Internet Crime Prevention: Share your thoughts about people……(2020)
THE PAPER HAS ALREADY BEEN DELIVERED: AVOID PLAGIARISM
Share your thoughts about people who have found the Internet to be a useful tool for perpetrating crimes, conducting terrorism, and even waging war. Link theories and statistics to your ideas and opinions when explaining how situations should be handled by law enforcement and e-business professionals.
You may find this website valuable when seeking additional information on Internet Crime Prevention Tips: http://www.ic3.gov/preventiontips.aspx
The following requirements must be met:
- Write between 1,500 – 2,000 words using Microsoft Word in APA 6th edition style.
- Use an appropriate number of references to support your position, and defend your arguments. The following are examples of primary and secondary sources that may be used, and non-credible and opinion based sources that may not be used.
- Non-credible and opinion based sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. should not be used.
- Non-credible and opinion based sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. should not be used.
- Cite all reference material (data, dates, graphs, quotes, paraphrased statements, information, etc.) in the paper and list each source on a reference page using APA style. An overview of APA 6th edition in-text citations, formatting, reference list, and style is provided here.
Over the years, crime can be considered to have evolved as changes in technology also occur in the society. Traditionally, most instances of crime occurred through means that required the perpetrators being physically involved in committing the vices. However, with developments in technology, especially in the information technology, crimes can be committed remotely and yet have more severe effects as compared to those committed by individuals physically. This discussion therefore discusses some of the ways through which the internet can be used in crime perpetration, waging wars and conducting terrorism. Thereafter, the discussion will then present through which such situations can be handled by law enforcement officers as well as e-business professionals.
- The Internet as a tool for perpetrating crimes.
In the present age, a lot of people are connected to devices which provide them with internet access regardless of their location. This connectivity implies that individuals are able to interact seamlessly despite the various geographical barriers that exist between them. While this connectivity has been hailed by many as an advantageous situation, it has brought along various problems. According to a paper published by Tenel et al, there has been a surge in the increase of individuals who are committing sexual offenses through the internet over the past few years. Their research revealed that sex offenders have utilized online communication channels to lure their victims, who are mostly minors, into traps which then leads to the sexual assaults of the latter (Tener, Wolak, & Finkelhor, 2015). The internet has also provided an avenue for which other forms of crime can be committed. These include crimes such as illicit drug trade, sex trafficking between countries, continued hate speech and racial discrimination content and other cloud based cyber attacks such as DDoS attacks, Data theft, mass spam attacks and mass cyber dependent crimes. All these categories of crimes have been found to have significant detrimental effects on victims either individually or as an organization.
2. The internet as a tool for conducting terrorism
Aside from aiding malicious individuals with a platform of easily conducting criminal activities, the internet has over the years been used in a myriad of ways to conduct terrorist activities. The use of internet in terror activities can broadly be categorized into six distinct phases according to the United Nations Office on Drugs and Crimes. To begin with, the internet can be used by terrorist organizations to spread propaganda among the masses (United Nations Office on Drugs and Crime, 2012). To advance their malicious courses, terror organizations may resort to sharing various forms of information such as magazines, videos, speeches and other electronic media containing information that can be termed as radical. Usually, such forms of information spreading is meant to target potential recruits by touching on fundamental aspects such as religion and bureaucracy. In addition, propaganda primarily serves to instill fear among individuals therefore making them even more submissive to the terror groups. Financing terror groups and their associated activities is also another way in which the internet has been widely used in conducting terrorism. Terrorist groups have devised numerous ways of obtaining funds from the masses to be used in purchasing weapons used for their courses as well as facilitating other activities. Common ways through which the groups are able to obtain funds through the internet include posing as charitable organizations, defrauding various e-payment methods and direct solicitation (United Nations Office on Drugs and Crime, 2012). Various notable examples have been witnessed where such groups have received huge amounts of money through the internet. Al-Qaeda for instance obtained over 1.6 million Euros through the theft of over 1400 credit cards in the United Kingdom. A common reason why the internet is commonly used by terror organizations to fund their activities is because transaction of large amounts of money cannot be easily
tracked, especially when the money follows multiple routes.The internet is also widely used for training, planning and execution of terrorist activities. Terror groups have been noted to post training materials on various sites which act as tutorials which their recruits may follow in order to carry out terrorist attacks (United Nations Office on Drugs and Crime, 2012). Such information may be in the form of periodicals or other forms of multimedia and may contain information ranging from how to use various forms of ammunition to how come up with customized explosions. To plan their activities, terror groups can rely on the remote internet connections to share encoded messages on how to coordinate any form of planned attacks. Using channels which cannot be easily deciphered, terror groups are able to pass across information on how they intend to carry out their attacks. Finally, execution of terrorist attacks can be implemented through the internet in various ways. Organizers of various attacks may provide the green light for attacks to be launched remotely via the internet. Cyber attacks, such as the one witnessed in Israel back in 2012 may also be used to implement acts of terror to victims (United Nations Office on Drugs and Crime, 2012).
3. Using the Internet to Wage war
Though unlikely, the internet can also be used to wage war between countries. According to an article published by CNN, internet sabotage between countries can lead to the escalation of conflict which would eventually lead to war between countries. Other internet based activities such as spying or hacking could also leads to aggression between states since it would be considered a breach of privacy (Rushkoff, 2015). Nevertheless, while the author of the article admits that instances of internet attacks between countries are likely to occur, the author further asserts that such occurrences would have detrimental effects to both parties and thus the possibility is far from being a reality. The article states that most countries are connected to the global internet network, implying that various crucial departments are connected to the global internet. Therefore, disrupting the internet connection would imply that crucial departments in both parties would suffer, thus making it illogical to take part in such acts of sabotage (Rushkoff, 2015).
4. Handling Internet Crime
The first step that law enforcers can use to handle internet-based criminal activities is by educating internet users on the various dangers associated with online transactions. Internet users should be discouraged from revealing their personal information to unknown personnel since such revelations can lead to devastating effects. According to the study conducted by Tenel et al, 32% of internet based sexual assaults occurred as a result of the perpetrators having targeted groups of easily available victims in social networking sites. Minors are especially at high risk and therefore targeting them in the education program would significantly contribute in reducing instances of internet based sexual assaults (Tener, Wolak, & Finkelhor, 2015).
Countries can also be actively involved in combating terrorist activities conducted through the internet by setting up special divisions dedicated towards identifying and mitigating any form of malicious transactions. Presently, countries such as the United States and the United Kingdom have departments which have been actively involved in tracking online transactions. In the United States for instance, special task forces have been set up with the main mandate of cracking down on companies which lack an elaborate anti-money-laundering or counterterrorism measures. Furthermore, the country has further sought external companies which offer financial services to citizens of the country without complying with the local laws. These strategies, together with the shutting down of companies with dubious transactions through collaborations with local Internet Service Providers demonstrates the United States’ dedication towards combating funding of terrorist organizations via the internet (Jacobson, 2010). The United Kingdom has also been observed to follow the same approach by setting up a cybercrime coordination department tasked with the objective of ensuring that it tracks down any instances of occuring in the local internet domain (Jacobson, 2010).
Nevertheless, while different countries may enforce different regulations to help in combating cybercrime, it is important to acknowledge the fact that due to its wide domain and secrecy, the internet can be explored in various unknown ways to carry out various undesirable acts. It is therefore necessary to keep on improving on the security strategies being put in place to ensure that the safety of the internet is maintained.
Jacobson, M. (2010). Terrorist Financing and the Internet. Studies in Conflict & Terrorism, 33(4), 353-363. doi:10.1080/10576101003587184
Rushkoff, D. (2015, October 29). Russia, the Internet and a new way to wage war? Retrieved from https://edition.cnn.com/2015/10/28/opinions/rushkoff-internet-cables-russia/index.html
Tener, D., Wolak, J., & Finkelhor, D. (2015). A Typology of Offenders Who Use Online Communications to Commit Sex Crimes Against Minors. Journal of Aggression, Maltreatment & Trauma, 24(3), 319-337. doi:10.1080/10926771.2015.1009602
United Nations Office on Drugs and Crime. (2012). The use of the Internet for terrorist purposes.