This website uses cookies to ensure you have the best experience. Learn more

Susan W. Brenner’s Cyber Crime: Criminal Threats From Cyberspace

2881 words - 12 pages

Susan W. Brenner’s Cybercrime: Criminal Threats from Cyberspace is scary, exciting, and informative all in one book. It takes you on rollercoaster from start to finish as your eyes are opened to the realities of cybercrime and cybercriminals’ capabilities as our technologies have progressed. Brenner’s book is an excellent piece for those that are not savvy about technology terminology and cybercrime.
Brenner opens by giving an example of the chaos that a cybercriminal can make and the long distance at which this can occur. In Townsend, Massachusetts, a group of eighth graders at Hawthorne Brooke Middle School chatted online to each other in a chat room for Limp Bizkit fans. They spoke not only of the band but also about personal things and school. One day, a new boy appeared in the chat room claiming to be from the same school. This boy, gathering information from the students, was able to chime in on the conversation and blend in. The new boy began to say strange things and claimed that he was a serial rapist and was coming for them and sent them a link to a site with child pornography. After pressing him harder, the boy told them that he was the student who they had been talking about in their chat room. The children started doubting if he was even from the school, and upon telling him this, he threatened to blow up the school. The students finally told their parents after the mysterious person sent pictures of the cross hairs of a rifle scope on the school and an altered picture of the principal to make him look like he had been shot. Police and school officials could not figure out a suspect, and parents and students started becoming suspicious of each other. Parents began keeping their children from school, and some teachers began to quit. The harassing continued when people received phone calls with the song associated with the Columbine shooting that had just happened five months prior. Police were finally able to track the Internet activity to Maple
Cybercrime 2
Woods Community College to 19-year-old, paraplegic Christian Hunold in Smithville, Missouri over 1000 miles away. This story is a perfect example of cybercrime, its capabilities to allow someone to manipulate inhabitants from miles away, and the ease for someone to become involved in cyberspace (Brenner, 2010, p. 7).
Before Brenner could get deep into cybercrime, the term must first be defined. What is cybercrime? Cybercrime is “engaging in conduct that is outlawed because it threatens order” (Brenner, 2010, p. 10). The main difference between cybercrime and crime is in the tools used; cybercriminals use computer technology instead of guns. With the increase of technology, there is a shift of real-life crime into cyberspace. Because of cyberspace, criminals are able to commit traditional crimes in new and scary ways (Brenner, 2010, p. 10).
When cybercrime began must be examined before looking at where it is now. When larger mainframe computers began to become available...

Find Another Essay On Susan W. Brenner’s CyberCrime: Criminal Threats from Cyberspace

The Dark Side of the Internet

1357 words - 5 pages formed threat of cybercrime has also come inventive ways for law enforcement to attack and prevent it as well and many countries worldwide are creating laws to prohibit this new wave of criminal activity. Cybercrime, also called computer crime, defined by Google, is “crime conducted via the Internet or some other computer network.” Almost all cybercrime is an attempt to steal information from corporations, governments, and people. Then a person may

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages Cybercrime is a broad term used to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. They are almost impossible to stop due to technological advances and the power of anonymity on the internet. Governments have implemented strategies to try and prevent and fight these crimes in cyberspace but their effectiveness is questionable. It's a constant cat-and-mouse game as cybercriminals

The Effects of Cybercrime

1692 words - 7 pages . Cybercrime 5 They crack or steal information for their customers. Generally competitor companies hire them to get information about their rivals. The final group consists of discontented employees, which includes people who have been fired from their job and want to take revenge from their employers. As a result it can be stated that the authorities should approach cybercrime from various angles as each criminal group has different motives

Department of Defense Strategy for Operating in Cyberspace

2042 words - 8 pages have created an extremely complex and critical challenge for U.S. national security (International Security, 2011). Not all cyber threats originate from outside threats. The insider threat is a very real and dangerous possibility. Foreign governments, terror organizations, criminal networks, or simply personal initiative can motivate authorized users to exploit their access to secured networks. The action of insiders, regardless if they are

Crime in the Cyber Realm

1032 words - 5 pages domain. The domain was then used as a bargaining piece to force Naoki to trade the Twitter account for the domain (Naoki Hiroshima, 2014). The Twitter account had been the hacker’s target from the beginning. In a separate case of cybercrime, on July 29th 2011, the hacktivist group Anonymous breached the network of the defense contractor ManTech and stole information from their servers. ManTech provides network security services for the FBI for

technology and security in africa

661 words - 3 pages have unintended outcomes. Looking again at the Westgate Mall siege in Kenya, the lethal innovation was the way that the attackers used modern technology. They communicated via smart phones and satellite phones for communication. In the digital world where in cyberspace we come across insecurity in hacking, fraud and identity theft. Several other insecurities such as sexual harassment of minors also occur in cyberspace. Cybercrime causes

Gray-Hat Hacking

2153 words - 9 pages 8 CSI / FBI, Computer Crime and Security Survey, 2003, http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2003.pdf 9 George W. Bush, President’s Message to the Senate on the Council of Europe Convention on Cybercrime, 2003, http://www.usdoj.gov/criminal/cybercrime/senateCoe.pdf 10 US Department of Justice, FAQ on Council of Europe Convention on Cybercrime, 2003, http://www.usdoj.gov/criminal/cybercrime/COEFAQs.htm

Importance of Cyber Security

2012 words - 8 pages The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated

Computer Crime

1796 words - 8 pages of a computer for personal gain” (Dictionary.com), but the true depth of the definition is so much deeper. Anyone can be affected by cyber-crime, it can affect personal computer users all the way to massive corporations. There are many government agencies trying to get control of this growing problem. Cyber-crime is a problem affecting everyone; it will continue to grow unless computer users become educated on the threats out in cyberspace and

The Republic of India

936 words - 4 pages , New Zealand, UK, EU, Singapore, Russia, and Malaysia are actively engaged in ensuring a safe and secure cyber environment for their citizens. What is happening now? While cybercrime presents itself as an ever existing threat, India has adopted a number of measures to counter the use of cyberspace for terrorist-related activities especially in the aftermath of the terrorist attack in Mumbai in November 2008. The Parliament of India passed

Cyber Crime and Cyber Law

2705 words - 11 pages crime activity. Various laws related executed by Australian government to control Cyber Crime are Custom Act 1901, Crimes Act 1914, Commonwealth Criminal Code Act 1995, enacted from the Model Criminal Code project report, Crimes Amendment (Forensic Procedures) Act 2000, Model Forensic Procedures Bill and the Proposed National DNA Database in May 1999 (report February 2000) and Cybercrime Act 2001 (ITU Toolkit For Cybercrime Legislation, 2010

Similar Essays

A Review Of The Development Of Internet And Cyberlaw In United States

1322 words - 5 pages ). Cybercrime: Criminal Threats from Cyberspace. California: Greenwood Publishing Groups. 4. Brian, Craig (2013). Cyberlaw: The Law of the Internet and Information Technology. New Jersey: Pearson Education. 5. Elmer-Dewitt, P. (1995). “Snuff Porn on the Net”, Time, Vol.145, No.7 (February 1995): 69. 6. Ferrera Gerald R. (2012). Cyberlaw: Text and Cases. Ohio: South-Western Cengage Learning. 7. Greenwalt,Kent (1987). Conflicting of Law and

Different Methods Of Cyber Crime And Their Effects On Modern Society

1363 words - 5 pages , namely cybercrime (Department of Homeland Security, 2013). Cybercrime encompasses illegal activities conducted through a computer and the internet by a hacker (Webopedia, 2013). A hacker is not an average criminal in the sense that he or she will break into your house and steal your brand new HD TV. A hacker breaks into your electronic devices and steals something even more valuable; your credit card info, or even your identity, right from the

Cyber Crime: Cybersecurity For Cyberspace Essay

2123 words - 9 pages designed to thwart attackers from accessing the networking infrastructure. Cyberspace by definition is a platform in which communication through technology occurs. Thwarted with dangers that pose extreme risk, Cyberspace has become the premier criminal activity platform due to its perpetual anonymity resulting in the harm to another entities technology, commuters/servers, as well as storage databases. This policy proposal shall minimize vulnerability

Cyber Crime Essay

2955 words - 12 pages globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side from an individual citizen, to small groups, businesses, and the government, to the countries of the world. There are different groups from law enforcement agencies to the U.S. Secret Service, that are attempting to combat