Purchase Solution

Computer Crimes

Not what you're looking for?

Ask Custom Question

Requesting help (information and references) with this question.

2. A prominent local newspaper in the Washington, DC area would like to interview DC Investigative and discuss the nature and growth of high-tech crime, also known as the following: cybercrime, computer crime, Internet crime, and hi-tech crime, and the link to terrorism. The newspaper has given a list of discussion points before the interview to include the following:
? Definitions and parameters for hi-tech crime (e.g., hi-tech crime types and the intended results)
? Overview of how the crimes are used by terrorist groups

Purchase this Solution

Solution Summary

Computer Crime is discussed in great detail in this solution

Solution Preview

2. A prominent local newspaper in the Washington, DC area would like to interview DC Investigative and discuss the nature and growth of high-tech crime, also known as the following: cybercrime, computer crime, Internet crime, and hi-tech crime, and the link to terrorism. The newspaper has given a list of discussion points before the interview to include the following:
? Definitions and parameters for hi-tech crime (e.g., hi-tech crime types and the intended results)
? Overview of how the crimes are used by terrorist groups
There are several types of hi-tech crimes. First there are computer intrusions, and the intention of these is to get sensitive and secret information. Second, there are unauthorized modification of data, a crime whose intention is to misinform, spread panic, and cause chaos. Third, unauthorized destruction of data is another hi-tech crime, the intended results are that large amounts of important data are destroyed. Fourth, distributed denial of service attacks, the intended results are that the server becomes very slow or stops functioning. Fifth, the creation and distribution of malicious software, the intended effect is to stop the functioning of the targeted computers or systems
The other types of hi tech crimes include salami slicing. The intended effect of this crime is to steal very small amounts of money regularly. Sometimes the amount stolen is $1 and in some cases it is even less that that. Another hi-tech crime is that of making and selling child pornography. The effect of this crime is that the incidence of child pornography increases. The exploitation of children also increases. The other effect is that when such pornography is sent unsolicited, it can cause great anguish and mental distress. An important hi-tech crime is that of identity theft. In this crime fraudulent computer transactions are entered into. Identity theft is also used by terrorists to masquerade as someone else. The effect is that fraudulent or criminal transactions ...

Purchase this Solution


Free BrainMass Quizzes
Constitutional Law Rights

How much do you know about Constitutional Law Rights? Find out with this quiz!

Title VII

This Quiz pertains to the spectrum of Human Rights through Title VII

Criminal Defenses Review

Test your knowledge of the basics of criminal law and defenses with this quiz.

Title VII Laws

Learn the basics of the laws under Title VII.

Evidence

Do you know your evidence objections? Find out with this quiz!