Internet Crimes
INTERNET CRIME

In the United States alone, there are millions of people browsing through cyberspace. This amount continues to grow rapidly each and every day. Because of these growing numbers, we deal with many "sizzling" topics!

HACKING

What is Hacking?

Hacking is the act of penetrating computer systems to gain knowledge about the system and how it works. Hacking is illegal because "hackers" demand free access to ALL data.

How to stop hackers:

1.) Get rid of computers and telephones (yeah right!)

2.) Give up the info that the hackers want.

Until one of these ways are met...hackers are NOT going to stop hacking!


By connecting to the World Wide Web and gaining proper knowledge, you can prevent yourself from becoming a victim of these con men.

your picture here
They are out there...just waiting!!!!
Other types of Internet Crimes
1. Trojan Horse: a computer is used to reprogram another for illicit purposes

2. Salami Slice: someone sets up a dummy account in the company's computerized records

3. "Super-zapping": able to break through anti-theft safeguards

4. Logic Bomb: a program is secretly attached to the company's computer system and when an error is found, the program takes advantage of the weakness and makes it profitable for themselves

5. Impersonation: an unauthorized person uses the identity of an authorized computer user to access the computer system. This is espeecially common in systems where users can employ common passwords or maintenance passwords found in the system itself.

6. Data Leakage: a person illegally obtains data from a computer system by leaking it out in small amounts. Through this a person is able to get personal information that could be costly to the victim. An example of this is that these hackers frequently target credit card information, as well as personal and financial information on credit-card clients.

7. Criminal Infringement of Copyrights: In some cases a criminal (more specificlly, a hacker)would break into files of a company's or organization and illeagly display information on the internet. On December 16, 1997 a bill was passed by President Clinton that imposes heavy criminal penalties for willfull infridgements of copyright materials by electronic or other means.

8. Internet Scams: Pyramid Schemes.
The number one internet scam, according to the National Fraud Information Center, are Pyramid Schemes. In this scam a criminal will create a false company and post information explaining of their supposed company. They will then ask you to invest in this company. They will keep collecting fees from the unknowing victims untill the profits start to drop and then they will just totally dissapear leaving the investors with huge losses.
IF YOU DECIDE TO INVEST OVER THE INTERNET BE CERTAIN TO RESEARCH IT TO MAKE SURE ITS REAL.

HIGH-TECH CRIME

Committed by: corporations or individuals, Length: they can be ongoing or a one time thing, They involve the theft of info, resources or money. These crimes cost the comsumers millions of dollars every year & will most likely increase in the years to come.

WHAT MOTIVATES CRIMINALS:

A.) revenge B.) superiority C.) highlight vulnerability of computer security D.) spy on private and financial info of others E.) to assert a philosophy of open access to all
systems & programs


How the World Wide Web can advance the understanding and/or of knowledge of the subject:
Due to the increasing problem of intenet crimes it is imperative that you learn some of the basics in order to protect yourself from these. This website will make you more aware of some of the scams and the criminals that take advantage of the internet. The reason that you must be carefull is that the police/criminal justice system can do little to catch or even hinder these criminals. This is because they have more knowledge of the computer than the police, which makes it almost impossible to catch them if you don't know how. We hope that you will find this wbsite informative and helpful.

For questions or comments:
Maggie: ybch@grove.iup.edu OR Amanda: lhdh@grove.iup.edu OR John: jpav67@hotmail.com

powered by lycos
SEARCH: Tripod The Web