Vous êtes sur la page 1sur 7

CYBERCRIME

Computer crime, or cybercrime, is crime that involves a computer and a network.[1] The
computer may have been used in the commission of a crime, or it may be the target.[2]Dr.
Debarati Halder and Dr. K. Jaishankar (2011) define cybercrimes as: "Offences that are
committed against individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails,
notice boards and groups) and mobile phones (SMS/MMS)".[3] Such crimes may threaten a
nations security and financial health.[citation needed]Issues surrounding these types of crimes have
become high-profile, particularly those surrounding hacking, copyright infringement, child
pornography, and child grooming. There are also problems
of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
Dr.Debarati Halder and Dr.K.Jaishankar (2011) further define cybercrime from the perspective of
gender and defined 'cybercrime against women' as "Crimes targeted against women with a
motive to intentionally harm the victim psychologically and physically, using modern
telecommunication networks such as internet and mobile phones.[3]
Internationally, both governmental and non-state actors engage in cybercrimes,
including espionage, financial theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least one nation state is sometimes referred
to as cyberwarfare. The international legal system is attempting to hold actors accountable for
their actions through the International Criminal Court

Fraud and financial crimes[


Main article: Internet fraud
Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain
from doing something which causes loss. In this context, the fraud will result in obtaining a
benefit by:

Altering in an unauthorized way. This requires little technical expertise and is common
form of theft by employees altering the data before entry or entering false data, or by
entering unauthorized instructions or using unauthorized processes;

Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized


transactions. This is difficult to detect;

Altering or deleting stored data;

Other forms of fraud may be facilitated using computer systems, including bank
fraud, carding, identity theft, extortion, and theft of classified information.
A variety of internet scams, many based on phishing and social engineering, target consumers
and businesses.
Cyber terrorism
Main article: Cyberterrorism
Government officials and Information Technology security specialists have documented a
significant increase in Internet problems and server scans since early 2001. But there is a
growing concern among federal officials[who?] that such intrusions are part of an organized effort
by cyberterrorists, foreign intelligence services, or other groups to map potential security holes in
critical systems. A cyberterrorist is someone who intimidates or coerces a government or
organization to advance his or her political or social objectives by launching a computer-based
attack against computers, networks, or the information stored on them.
Cyberterrorism in general, can be defined as an act of terrorism committed through the use of
cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet,
that there will be bomb attacks during the holidays can be considered cyberterrorism. As well
there are also hacking activities directed towards individuals, families, organized by groups
within networks, tending to cause fear among people, demonstrate power, collecting information
relevant for ruining peoples' lives, robberies, blackmailing etc
Cyberextortion

Main article: Extortion


Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or
threatened with repeated denial of service or other attacks by malicious hackers. These hackers
demand money in return for promising to stop the attacks and to offer "protection". According to
the Federal Bureau of Investigation, cyberextortionists are increasingly attacking corporate
websites and networks, crippling their ability to operate and demanding payments to restore their
service. More than 20 cases are reported each month to the FBI and many go unreported in order
to keep the victim's name out of the public domain. Perpetrators typically use a distributed
denial-of-service attack.
An example of cyberextortion was the attack on Sony Pictures of 2014.

Cyberwarfare

Main article: Cyberwarfare


The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a nationallevel concern through several recent events of geo-strategic significance. Among those are
included, the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August
2008, Russia again allegedly conducted cyberattacks, this time in a coordinated and
synchronized kinetic and non-kinetic campaign against the country of Georgia. Fearing that such
attacks may become the norm in future warfare among nation-states, the concept of cyberspace
operations impacts and will be adapted by warfighting military commanders in the future.[10]
Computer as a target[edit]
These crimes are committed by a selected group of criminals. Unlike crimes using the computer
as a tool, these crimes require the technical knowledge of the perpetrators. As such, as
technology evolves, so too does the nature of the crime. These crimes are relatively new, having
been in existence for only as long as computers havewhich explains how unprepared society

and the world in general is towards combating these crimes. There are numerous crimes of this
nature committed daily on the internet:
Crimes that primarily target computer networks or devices include:

Computer viruses

Denial-of-service attacks

Malware (malicious code)

Drug trafficking[edit]
Main article: Darknet market
"Drug traffickers are increasingly taking advantage of the Internet" according to cyber authorities
and personnel." to sell their illegal substances through encrypted e-mail and other Internet
Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track
illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.
The dark web site Silk Road was a major online marketplace for drugs before it was shut down by
law enforcement (then reopened under new management, and then shut down by law enforcement
again).
The rise in Internet drug trades could also be attributed to the lack of face-to-face communication.
These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal
drugs. The sketchy effects that are often associated with drug trades are severely minimized and the
filtering process that comes with physical interaction fades away.

Phising/Spoofing
The Crime: Unlawfully accessing a computer without authorization and sending multiple e-mails;
resending multiple commercial email messages with the intent to deceive recipients; or falsifying header
information in multiple email messages.

The Time: Spam and its decedents are not only extremely annoying, they are federally outlawed. This
shady practice carries a maximum five year sentence if the sender is spamming for commercial gain. In
all other cases, spammers face a possible three year sentence for their first offense. Thank you, Gmail.

Blackmail/Extortion
The Crime: Using the Internet to threaten to cause damage with the intent to extort from any person any
money or other thing of value.
The Time: Hackers threatening to expose damaging or embarrassing information in exchange for money
face a hefty fine of up to five years. Be sure to keep your anti-virus updated and don't click that weird
video link in your email.

Accessing Stored Communications


The Crime: Intentionally accessing, without authorization, a facility through which an electronic
communication service is provided.
The Time: Hacking someone's email account for the purposes of commercial advantage, malicious
destruction, or in furtherance of any crime carries a maximum five year sentence for first time offenders.
Hacking into an email account in all other cases comes with a maximum one year sentence. Now go
change your password.

Sports Betting
The Crime: Engaging in the business of betting or wagering on any sporting event or contest over the
Internet.
The Time: Using the Internet for betting on sports is a federal crime punishable up to two years in
prision. States remain free to regulate internet gambling, other than sports betting, as it occurs within that

state. Since non-sports betting regulations fall within the purview of the individual states, the laws and
regulations vary across the country.

Criminal Copyright Infringement


The Crime: Infringing a copyright for financial gain...or by distributing a work being prepared for
commercial distribution on a computer network.
The Time: Infringing a copyright for financial gain comes with more then a slap on the wrist. The
Internet makes it extremely easy for an infringer to cross the threshold of federal criminal liability. A mere
10 shared copies with a minimum retail value of $2500 triggers a five year maximum sentence.
Distributing a work being prepared for commercial distributionessentially a 'leak'carries a possible
three year sentence which doubles if you're a repeat offender.

Prostitution
The Crime: Persuading, inducing, enticing, or coercing any individual to travel in interstate
commerce to engage in prostitution.
The Time: The crime of prostitution at the federal level involves the act of crossing state lines and, if
guilty, carries a maximum 20 year sentence. At the state level, 49 out of the 50 states outlaw postitution.
We all know which one doesn't.

Salami slicing
Salami slicing refers to a series of many small actions, often performed by clandestine means, that as an
accumulated whole produces a much larger action or result that would be difficult or unlawful to perform
all at once. The term is typically used pejoratively. Although salami slicing is often used to carry out
illegal activities, it is only a strategy for gaining an advantage over time by accumulating it in small
increments, so it can be used in perfectly legal ways as well.

An example of salami slicing, also known as penny shaving, is the fraudulent practice of stealing money
repeatedly in extremely small quantities, usually by taking advantage ofrounding to the nearest cent (or
other monetary unit) in financial transactions. It would be done by always rounding down, and putting the
fractions of a cent into another account. The idea is to make the change small enough that any single
transaction will go undetected.[1]
In information security, a salami attack is a series of minor attacks that together results in a larger attack.
Computers are ideally suited to automating this type of attack.
In politics, the term salami tactics has been used since the 1940s to refer to a divide and conquer process
of threats and alliances used to overcome opposition.
In academia, salami slicing refers to the practice of creating several short publications out of material that
could have, perhaps more validly, been published as a single article in a journal or review.

Vous aimerez peut-être aussi