Introduction
Several past decades have been characterized by a rapid increase in availability and the level of development of computer technology. The increased availability of both computer technologies and information about them called forth the development of such forms of criminal activities as computer fraud and computer crime. Rapid developments in new technologies call forth difficulties related to defining the terms “computer crime”. According to C.Franklin (2006), computer crime is the one, which uses or focuses on a computer for the purposes of criminal act. (p.8). Such synonyms as digital crime or cybercrime can be also used. The list of cybercrimes’ types is constantly expanding due to new technologies’ development. In terms of this presentation I will cover most common types of computer crimes, as well as emphasize the ones, which are likely to develop in nearest future.
Computer fraud
Computer fraud is one of most rapidly expanding forms of computer crime. Computer fraud is also commonly associated with the usage of the Internet. It is defined as any type of fraud scheme, being based on the usage of one of more Internet components, such as e-mail, chat rooms and websites in order to launch fraudulent transactions or transmit the proceeds of the activities under study to financial institutions or other institutions (people), connected with the scheme ( U.S. Department of Justice, 2013). Multiple types of computer fraud exist. For instance, so-called business (employment) schemes are based on freight forwarding, counterfeit check schemes and identity theft. Citizens usually encounter counterfeit check schemes (using fraudulent cashier’s checks or corporate checks in order to pay for a merchandise) and credit/debit card fraud (an unauthorized use of a credit/debit card in order to obtain money or property in a fraudulent way), as well as non-delivery of merchandise, which were purchased by individuals online, and never delivered. Other wide-spread of Internet fraud include advance fee fraud schemes, investment fraud and pyramid schemes. These forms usually preclude that victims voluntary give money out due to the fraud.
Phishing
Phishing is sometimes referred to as a form of computer (Internet fraud), but more often it is considered to constitute a separate group of crimes, associated with identity theft. Phishing is a form of online identity theft, using emails to trick individuals into fraudulent websites, which aim at tricking visitors into divulging personal and financial data, such as credit cards’ numbers, social security numbers and account s and passwords (Anti-Phishing Working Group, 2013). Criminals usually commit phishing, using identity of online stores and other websites, which may require some personal data to be filled in.
Computer theft crimes
Computer crimes, which involve theft, are very diverse. This type of computer crimes may be defined as the one related to gaining access or removing property items with the help of electronic resources. Such property items may include not only money and immovable items, but programs, data and even computer time. Theft-related (or so-called accompanying) crimes may include altering computer input without authorization or unauthorized use of computer resources. One of most prominent and well-known forms of computer theft crime is computer piracy. Piracy is viewed as the act of duplicating material under copyright without authorization. According to Stamatellos (2007), piracy may manifest itself in four major forms, which are Internet piracy (when the copyrighted material is being exchanged or downloaded illegally via the Internet), disreputable reselling (illegal items are being purchased by dishonest manufacturers lacking relevant documentation and copyright agreements), end-users’ copying material (items are being illegally copied for free or at reduced price) and counterfeiting (material is being copied and distributed at a large scale with wide usage of duplication technologies, e.g., CDs and DVDs burners) (p.46). Modern forms of piracy may include using scanners in order to transform paperbacks into electronic form and social nets in order to share them at no cost. The economic impact of piracy on a range of markets is tremendous. Wide-spread usage of pirated software is of great danger for computer users due to the fact that the software may lack key elements and documentation; disks may be infected with viruses, and if items are used by corporate entities, a significant responsibility-related risk arises.
Unauthorized access
As well as being often qualified as separate type of computer crime, unauthorized access tends to serve a prerequisite for many types of computer crimes. This crime can be committed both with regard to personal computer of an individual or at workplace. The most well-known form of unauthorized access is hacking. It can be defined as the act of gaining an unauthorized access to computer or network, as well as making use of such an unauthorized access. Complexity of dealing with hacking is related to the fact that the proponents of hacking tend to view it as socially positive way of behavior, designed in order to create a possibility for new things to enter the world and be accessed by a wide range of end users (Jordan, 2008, p.7). Combating hacking means not just combating sole offenders or small groups, but opposing well-organized communities of crackers. Another significant danger of hacking lies in the fact that gaining an unauthorized access to particular computers may result in disclosure of data, which are to be protected, or blackmailing individuals and entities due to having gained access to their data.
Denial of service
A denial of service attacks are being targeted in order to prevent a legitimate user of service from having access to this service. This aim can be reached through different means, including overloading the services, changing related data configurations, as well as making connection physically unavailable. Crimes of this type are likely to be committed against large corporate entities, engaged into e-business, such as eBay.com or Yahoo.com, as well as baking and credit card payment systems. Denial of service is specifically outlawed in legislation of many countries.
Computer invasion of privacy
Computer invasion of privacy is one more wide-spread form of computer crimes. This crime is being committed, when a person uses computer or computer network in order to intentionally examine personal or financial information relating to other persons. In this regard examination means reviewing information, when knowing that no authority was granted to do so. Computer invasion of privacy can be committed at distance with the help of specific spyware. Spyware is a type of software, which aids in illegally gathering the information about a person or organization without their knowledge or sending this information to another individual or entity without lawful consent of data consumer, as well as getting the control over computer without user’s knowledge.
Online harassment
Online harassment is represented through unwanted contact between an offender and a victim, which exerts negative impact on victim’s mental or emotional state. One of most prominent forms of online harassment is cyberstalking, which means individuals’ repeated engagement into harassing or threatening behavior. Cyberstalking is usually being committed by sending a victim threatening or harassing messages via email, chat rooms or social nets, as well as [positing messages regarding the person at website or chat rooms.
Spreading of malicious programs/ viruses
Viruses and other malicious programs can potentially exert negative impact on a great amount of individuals and resources. These programs can be designed to make resources function abnormally and thus prevent end users from legitimately accessing the resource. Specific form of malicious programs/ viruses spreading is cyberterrorism, which is considered to be one of most rapidly developing types of computer crimes. In most general terms cyberterrorism is understood as unlawful attacks or relevant threats against computers, networks and information, being stored therein, aimed at influencing at the activities of the government. Cyberterrorism crime is one of most severely published computer crimes and is considered to be closely related to causing harm to persons or property.
Conclusion
Computer fraud, identity theft, computer theft, denial of service, computer invasion of privacy, online harassment and spreading of malicious programs are most common forms of computer –related criminal activities. They are penalized in vast majority of countries in the world, and included into international agenda. The crimes under study tend to significantly influence security of using computer and the Internet, as well as economic and social situation at the macro-level.
References
Anti-phishing working group (2013). Retrieved 11 December 2013 from http://www.antiphishing.org/
Franklin, C. (2006).The investigator’s guide to computer crime. Springfield: Charles. C. Thomas Publisher
Jordan, T. (2008). Hacking: digital media and technological determinism. Cambrdige: Policy Press
Stamatellos, G. (2007). Computer ethics: a global perspective. Burlington: Jones & Bartlett Learning
U.S. Department of Justice (2013).Mass marketing fraud. Retrieved 11 December 2013 from http://www.justice.gov/criminal/fraud/internet/