offense; for instance, a hacker makes an effort to steal data from a computer or even to damage the computer from the computer network.

Other causes of this behavior involve the destruction of Web sites and the introduction of viruses into computer systems. Second, computers can be tools used in the commission of a traditional offense, for example, to produce and transfer child pornography.

##COMSEC solutions organized an engaging list where the computer was used as a means to facilitate the following crimes:

● Drug trade

● Illegal telemarketing

● Invoices

● Fraud, especially false Intellectual property theft

● “True face” or ID theft and misrepresentation industrial and national

● Espionage, both Conventional terrorism, and crimes crime

● Electronic terrorism Electronic stalking

● And

● Electronic harassment of ex-spouses

● Inventory of child

● Bookmaking

● Contract repudiation on the Internet Cannabis smuggling

● Date rape.

● Gang crimes, especially weapons violations

● Organized crime

● Armed robbery simulation

● Copycat crimes

● A Pyramid schemes

● DoS (denial of service) attacks Exposure or blackmail schemes

● Revenge and solicitation to the murder of spouses

● Hate crimes

● Web site defacement (automated)

Third, computers can be accidental to the offense, but still crucial for law enforcement purposes. For instance, several drug dealers store their records on computers, which brings up difficult forensic and evidentiary cases that are different from that of paper records.

Furthermore, a single computer could also be used in all three aspects. For example, a hacker might use his or her computer to gain unauthorized access to an Internet service provider (“target”) such as America Online

And then obtain that access to illegally dispense(“tool”) copyrighted software stored on the ISP’s computer-network hard drive (“incidental”). COMSEC Solutions organized another engaging list where the computer was an incidental part of cybercrime.

These involved hacking, diddling, alteration data theft, and damage, mostly affecting financial or medical records, spreading viruses or malicious code, abuse of credit and also business data, theft of services, and finally, denial of service Internet service providers (ISPs) and some other large financial companies are not the only companies that should be worried about cybercrime.

How hackers can attack you?

How hackers can Attack.png Hackers may damage an individual directly or through the individual’s ISP by compromising the confidentiality and value of personal and financial data.

In another case, a hacker from Germany can gain full control of an ISP server in Miami and capture all the credit card information retained about the service’s subscribers.

The hacker then threatened to damage the system and publicize all the credit card numbers unless the ISP paid a ransom fee.

German police caught the hacker when he tried to receive the money. Had he been silent, he may have used the stolen credit card numbers to dupe thousands of people.

The government keeps records, such as any other records, which can be vulnerable to a network attack if they are stored on a networked computer system without any decent protections.

In Seattle, two hackers caught pleaded guilty to infiltrating the U.S. District Court system, an intrusion that granted them access to personal and even sealed data. In executing their attack, they make use of supercomputers at the Seattle-based Boeing Computer Centre to crack through the courthouse system’s password file.

If Boeing had not recorded the intrusion to law enforcement, the district court system administrator may have not known that the system was endangered. 14 The computer could also be a powerful device for cybercrime. The

The Internet can empower a con artist with an outstanding skill to reach millions of possible victims. As far back as December 1994, the Justice Department sued two individuals for fraud and cybercrime on the Internet. Among other things, these individuals had set advertisements on the Internet promising people precious goods upon payment of money.

But the victims never had access to the goods and never planned to deliver them to their victims. So both individuals pleaded guilty to wire fraud.

15 Computers can be utilized to engage in new and different types of customer fraud never before possible. In one interesting case, two hackers in Los Angeles pleaded guilty to computer crimes committed to ensuring they would win prizes given away by local radio stations. When the stations said that they would award prizes to a specific caller-for instance, the ninth caller the hackers used the local

Telephone switching network to make sure that the winning call was theirs. Their prizes included two Porsche cars and $30,000 in cash. Both miscreants get a substantial jail term, 16 In another intriguing case that pushes novel issues, a federal court in

New York permitted the Federal Trade Commission’s request for a temporary restraining order to shut down an alleged scam on the World Wide Web. Following the FTC’s complaint, people who toured through X-rated Web sites were told that they had to download a different computer program to help them view the sites.

Without them having any idea, the program discreetly rerouted all their phone calls from their local Internet provider to another phone number in Moldova, for which charges of about 2 dollars a minute could be charged. Following the FTC, more than 800,000 minutes of calling time were billed to U.S. based customers,

How to address Internet crimes?

How to address Internet Crimes.png

Internet crimes can be addressed proactively and reactively.

Defrauding activity over the Internet, like other manners of crimes, can be hindered to some extent by improving consumer education.

People always bring the same common sense to bear on their judgments in cyberspace as they do in the real world. They should have known that a World Wide Web site can be developed at a considerably low cost and can look truly reputable even though it is not.

The user may invest time and energy to inspect the legality of parties with whom they communicate over the Web. Just as with other client transactions, we should be careful about where and to whom we provide our credit card numbers. The valid maxim caveat emptor (“let the customer beware”), which takes us back to.

The early sixteenth (16) century applies with full force in the computer age. The world can also be protected and secured by vigorous law enforcement. Many customer-oriented cybercrimes, like fraud or harassment, can be sued using traditional statutory tools, for example, wire fraud.

Congress substantially strengthened the laws against computers and also cybercrime in the National Information Infrastructure Protection (NIIP)Act of 1996. The law includes 11 different provisions designed to protect and secure confidential and personal data integrity, and the availability of information and systems

You May Also Read This:


5 Ways to Proof Your Software Strategy

Free Copy

We have used and learned these strategies by working and scaling over 40+ startups and business. These are the ways which is mostly the problem unidentified in major products leading them to either user failure or market failure. Get it before your competition gets it.