.

Saturday, March 30, 2019

Identity Theft And Phishing As Cybercrimes Criminology Essay

Identity theft And Phishing As Cybercrimes Criminology EssayCybercrimes layabout be defined as execrable activities which hold in place or occur at bottom cyberspace. These crimes ar common and ever increasing as cyber poisonouss continue to find mod ways of taking advantage of unguarded internet expendrs (Mitchell, 2010). A frequently practiced form of cybercrime includes identity theft, which is the map up of an individuals private details without their know conductge or approval (Ombuds while for Banking Services, 2009). This essay result discuss phishing as a form of identity theft with the use of various articles as examples to enhance the understanding of identity theft and phishing as cybercrimes. In humanitarian, a criminological theory will be apply to identity theft in order to gain further penetration into this particular cybercrime.Defining CybercrimeCybercrime is used generally to describe a diverseness of illegal offences of which only a few are specific ally associated with data processors and the tele communication theory theme that supports their use. This specific crime type involves the utilization of digital technologies in the depute of the offence or is specifically directed at computing and communications technologies, or is incidental to the commission of other crimes (Smith et al. 20047).Identity theft and phishing feces be draw as forms of cybercriminal activity. These crimes are defined as hybrid crimes. Hybrid crimes are those which grass exist online as well as offline. Specifically, these crimes work with the worldwide scope that cyber environments provide (Muncie et al. 201077).Currently, cybercrime is an extremely remunerative melodic line and will no doubt continue to be for a real long clip. The main reason for this is because umteen people are non cognisant of how rife it is and of how susceptible they are to the threat of this crime. The best accomplishable way that consumers and corporations can protect themselves from cybercrimes and cybercriminal activity is to alert themselves and those around them with the use of awareness campaigns and overly, people should make sure that their systems are protected with Anti-Malware and Anti-Virus software kits which have precise virus definition and regular software updates to authorise the risk of being under threat of cybercriminal activity (Microz singleg, 2009).Identity TheftIdentity theft is defined as a crime that happens when soulfulness wrongfully gains access to and uses the personal learning of a nonher individual in a way that involves fraud or dishonesty. Usually, this crime is carried out in order to gain access to an individuals personal coin. Victims of identity theft usually last aware when they note that they are frequently being supercharged for items that they never purchased, or when they realise that there has been an initiation of a new credit government note after viewing their credit reports (Jasp er, 20061).Annually, 10 trillion consumers are the victims of identity theft. There are many a(prenominal) ways in which cybercriminals can obtain an individuals personal information, and these are generally very vigorously disguised. Criminals can intercept personal information that is freely shared everywhere the Internet and can also easily obtain information such(prenominal) as the victims bill details by emailing them and falsely acting as their bank (Jasper, 20061-3).Because of the fact that individuals are so afraid that they will fall prey to cybercriminals, at beats they do not think rationally when asked for their personal details. When provided the chance of being able to protect themselves, individuals will willingly give all the details wishinged if the bank requires them to do so. Thus, cybercriminals do not find it immensely difficult to obtain all the undecomposed information that they need.Some examples of identity theft crimes are the run-up of be on the v ictims credit cards, opening a new credit card account making use of the victims name, birth date and social surety number, establishing a telephone or wireless facility using the victims name, opening a bank account and writing bad cheques on the account and obtaining employment by making use of the victims personal identity (Jasper, 20063-4).Phishing as a CybercrimePhishing is a form of identity theft which includes the deceitful attempt to gain the personal details of an individual with the use of text messages and emails. The criminal will act as the victims bank, for example, and will request personal information from the consumer (such as the PIN number) in order to gain access to the currency in the account. (Ramsamy, 2009)As explained before, the consumer makes it easy for the cybercriminal to gain access to their personal funds and resources as they are so adamant on keeping themselves preventive from cybercrime that they very readily give out their information without t hinking sensibly.Cases of Cybercrime over the days, cybercrime has become much more frequent in nature. These human faces can be found occurring throughout the world, and will probably continue to occur for a very long time as it is such a profitable business (microzoneg, 2009).Theft of Virtual CharactersIn the month of November 2009, a man was arrested for stealing virtual characters from a web based role-playing game. The man seemingly obtained the log-in information for Runescape, reportedly the worlds largest multi-player online game, to embezzle their virtual characters. The article, published in The times, states that the man who is from Avon and Somerset Area had already had a number of computing device mistreatment offences on his criminal record (Ahmed, 2009).These types of crimes do occur sooner practically, as a similar case occurred in the Netherlands in 2008. Reportedly, a multitude of fourteen and fifteen year olds were convicted for the assault of a fellow Rune scape player. The boys had jeopardize the player with a knife, pressuring him to give them a mask and an amulet within the game (Ahmed, 2009).Online gaming seems to be the cause of a lot of fresh violent behaviours amongst youth, and the stealing of virtual characters may not seem to be such a tremendous crime, but thinking of all the time and effort that has been put into creating that specific character, this crime shouldnt be, according to Mark Gerhard, the gaffer executive of Jagex Games, treated differently to the theft of any other invaluable possessions (Ahmed, 2009).Credit and Debit Card Information HackingsAnother case of cybercrime was highlighted in May 2008, when a Mr Albert Gonzalez was arrested for one of the largest hackings in all of US history. The computer hacker aided with the theft of tens of millions of credit card numbers from study retailers (AP, 2009). He is reportedly going to be spending between 17-25 years behind bars as a result of the seriousness o f this criminal offence.Gonzalez did, however, confirm that he had used a number of drugs and consumed large quantities of alcoholic drink preceding his arrest. He admitted to using various narcotics such as marijuana, lysergic acid diethylamide and cocaine and he has also been said to have behavioural patterns which are very consistent with that of Aspergers Syndrome, which is a form of autism (AP, 2004).According to Dr Barry Roth, a piece of the defence commission, Albert was an internet addict who was often associated with awkwardness, had troubles when it came to connecting with people and had an odd fixing with machines and technology in general (AP, 2009).Because drugs and alcohol are so often associated with violent behaviour and aggressiveness, it can be said that they warp the minds of many people and cause them to do things that generally are not expect of them. Since Albert Gonzalez did make use of drugs and alcohol frequently, it could perhaps be said that it caused h im to become fixated with technological things and the Internet specifically because it also gave a sense of escaping human race and, since alcohol causes people to believe they can do anything, could have led Albert to believe that he could steal money and still get away(p) with it. With all crimes, the psychological and behavioural background of the offender needs to be interpreted into consideration.Military Computer HackingIn 2002 a man named Gary McKinnon was arrested for what is described as the greatest legions computer hack of all time (The sunlight Times, 2009). McKinnon was allegedly blamed for $700,000 of destruction when he hacked into 97 armed services computers at the Pentagon and NASA and stole 950 passwords, as well as erased files from the Earle naval armaments domiciliate in New Jersey.McKinnon stated in an interview to The Sunday Times that he had not meant for the hackings to seem malicious, but that he was simply remaining and wanted to find out informatio n about UFOs. He also openly admitted that he sees himself as a nerd and a lone hand and that he used to drink beer and smoke dope while hacking into the military systems (The Sunday Times, 2009).This perception of himself could arise from the fact that Gary has Aspergers syndrome. This syndrome does not affect the mental intelligence of the person because the sufferer is in fact very intelligent, but it does leave the sufferer feeling uncomfortable in social situations (The Sunday Times, 2009).This crime could leave Gary McKinnon spending 60 years in prison, which is a very high price to pay for simply being curious. repayable to the fact that he has Aspergers syndrome and often resorts to drinking and smoking marijuana, it could be anticipate that perhaps these elements wrongfully influenced him to engage in illegal activities, and in addition with his illness could have made matters even worse. Perhaps, due to his loneliness and softness to socialise, he resorted to finding c ompany with the Internet and hacking to gain information that provoke him.The Role of Gender in CybercrimeGenerally, males are known to display high range of abnormal behaviour as compared to females. Although small, the gap between the rates of male and female criminal behaviour is constant. Historically, most forms of crime such as violence, aggressiveness, and freedom of speech were carried out by men, but with the case of cybercrime we cannot simply state that males perform these criminal activities more than females because there is not enough evidence of this it has not been explored to a very great extent. However, a test done by a few undergraduate students concludes that alive theories of crime may apply similarly to males and females in predicting digital crimes (Morris, 2009393-404).criminological Theory Applied to CybercrimeA criminological theory that can be utilise to the act of cybercrime is the theory of casual Activities. This theory states that criminal actio ns take place when there is an intersection of space and time of a touch on criminal, a desirable target and an absence of competent supervision (Cullen, 2002).The deuce important people who were responsible for the proposal of this theory are Larry Cohen and Marcus Felson in 1979. Their theory is very strongly related to that of the Rational Choice theory. This is because both theories concentrate on the features of the crime as opposed to the features of the offender (DeMelo, 1999).The Routine Activities theory states that offences are linked to the nature of everyday patterns of social fundamental interaction (DeMelo, 1999). Felson and Cohen believed that changes in society had and is still leading to social disorganisation and thusly to broader crime opportunities (DeMelo, 1999).In the cases of the cybercriminals, Albert Gonzalez, Gary McKinnon and the virtual character thief, this criminological theory is applied very well. They had begun their cybercrimes (hackings) with ent husiasm and determination, had found attractive targets to fulfil their desires, and had no one to tell them that it was wrong, illegal and could get them into a lot of trouble.ConclusionTherefore, it is quite clear that cybercrime is a rather serious crime and is continuing to addition in frequency as time goes by and society unendingly changes. Also, the nature of these crimes is becoming more and more violent, especially amongst the youth of our world. Societies need to become more self-disciplined, and both offenders and victims need to be more aware of the dangers and consequences of these criminal behaviours, especially phishing and identity theft. Phishing and identity theft as forms of cybercrime can be classified under the Routine Activities criminological theory as they rise in frequency as society changes and a disorganise society opens up greater crime opportunities for offenders. Cybercrimes should not be taken lightly, and if not dealt with correctly, will continue to be on the rise for many years to come.Word Count 2088

No comments:

Post a Comment