ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Internet Crime and Moral Responsibility

Essay by   •  December 10, 2010  •  Research Paper  •  3,166 Words (13 Pages)  •  1,664 Views

Essay Preview: Internet Crime and Moral Responsibility

Report this essay
Page 1 of 13

Internet Crime and Moral Responsibility

Internet Crime and Moral Responsibility 3

Introduction 3

What is Internet Crime? 3

Types of Crimes 3

Phishing 3

Child Pornography 4

Cyber Stalking 5

Computer Intrusion 5

Denial of Service Attacks and Cyber War 5

Identity Theft 6

Whose responsibility is it to report these crimes? 7

Reporting agencies 8

Conclusion 8

References 9

Internet Crime and Moral Responsibility

Introduction

The Internet is the technological genius of the computer age. Although the Internet is a phenomenal tool, providing access to the world, it has also become a Shangri-La for criminals. The Internet because of the ability to remain anonymous is the perfect playground for this type of mayhem. This paper will outline the types of crimes that are being committed via the Internet, it will explain how to protect yourself and your computer against these crimes and then it will focus on why we are morally obligated to report these crimes to the appropriate authorities and how to accomplish this.

What is Internet Crime?

The National White Collar Crime Center defines Internet Crime as the use of a computer to break the law (Beresford 2003). There are two categories of computer crime: Internet crime and Computer-related crime. Computer-related crimes are those crimes that attack the content of operating systems, networks and specific programs. The attacks usually include unauthorized access, sabotage to the system, acquisition of data without the users' knowledge or permission and hijacking a computer or service. Internet crimes include phishing, viruses, Trojans and Denial of service attacks, password theft, website defacement, etc.

Types of Crimes

Phishing

Phishing uses spurious email addresses and fraudulent websites to give email recipients the idea that the email is legitimate. Often the receiver will give out personal financial information such as credit card numbers, usernames and passwords or even worse, a social security number without realizing that the email was not legitimate. The emails that are sent out are made to look as though they came from the recipient's bank, retailer or credit card provider, and unsuspecting or unaware recipients will assume that if they do not provide this information their account will be closed or their information will be in jeopardy. Unfortunately, at least 5% of recipients respond to the fake emails, causing increasing numbers of identity theft cases, credit card fraud and sometimes, financial loss or even ruin (APWG 2004a). It is estimated that there were 1,142 active reported phishing sites in October 2004, up from 584 sites reported in July 2004 that is nearly a 50 percent increase. This number increased 25 percent over the previous three months. Surprisingly, the United States is the source of the most phishing websites. Phishing site owners frequently use just an IP address (APWG 2004b). It is estimated that in October 2004 there were over 6,597 unique phishing emails reported to APWG, up from 2,625 unique emails in July, an increase of 36 percent (APWG 2004c).

Many times the phishing emails are disguised with embedded image maps, buttons, and links that look as though they are being redirected to a "marketing partner" site. The most widely targeted companies are financial institutions with ISP services being the next most popular targets. Retail markets and other sites are the least targeted sectors. This demonstrates that there is big money in targeting the financial industry because this allows access to accounts and credit card information, potentially causing financial ruin to unaware customers.

One reason for educating computer users on phishing frauds is that the average online time for a phishing site is 6.4 days and a few have been online for as long as 31 days. By educating computer users, and teaching them how to report these fictitious emails, users will eventually help reduce the number of online time the average site exists thereby making the phishing business much less lucrative. It should be the responsibility of financial institutions, ISPs and retail businesses to educate users by requiring all online users to read and acknowledge a statement that they are aware of phishing scams. Users need to be informed that if they receive an email that appears to be from the institution or business, they need to contact the company in regards to the validity of the email. This should be reiterated to users monthly to help insure the reduction of personal information being gathered unlawfully.

Child Pornography

Child Pornography is the abuse of innocent children that has been put on display and oftentimes sold for a profit. It is used largely by pedophiles to help lure other children into illicit relationship situations that no child should ever have to endure. Because the Internet provides global access, the number of sex offenders using this avenue has dramatically increased, allowing them greater access to innocent victims.

Child pornography is illegal in the United States regardless of whether it is being sold, viewed, saved on a computer or copied. Other countries have varying laws regarding child pornography where it is illegal to produce it but not to have it stored on a computer that you own. Although laws may be in place to protect against child pornography across the global community, those laws are not always enforced. Some countries have no laws at all against child pornography, making those countries a haven for distribution.

The two agencies responsible for handling reports of child pornography are the FBI and U.S. Customs. Some law enforcement agencies are also developing Internet Task Forces to help curtail the proliferation of child pornography.

The FBI founded the Innocent Images National Initiative in 1995 to help address the illegal activities of people using the internet to traffic child pornography and to catch pedophiles contacting children through chat rooms and other means. The FBI states that online child pornography and child sexual

...

...

Download as:   txt (20.1 Kb)   pdf (212.5 Kb)   docx (17.4 Kb)  
Continue for 12 more pages »
Only available on ReviewEssays.com