Cybercrime - an overview

Electronic Deception:
An Overview of Crime on the Internet


(1) What is it? | (2) How can it be reported? | (3) Will it ever stop?


What is it?

Banking. Shopping. Stock market trading. Paying bills. Entertainment. Education. What do all of these things have in common? For the purposes of this report, one general likeness will be identified: all of the items listed are being achieved in growing numbers on the internet. This 1999 Christmas season is seeing record numbers of online shoppers, with more people waiting on their modem connection instead of waiting in long lines at the mall. The modern consumer demand for information technologies has pushed business and industry to higher levels (Salvaggio, 1989). But with the convenience has come some unexpected problems that we all understand in the "real world". Year after year, law enforcement officials increase warnings to shoppers about the high risk of theft and burglary around the holidays. "Always park in a lighted area," they say, "and put packages in the trunk where they are out of sight." That may work fine in the physical world, but unfortunately it will not guard against the newest form of criminal deception: cybercrime. It is variously referred to as "computer misuse, computer abuse, crimes in cyberspace . . . high-tech crime, and crime on the Internet" (Lingamneni, 1997).

Cybercrime can affect almost anyone that uses the internet, although the expanding amount of business conducted online (which is also called e-commerce) may further increase the risk. Society's expanding technology is largely dependent on internet communications, and criminal "hackers" are able to take advantage of some internet users. The label of a "hacker" refers to a person that can access or enter internet websites (and the information contained therein) without authorization. This task is usually accomplished through a variety of illegal actions or codes called "cracks".

With the information presented so far, the following question might arise: what types of crime can be pulled off over the internet, and who are the victims? The fact is that cybercrimes can exist in various forms; specifically, they can be committed against persons, property, or the government (UDSL, 1999). Here are some examples of each, with detailed examples following:

Cybercrimes against persons: Harassment or threats via e-mail, chat forums, or newsgroups belong in this category. E-mail viruses have been on the rise lately, with a new warning every few weeks. Any other electronic correspondence that causes a person to fear for his/her safety outside cyberspace is a concern.

Cybercrimes against property: These offenses can be surprisingly traditional in nature, including theft, fraud, forgery, and mischief. Specifically, electronic property can be taken advantage of through "computer break-ins, software piracy/computer theft, password sniffers, spoofing, credit card and other computer fraud" (Lingamneni, 1997; CLC, 1999). The most common of these crimes is most likely when individuals refuse to register and pay for shareware programs, there are indeed committing a cybercrime.

Cybercrimes against government: Hacking into a military or government website (which can contain confidential information) is the most likely offense in this category. But newer issues include industrial espionage, the distribution of child pornography (a federal crime), and other electronic terrorism (CLC, 1999).

It is important to realize that some of the most visible forms of internet crime may also be the easiest to avoid. Anyone that uses the internet regularly knows that there are an increasing number of online "cyberstores", selling everything from groceries to home electronics. As a result, more and more credit cards are being used as the preferred electronic buying power. Cybertheft can result not when a hacker steals your merchandise, but your credit card number. It can then be used to make other online purchases without the owner's knowledge. To avoid this type of crime, many websites now use encryption; this ensures that credit card numbers, passwords, and other electronically transmitted information cannot be identified by someone that has broken into the site. But cyberfraud still exists, and ways to avoid becoming a victim will be discussed in later sections of my report.

It is important to remember that victims of cybercrime can be affected in other non-monetary forms. Child pornography and other obscene material, cyberharassment, and cyberstalking are all examples of this. In these situations, e-mail and chat rooms meant for business and social activities can become forums filled with threats and other unsolicited material. Finally, cyber-terrorism can criminally affect the government, simply by using a computer. Military secrets and strategies, along with other federally confidential material, is just waiting to be revealed to the person that can sneak through the electronic barrier. In the next sections, reactions to these cybercrimes will be discussed; assuring future prevention of the same offenses is the best way to combat the growing problem.

Continue on to section 2: How can cybercrimes be reported?


Section 1 References