The Effects of Cybercrime in the U.S. and Abroad
()
About this ebook
This book focuses upon cybercrime activity in the United States and abroad. I have explored the problems that have arisen since the induction of the Internet. Discussing the realities of malicious attacks against the United States infrastructure, cyber terrorism, and white collar crimes. The goal of this book is to inform the government and consumer alike to protect themselves from cyber intrusion.
Randall Knight B.S. L.L.B L.L.M.
Randall Knight is a retired law enforcement officer and a law school graduate. He is a single parent and lives in New York City with his daughter.
Related to The Effects of Cybercrime in the U.S. and Abroad
Related ebooks
Biggest Cyber Crimes in the History Rating: 0 out of 5 stars0 ratingsCyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratingsCyber Crimes: History of World's Worst Cyber Attacks Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Industry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5Cyber Attacks: Protecting National Infrastructure Rating: 4 out of 5 stars4/5Intelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsDefending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCybercrime and Business: Strategies for Global Corporate Security Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 0 out of 5 stars0 ratingsCyber-security regulation Third Edition Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Cybersecurity Policy A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsCritical infrastructure protection Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Charter Standard Requirements Rating: 0 out of 5 stars0 ratingsNetwork Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsTechnology Risk And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5Information Technology Risk A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Law For You
How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 3 out of 5 stars3/5Legal Words You Should Know: Over 1,000 Essential Terms to Understand Contracts, Wills, and the Legal System Rating: 4 out of 5 stars4/5Law For Dummies Rating: 4 out of 5 stars4/5Win In Court Every Time Rating: 5 out of 5 stars5/5Secrets of Criminal Defense Rating: 5 out of 5 stars5/5Legal Writing in Plain English: A Text with Exercises Rating: 3 out of 5 stars3/5Criminal Law Rating: 0 out of 5 stars0 ratingsDictionary of Legal Terms: Definitions and Explanations for Non-Lawyers Rating: 5 out of 5 stars5/5The ZERO Percent: Secrets of the United States, the Power of Trust, Nationality, Banking and ZERO TAXES! Rating: 5 out of 5 stars5/5The Paralegal's Handbook: A Complete Reference for All Your Daily Tasks Rating: 4 out of 5 stars4/5Legal Forms for Everyone Rating: 4 out of 5 stars4/5The Common Law Rating: 4 out of 5 stars4/5Wills and Trusts Kit For Dummies Rating: 5 out of 5 stars5/5Critical Race Theory: The Cutting Edge Rating: 4 out of 5 stars4/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Patents, Copyrights and Trademarks For Dummies Rating: 4 out of 5 stars4/5Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5Family Trusts: A Guide for Beneficiaries, Trustees, Trust Protectors, and Trust Creators Rating: 5 out of 5 stars5/5Estate & Trust Administration For Dummies Rating: 0 out of 5 stars0 ratingsWith Liberty and Justice for Some: How the Law Is Used to Destroy Equality and Protect the Powerful Rating: 4 out of 5 stars4/58 Living Trust Forms: Legal Self-Help Guide Rating: 5 out of 5 stars5/5Make Your Own Living Trust Rating: 4 out of 5 stars4/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Drafting Affidavits and Statements Rating: 4 out of 5 stars4/5The Socratic Method: A Practitioner's Handbook Rating: 4 out of 5 stars4/5The Everything Executor and Trustee Book: A Step-by-Step Guide to Estate and Trust Administration Rating: 3 out of 5 stars3/5Jews Don’t Count Rating: 4 out of 5 stars4/5
Reviews for The Effects of Cybercrime in the U.S. and Abroad
0 ratings0 reviews
Book preview
The Effects of Cybercrime in the U.S. and Abroad - Randall Knight B.S. L.L.B L.L.M.
© 2014 Randall Knight, B.S., L.L.B, L.L.M. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.
Published by AuthorHouse 11/052014
ISBN: 978-1-4969-4991-2 (sc)
ISBN: 978-1-4969-4990-5 (e)
Library of Congress Control Number: 2014919184
Any people depicted in stock imagery provided by Thinkstock are models,
and such images are being used for illustrative purposes only.
Certain stock imagery © Thinkstock.
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
CONTENTS
Introduction
I. History Of Cybercrime
A. Information Age
B. White Collar Crime Considerations
C. Aspects Of International Cybercrime Criminals
II. Types Of Cybercrimes (Topology) In The US/International Regions And It Implications.
A. Cyber Terrorsim
B. Cyber Warfare
C. Cyber Stalking
D. Spam
E. On-Line Hoax
F. Internet Shopping
G. Auction Fraud
H. Phishing Scam
I. Identity Theft
J. Child Pornography & Exploitation
K. Intellectual Property
III. Who Are The Victims.
A. Consumers
B. Business Owners
C. Government Effect
IV. Reducing The Risk Of Cyber Attacks On Computer Networks
A. History Of Computer Viruses
B. Protecting Computer Network Against Attacks
V. Cybercrime Laws And Statutes
A. Usa Patriot Act
B. Gramm-Leach-Bliley Act
C. Children’s Online Privacy Protection Act Of 1998
D. Identification Theft And Assumption Deterrence Act
E. The Computer Fraud And Abuse Act. 18 U.S.C. §1030
VI. Proposed Analyzed Solutions And Recommendations Of Privacy And Safety When Accessing The Internet
This book is being published in the
memory of my mother Frances Nellie Morris Knight and my lovely daughter Niara Renee Knight.
INTRODUCTION
In today’s society computer technology has made it possible to communicate electronically in almost every aspect of life. The speed and efficiency of communicating electronically is overwhelming. Computers are used to store confidential data of social, economical, political and personal nature. Computer cybercrime refers to any crime that involves a computer and a network, where computers may or may not have played an instrumental part in the commission of the crime. Cybercrime activities include criminal offenses such as illegal downloading music files, stealing millions of dollars from on-line accounts. It also includes non-monetary offenses, such as creating and distributing computer viruses or posting confidential business information on the internet¹. One of the most popular cybercrime activities that is posed in today’s society is identity theft, which is the stealing of personal information such as passwords, phone numbers, addresses, credit card number and bank account information, etc. The cybercriminal gains access to this information in numerous ways. Once this information is obtained the fraudulent process begins. This raises concerns of privacy invasion and the laws that protect them.
Another form of computer crime is referred to as Net crime². Defined as criminal exploitation of the internet, it includes such crime as computer hacking, copyright infringement, child pornography, child grooming, etc. Net crime criminals; have the ability to engage in activities that include espionage, financial theft and cyber warfare. This raises concerns domestically and internationally. The U.S. Department of Defense reports that cyberspace has become a national-level concern. In 2007, an attack on Estonia’s infrastructure was alleged to be done by Russian hackers. In 2008 Russian hackers conducted cyber attacks against the country of Georgia. There are literally thousands of cybercrimes that are committed, but few get caught and prosecuted. To solve this issue prevention and prosecution of offenders should be enforced to the fullest extent of the law.
Due to the global aspect of the internet and computer based commerce/communication, enforcement and prosecution is feasible undermined by the applicable laws which are based upon geographical boundaries. There is a need for global awareness for all countries involved in cybercrime offenses. Legislative laws should be amended and applied appropriately.
I. History of Cybercrime
The birth of Electronic Technology dates back as far to 1876,