Saturday, April 18, 2020

Social Control Of Cyber Space Essays - Cybercrime, Computer Security

Social Control Of Cyber Space Social Control of Cyberspace B. Pereyra Our nation's infrastructure is daily becoming much more of an abstract environment due to the use of organized cyber criminals hacking away at our super computer information systems. They are generating unpredictable challenges for law enforcement in discovering the unethical abuse on computer systems and a concentration on the young topic of cyber terrorism threatening our criminal justice system. Our law enforcement continues to invent newer methods to function and learn from this new social phenomenon and define cyber terrorism activity as motivation by the rapid growth of technology as a challenge, dominance, and as pleasure to obtain privileged information for illegal use to intentionally harm others and our information networks as well. Therefore, it is of relevance to explore the behavior of a computer hacker and a cracker; including the control, response, and the appropriate measures to combat this new crime wave, and how the academic community, courts, police, and the scient ific government are approaching this radical form of crime. On October 25th, 1983, a hearing was formed by the U.S. Congress on the issue of computer security in the federal government and the private sector. The hearing discussed the level of importance on how serious the United States Government must become in learning to monitor the use of computers and Internet through several knowledgeable witnesses. Susan H. Nycum, an attorney representing Gaston, Snow and Ely Barlett firm's computer high technology group defined computer crime as: any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation, or prosecution (Nycum, 15). Nycum also added before the committee that computer abuse falls into four categories that follow. The first category is abuse like financial fraud and theft, incidents of theft of money from financial institutions or goods from businesses. The second is information fraud and theft. Information can be data, such as business secrets stored in computer systems, valuable to computer programs and data about individuals. The third category is theft of services. For example, systems hackers who use computer time to look around or employees who run entire profitable computer enterprises, such as service bureaus on the company or agency computer systems are examples of this kind of abuse. Lastly, vandalism, where computers have been damaged or destroyed as have databases and programs to perpetrate crimes. In addition, Nycum also points out that computers are involved in several ways as tools or objects for an attack. For example, international terrorists have used bombs and submachine guns to attack at least 28 computer centers of multi national companies and government agencies in Italy and France over the past years. A misguided employee of a U.S. company firebombed a computer of a competing company for the purpose of giving his employer a competitive business advantage. Furthermore, a computer can be the subject of crime by providing the automated mechanism to modify and manipulate new forms of assets, such as computer programs and information representing money. For example, bank frauds have been accomplished by manipulating the system to transfer small amounts of money from one account, which is later withdrawn. This is known as the salami effect, where near the end, after slicing the intruded account, the complete account is exhausted by all the small transfers or withdrawals. Bogus accounts have been created in computerized delivery or accounts payable systems to which goods have been shipped or money paid by financial institutions and retailers. Changes to computerized data have resulted in inflation of inventories in credit ratings, employment reviews, coll ege and school grade records, etc. Lastly, a person can use a computer as an instrument for conducting or planning a crime. A perpetrator modeled his crime on a computer to alert him to the amount of activities he could engage in without attracting attention to his deeds, and later used the computer as a management tool to keep track of the activity, or even aid a stockbroker to produce forged investment statements to show huge profits to deceive his client and steal millions. Thus, the cyber criminal can only use the symbol of the computer to intimidate or deceive others. An example would be to convince his victim that he