Discussing Operation Cyber Sweep
INTRODUCTION
There is no invention that has had such vast impact and innovative influence on American society, and the world as a whole, as the internet. There is nothing that cannot be done via the internet today. One can shop, order food, work and even socialize without having to leave the house or computer screen. This has created many advantages for society; however, that convenience does come with some serious risks. Identity theft and fraudulent access to your personal online accounts is becoming a more and more common crime every day. As the world has adapted to new technologies so have the “wrong-doers.” Cybercrimes are being committed everyday from any number of locations all across the world. In 2003 the first major national initiative, Operation Cyber Sweep, attempted to tackle the growing cybercrime problem and eliminate a number of different internet schemes that had already cost consumers and businesses million of dollars (Monroe, 2003). Two of these crimes are relevant to discuss, Walter L. Wiggs and Raul “James” Ramirez.
DICUSSION
Walter L. Wiggs, 44, was laid off computer technician from the Technology for Business Corporation (TFBC), which develops, among other things, interactive voice software. Wiggs used that software to infiltrate the Los Angeles County Department of Child and Family Service’s Child Protection Hotline. His hacking caused the system to crash and made it impossible for anyone, victims and professionals, from accessing the hotline. In addition, Wiggs infiltrated at least 12 other companies using the same software in other California locations including Modesto, San Diego, and Orange County. All of this Wiggs accomplished form his home in the state of Georgia. Operation Cyber Sweep targeted Mr. Wiggs and he was arrested and has agreed to plead guilty. He will face of a fine of a quarter of a million dollars and he may, also, face, a five year prison sentence (Yang, 2003).
Raul Ramirez a 23-year-old Bellflower, California resident had previously worked at an auto dealership in Kingman, Arizona. As an employee Ramirez had access to a program called NowCom, that allows access customer credit histories in order to aid in making financing decisions. However, after escaping jail on a minor domestic violence charge, Ramirez came to California where he proceeded to use the same program to infiltrate consumer credit information and committed many counts of identity theft. Ramirez was returned to Arizona to address his previous warrants and then face a Los Angeles Court in the future to address the identity theft (Yang, 2003).
These two cases are just two of over a hundreds of individuals who have been identified, arrested and convicted of committing one form of cybercrime or another. Every crime from minor spoofing schemes all the way to the more extreme crimes like identity theft and hacking certain protected sites. Many people may be familiar with the recent issue and certain Target store locations that may have been compromised and many customers credit and banking information may have been accessed and stolen. In totality, investigators estimate that these people have cost losses of more than 100 million dollars. Of the 350 people under surveillance and investigation 125 have been convicted and the representatives hope that that is only a start (Leyden 2003). The FBI admits that there is still a great deal of work to be done to stem the tide of cybercrime and means to deter others in the future.
Operation Cyber Sweep began its mission more than a decade ago. While that initiative and many other initiatives that have followed have made a great effort and have ended a number of cybercrime threats throughout the years, the epidemic of cybercrime has continued. Once again, as innovative and advanced internet security becomes and law enforcement adapts the ways that it indentifies and eliminate cyber threats, the “wrong-doers” are, also, improving and becoming more technologically savvy in the means and approaches with which they commit their crimes. There are still many cybercriminals out there, right now, infiltrating someone’s personal accounts and making purchases with another’s credit card number. Some identity thieves have spent thousands, even hundreds of thousands of dollars destroying victim’s credit and leaving people with debts they did not incur (Leyden 2003). However, endeavors like Operation Cyber Sweep rename worthwhile.
CONCLUSION
Cybercrimes can happen to anyone, regardless of race, age, gender, and economic status. Victims of cybercrime often do not even know they have been a victim of a crime, until a substantial monetary loss is noticed. This is why cybercrime can effect so many before they are identified and stopped. Cybercrimes, like the ones identified by Operation Cyber Sweep are not isolated incidents. If the individual sites cannot protect your accounts and information and cybercriminals are active in the world every day, then we must take responsibility for ourselves and our accounts. It is possible for individuals to take precautions and proactive efforts to protect their information and identities. Following the suggestions regarding the changing of passwords, monitoring of personal accounts, and working to protect our cyber-life as surely as we do our physical ones is essential. Offenders like Wiggs and Ramirez are not unique and we all must be aware that the threat is very real.
REFERENCES
Leyden, J. (2003, November 20). US agencies arrest 125 in operation cyber sweep. The Register, 1. Retrieved from http://www.theregister.co.uk/2003/11/20/us_agencies_arrest/
Monroe , J. (2003). Remarks by assistant director jana monroe, cyber division, at press conference on operation cyber sweep . Federal Bureau of Investigation National press Releases, 1. Retrieved from http://www.fbi.gov/news/pressrel/press-releases/operation-cyber-sweep
Yang, D. W. (2003). Two alleged computer hackers charged in los angeles as part of nationwide ‘operation cyber sweep'. United States Department of Justice, 1. Retrieved from http://www.justice.gov/criminal/cybercrime/press-releases/2003/wiggsPlea.htm