Monday, June 3, 2019
Identity Theft And Phishing As Cybercrimes Criminology Essay
Identity Theft And Phishing As Cyber horrors Criminology EssayCybercrimes can be defined as criminal activities which pass water place or occur within cyberspace. These crimes be common and ever increasing as cybercriminals continue to find new ways of taking receipts of unwary internet users (Mitchell, 2010). A frequently practiced form of cybercrime includes individuation thieving, which is the use of an individuals private details without their knowledge or approval (Ombudsman for Banking Services, 2009). This essay willing discuss phishing as a form of identity theft with the use of various articles as examples to enhance the to a lower placestanding of identity theft and phishing as cybercrimes. In addition, a criminological theory will be applied to identity theft in order to progress further insight into this particular cybercrime. defining CybercrimeCybercrime is used gener al acey to describe a variety of illegal offences of which only a few are specifically associa ted with computers and the telecommunications infrastructure that supports their use. This specific crime figure involves the utilization of digital technologies in the task of the offence or is specifically directed at computing and communications technologies, or is incidental to the commission of early(a) crimes (Smith et al. 20047).Identity theft and phishing can be described as forms of cybercriminal activity. These crimes are defined as hybrid crimes. Hybrid crimes are those which can exist online as well as offline. Specifically, these crimes work with the worldwide scope that cyber environments provide (Muncie et al. 201077).Currently, cybercrime is an extremely profitable business and will no doubt continue to be for a genuinely long fourth dimension. The main reason for this is because many plenty are not aware of how rife it is and of how susceptible they are to the threat of this crime. The best practical way that consumers and corporations can protect themselves f rom cybercrimes and cybercriminal activity is to alert themselves and those around them with the use of awareness campaigns and besides, people should make sure that their systems are protected with Anti-Malware and Anti-Virus software kits which consecrate precise virus definition and regular software updates to decrease the risk of being under threat of cybercriminal activity (Microz unmatchableg, 2009).Identity TheftIdentity theft is defined as a crime that happens when someone wrongfully gains access to and uses the personal info of another individual in a way that involves invention or dishonesty. Usually, this crime is carried out in order to gain access to an individuals personal funds. Victims of identity theft normally become aware when they note that they are frequently being charged for items that they never purchased, or when they realise that there has been an opening of a new recognition card after viewing their credit reports (Jasper, 20061).Annually, 10 million consumers are the victims of identity theft. There are many ways in which cybercriminals can obtain an individuals personal information, and these are generally very cleverly disguised. Criminals can intercept personal information that is freely shared over the mesh and can also easily obtain information such(prenominal)(prenominal) as the victims account details by emailing them and falsely acting as their bank (Jasper, 20061-3).Because of the fact that individuals are so afraid that they will fall guttle to cybercriminals, at times they do not think rationally when asked for their personal details. When provided the chance of being able to protect themselves, individuals will willingly give all the details needed if the bank requires them to do so. Thus, cybercriminals do not find it immensely difficult to obtain all the beneficial information that they need.Some examples of identity theft crimes are the run-up of costs on the victims credit cards, opening a new credit card acco unt making use of the victims name, stemma date and social security add up, establishing a telephone or wireless facility using the victims name, opening a bank account and writing wondering(a) cheques on the account and obtaining employment by making use of the victims personal identity (Jasper, 20063-4).Phishing as a CybercrimePhishing is a form of identity theft which includes the unimportant endeavour to gain the personal details of an individual with the use of text messages and emails. The criminal will act as the victims bank, for example, and will request personal information from the consumer (such as the PIN number) in order to gain access to the funds in the account. (Ramsamy, 2009)As explained before, the consumer makes it easy for the cybercriminal to gain access to their personal funds and resources as they are so adamant on keeping themselves safe from cybercrime that they very readily give out their information without thinking sensibly.Cases of CybercrimeOver th e years, cybercrime has become much more(prenominal) frequent in nature. These cuticles can be found occurring throughout the world, and will probably continue to occur for a very long time as it is such a profitable business (microzoneg, 2009).Theft of Virtual CharactersIn the month of November 2009, a man was arrested for slueing virtual characters from a network based role-playing game. The man apparently obtained the log-in information for Runescape, reportedly the worlds largest multi-player online game, to embezzle their virtual characters. The article, published in The Times, states that the man who is from Avon and Somerset Area had already had a number of computer mistreatment offences on his criminal record (Ahmed, 2009).These types of crimes do occur quite often, as a similar case occurred in the Netherlands in 2008. Reportedly, a group of fourteen and fifteen year olds were convicted for the assault of a fellow Runescape player. The boys had threatened the player wit h a knife, pressuring him to give them a mask and an amulet within the game (Ahmed, 2009).Online gaming seems to be the cause of a lot of recent violent behaviours amongst youth, and the stealing of virtual characters may not seem to be such a tremendous crime, but thinking of all the time and effort that has been put into creating that specific character, this crime shouldnt be, according to Mark Gerhard, the chief executive of Jagex Games, handle differently to the theft of any other valuable possessions (Ahmed, 2009).Credit and Debit Card Information HackingsAnother case of cybercrime was highlighted in May 2008, when a Mr Albert Gonzalez was arrested for one of the largest hackings in all of US history. The computer hacker aided with the theft of tens of millions of credit card numbers from major retailers (AP, 2009). He is reportedly going to be spending mingled with 17-25 years behind bars as a result of the seriousness of this criminal offence.Gonzalez did, however, confirm that he had used a number of drugs and consumed large quantities of alcohol preceding his arrest. He admitted to using various narcotics such as marijuana, LSD and cocaine and he has also been said to have behavioural patterns which are very consistent with that of Aspergers Syndrome, which is a form of autism (AP, 2004).According to Dr Barry Roth, a member of the defence commission, Albert was an internet addict who was often associated with awkwardness, had troubles when it came to connecting with people and had an odd neutering with machines and technology in general (AP, 2009).Because drugs and alcohol are so often associated with violent behaviour and aggressiveness, it can be said that they warp the minds of many people and cause them to do things that generally are not expected of them. Since Albert Gonzalez did make use of drugs and alcohol frequently, it could perhaps be said that it caused him to become fixated with technological things and the Internet specifically beca use it also gave a sense of escaping reality and, since alcohol causes people to believe they can do anything, could have led Albert to believe that he could steal money and still get away with it. With all crimes, the psychological and behavioural background of the offender needs to be taken into consideration.Military Computer HackingIn 2002 a man named Gary McKinnon was arrested for what is described as the grea scrutiny military computer hack of all time (The sunlight Times, 2009). McKinnon was allegedly blamed for $700,000 of destruction when he hacked into 97 military computers at the Pentagon and NASA and stole 950 passwords, as well as erased files from the Earle naval armaments post in New Jersey.McKinnon stated in an interview to The sunlight Times that he had not meant for the hackings to seem malicious, but that he was simply curious and wanted to find out information about UFOs. He also openly admitted that he sees himself as a nerd and a loner and that he used to dri nk beer and smoke dope while hacking into the military systems (The Sunday Times, 2009).This perception of himself could arise from the fact that Gary has Aspergers syndrome. This syndrome does not affect the mental intelligence of the person because the diseased person is in fact very intelligent, but it does leave the sufferer feeling uncomfortable in social situations (The Sunday Times, 2009).This crime could leave Gary McKinnon spending 60 years in prison, which is a very high worth to pay for simply being curious. Due to the fact that he has Aspergers syndrome and often resorts to drinking and smoking marijuana, it could be assumed that perhaps these elements wrongfully influenced him to engage in illegal activities, and in addition with his illness could have made matters even worse. Perhaps, due to his loneliness and inability to socialise, he resorted to finding company with the Internet and hacking to gain information that interested him.The Role of Gender in CybercrimeGen erally, males are known to display higher rates of abnormal behaviour as compared to females. Although small, the gap between the rates of male and female criminal behaviour is constant. Historically, most forms of crime such as violence, aggressiveness, and freedom of speech were carried out by men, but with the case of cybercrime we cannot simply state that males perform these criminal activities more than females because there is not enough evidence of this it has not been explored to a very great extent. However, a test done by a few undergraduate students concludes that existing theories of crime may apply similarly to males and females in predicting digital crimes (Morris, 2009393-404).Criminological Theory utilize to CybercrimeA criminological theory that can be applied to the act of cybercrime is the theory of Routine Activities. This theory states that criminal actions take place when there is an product of space and time of a stimulated criminal, a desirable target and a n absence of competent supervision (Cullen, 2002).The two important people who were responsible for the scheme of this theory are Larry Cohen and Marcus Felson in 1979. Their theory is very strongly related to that of the Rational Choice theory. This is because both theories concentrate on the features of the crime as unconnected to the features of the offender (DeMelo, 1999).The Routine Activities theory states that offences are linked to the nature of everyday patterns of social interaction (DeMelo, 1999). Felson and Cohen believed that changes in society had and is still leading to social disarrangement and thus to broader crime opportunities (DeMelo, 1999).In the cases of the cybercriminals, Albert Gonzalez, Gary McKinnon and the virtual character thief, this criminological theory is applied very well. They had begun their cybercrimes (hackings) with enthusiasm and determination, had found attractive targets to fulfil their desires, and had no one to tell them that it was wro ng, illegal and could get them into a lot of trouble.ConclusionTherefore, it is quite clear that cybercrime is a rather serious crime and is continuing to increase in frequency as time goes by and society constantly changes. Also, the nature of these crimes is becoming more and more violent, especially amongst the youth of our world. Societies need to become more self-disciplined, and both offenders and victims need to be more aware of the dangers and consequences of these criminal behaviours, especially phishing and identity theft. Phishing and identity theft as forms of cybercrime can be classified under the Routine Activities criminological theory as they rise in frequency as society changes and a disorganised society opens up greater crime opportunities for offenders. Cybercrimes should not be taken lightly, and if not dealt with correctly, will continue to be on the rise for many years to come.Word Count 2088
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment