Internet

Legal Materials Arranged by subject. Articles: To find articles on Internet hardware or software, search the LexisCommunications file (CMPCOM;COMM). C/Net rates Internet hardware, software and related products and services. See also the News section, below. Browsers: […]

Intellectual Property

Summary of Intellectual Property Intellectual Property is, according withWilliam J. Miller, a general term covering industrial property such as patents, trademarks, and trade names, as well as literary and artistic property, including copyrights. Consideration of the meaning of the word […]

Interpol

International Criminal Police Organization (Interpol) Interpol-Washington "Presently providing cooperation among police agencies of 181 nations, Interpol is in the United States represented by the U.S. National Central Bureau, also called Interpol-Washington, which is directed by the […]

Piracy

See Transnational crime . The first precise attempt to codify piracy was in 1958 when the Convention on the High Seas was adopted in order to clarify the legal status of pirates and the competence to arrest pirates. These articles in the Convention on the High Seas have been incorporated into […]

Cryptography

Cryptography and Encryption Overview of Cryptography and Encryption in relation to cyber crime: [1]There are various methods of encrypting messages depending on the type of communication that is being protected. In general, the more valuable or sensitive the data, the greater or […]

Child Pornography

Hello "Research and policy on the criminal aspects of pornography has in most recent years focused almost all of its attention on child pornography, especially as a result of the important role played therein by the internet as the medium that has greatly eased the distribution of such […]

Computerization

Overview of Computerization in relation to cyber crime: [1]Growth of computer and IT device users and the Internet also stems from how much easier these technologies are to use. Long gone are the days in which a user needed to understand programming in order to use computers. Originally, […]

Government Intelligence Gathering

Overview of Government Intelligence Gathering in relation to cyber crime: [1]Americans are traditionally suspicious of government, particularly when it comes to their privacy. This distrust is not without merit; along with the many beneficial, legitimate, and justified actions the federal […]

Victimization

Overview of Victimization in relation to cyber crime: [1]There are also four main categories of loss or harm that crime victims can experience involving physical, financial, and/or emotional harm. Physical harm includes death and bodily injury caused by gunshot or stab wounds, bruises, […]

Technology-enabled Crime

Theory of Technology-enabled Crime, Policing, and Security Overview of Theory of Technology-enabled Crime, Policing, and Security in relation to cyber crime: [1] Resources Notes and References 1. By Samuel C. McQuade, III See Also Types of Cybercrime Cybercriminal Further Reading […]

Cyber Whimsy

Overview of Cyber Whimsy in relation to cyber crime: [1] An Abuse of Time and System Resources Given the anonymity provided by Internet contact, it is not a surprise that a cyber whimsy approach to contact with unknown others has matured and blossomed. Individuals using the Web have […]

Preventing Cybercrime

Overview of Preventing Cybercrime in relation to cyber crime: [1] Protection at Work or School Although companies and schools provide some network-based protection for your computers and may require the use of specific security software and practices, they cannot stop you from doing […]

Warez Groups

Overview of Warez Groups in relation to cyber crime: [1]Warez members are typically categorized according to their primary role within the group. Leaders manage and direct other group members, determining which types of software, music, and movies to crack and release. Suppliers locate and […]

Youth Social Networking

Digital Youth Culture and Social Networking Overview of Digital Youth Culture and Social Networking in relation to cyber crime: [1]For millions of young people, cyber spaces are becoming more important than physical places that society has traditionally established to accommodate youth […]

Corporate Espionage

Overview of Corporate Espionage in relation to cyber crime: [1]In today's global marketplace a corporation's reputation and trademark brand recognition may also be a prime target of sabotage combined with corporate espionage. For example, damaging manufacturing apparatus or […]

Cyber Safety Initiatives

Cyber Safety and Ethics Initiatives Overview of Cyber Safety and Ethics Initiatives in relation to cyber crime: [1]Beginning in 2006, The Cyber Safety and Ethics Initiative was initiated in the Greater Rochester and upstate New York region. This was significantly influenced by research […]

Academic Misconduct

Overview of Academic Misconduct in relation to cyber crime: [1]Students frequently use the Internet to do homework assignments and research information for term papers. Some students actually purchase papers written by other authors to use as their own, or they copy and paste large amounts […]

Botnets

Botnets, Zombies, and Remote Control Attacks Overview of Botnets, Zombies, and Remote Control Attacks in relation to cyber crime: [1]Some botnets have begun to use other communications mechanisms besides IRC, including peer-to-peer (p2p) protocols that eliminate dependence upon a botnet […]

Famous Cybercriminals

Famous Cybercriminals Overview of Famous Cybercriminals in relation to cyber crime: [1]Kevin Poulsen, a skilled computer and telephone network hacker, began his criminal career early in life. Caught breaking into private and government information systems, Poulsen was recruited as a […]

Malware

Overview of Malware in relation to cyber crime: [1]While malware is rampant on the Internet and cannot be completely prevented (short of disconnecting a computer from any network whatsoever, including the Internet), some common steps can be taken to reduce the likelihood and impact of […]

Adult Entertainment

Adult Entertainment and Pornography Overview of Adult Entertainment and Pornography in relation to cyber crime: [1]The Web has also created multiple venues for consenting adults to directly engage each other in online sexual conversations via chat rooms, instant messenger programs, and […]

Online Addiction

Overview of Online Addiction in relation to cyber crime: [1]Arousal patterns are another indicator of addiction. People can become aroused by numerous activities, and each individual has his own unique method of gaining satisfaction. Therefore, some people will use alcohol, drugs, sex, […]

Banking Online

Overview of Banking Online in relation to cyber crime: [1]Other concerns have to do with online financial services not being readily available or experiencing technical difficulties that impinge of the ability of consumers tomake fund transfers when desired or needed. Ideally, online […]

Phreaking

Overview of Phreaking in relation to cyber crime: [1]In 1971, Ron Rosenbaum published ''Secrets of the Little Blue Box'' in Esquire magazine, placing phreaking into public view. The article included interviews with famous phreaks, including Joe Engressia and John Draper (aka […]

Critical Information Infrastructure

Overview of Critical Information Infrastructure in relation to cyber crime: [1]U.S. critical information infrastructure relies on a limited number of large computer networks for the exchange of data, including the Internet, Internet II, and MILNET. Each of these networks is composed of […]

Denial of Service Attacks

Overview of Denial of Service Attacks in relation to cyber crime: [1]Distributed denial of service (DDOS) attacks are even more threatening to information systems. In these types of attacks infected systems called botnets that have previously attacked and effectively been taken over are […]

International Cybercrime Laws

International Cybercrime Laws and Agreements Overview of International Cybercrime Laws and Agreements in relation to cyber crime: [1]Given these challenges, how can national interests be safeguarded in the face of differing international interests and priorities? How can individual […]

Malware Incidents

Overview of Malware Incidents in relation to cyber crime: [1]On March 26, 1999, New Jersey resident David Smith released the Melissa Worm by using a stolen America Online account to post a message promising access to pornographicWeb sites on the Alt.sex newsgroup. The worm infected […]

Careers in Investigating Cybercrime

Careers in Investigating and Preventing Cybercrime Overview of Careers in Investigating and Preventing Cybercrime in relation to cyber crime: [1]In 2008 the vast majority of employment opportunities having to do with investigating and preventing cybercrime were in rather large government […]

Phishing

Overview of Phishing in relation to cyber crime: [1]Typically the message will describe an urgent need for the recipient of the message, a possible cybercrime victim, to click on aWeb link embedded within the text message in order to confirm or restore some aspect of a computer account they […]

Professional Misconduct

Scientific and Professional Misconduct Overview of Scientific and Professional Misconduct in relation to cyber crime: [1]Since the Internet was transformed into the World Wide Web in the mid-1990s making the Net much easier and more popular to use, scientific and professional misconduct […]

Wardriving

Wardriving and Wardialing Overview of Wardriving and Wardialing in relation to cyber crime: [1]There are two types of wardriving, active and passive. Active wardriving occurs when a wireless device is used to contact the wireless access point that it is searching for. Once contact is made, […]

Children Online Legislation

Overview of Children Online Legislation in relation to cyber crime: [1]Legal issues pertaining to the need to protect children and youth online are now being considered in the context of a world in which young people are so familiar with the use of information technologies that they may […]

Cybercrime Investigation

Dedicated Cybercrime Investigation and Prosecution Units Overview of Dedicated Cybercrime Investigation and Prosecution Units in relation to cyber crime: [1]Cybercrime and the need for specialized cybercrime investigation and prosecution units is becoming more important as reflected in the […]

Cybercrime Attacks

Overview of Cybercrime Attacks in relation to cyber crime: [1]Today hundreds of millions of computers are simultaneously connected to the Internet. This along with weak (although improving) information security practices by organizations and computer users throughout the world make major […]

Cyberterrorism

Overview of Cyberterrorism in relation to cyber crime: [1]In October 2002, a denial of service (DOS) attack targeted the 13 primary domain name servers (DNS) that control Internet functioning. Called the ''largest and most complex'' attack in Internet history, it caused […]

Organized Cybercrime

Overview of Organized Cybercrime in relation to cyber crime: [1]People ''marked for con'' were targeted usually because of their wealth as well as on the basis of advance intelligence gathering by the fraudsters about their personal weaknesses, desires, and greedy tendencies […]

Theories of Cybercrime

Overview of Theories of Cybercrime in relation to cyber crime: [1]Beginning in the nineteenth century new scientific methods led to discoveries having to do with trait theory. This group of theories basically argues that people commit crimes because of their biological and/or psychological […]

Falling in Love Online

Meeting and Falling in Love Online—be Careful! Overview of Meeting and Falling in Love Online—be Careful! in relation to cyber crime: [1]Unfortunately, many people who engage socially online are deceived by the person or persons with whom they interact. Many people lie about […]

Computer Emergency Response Team

Overview of Computer Emergency Response Team in relation to cyber crime: [1]CERT/CC® was charged with developing research capabilities in the area of security analysis and education capability in the areas of incident prevention and handling. Resources Notes and References 1. By Jim […]

Arpanet

Overview of Arpanet in relation to cyber crime: [1] Resources Notes and References 1. By Eric Walter See Also Types of Cybercrime Cybercriminal Further Reading Internet history from ARPANET to broadband. (2007). Congressional Digest [serial online], 86(2), 35–64; Leiner, B., […]