Cybercriminals

Superior Essays
Cybercriminals and the Criminal Justice System.
Criminals have always been part of society. As far back as the code of Hammurabi, written approximately 1680 B.C.E. civilization has made laws to govern men (Code, 2013). Why? Because, according to written records, crime has been with society as long as man has been civilized. There is no way to know for sure, but crime was probably around during the caveman era. Laws ensure that men can live together and prosper.
Criminals have always used the tools at hand, such as clubs and pointed spears in early times. It is only natural that criminals would gravitate towards computers and the Internet for their crimes in the modern era. Over time, criminals have become more sophisticated, and so
…show more content…
A group of teenage boys hired by Bell Telephone to run the switchboards misdirected or disconnected phone calls. They were not called hackers, but their actions were considered a practical joke. They were, obviously, fired (Trigaux, 2000). The earliest instance of genuine computer hacking occurred in the 1960s. The next instances of cybercrime could be traced back to the practice of ‘phreaking’, which was hacking into telecommunication systems for the purpose of getting free phone calls. It began in the late 1950s and continued into the 1960s. They built devices called blue, black, and red boxes which allowed them to explore the network, make free phone calls, and even use them to ‘wiretap’ people (Acker, 2009). They used phone codes and tones to manipulate the telecommunication lines. In 1969 work began on ARPAnet, the grandfather of the Internet (Bellis, 2016). This opened the door to the beginnings of cybercrime.
At first, the term ‘hacker’ stood for a highly skilled person who could make a computer do more than it was originally programmed to do. A ‘hack’ was a programming shortcut, and one of the most famous ones was created in 1969 by Bell Laboratories employees Dennis Ritchie and Ken Thompson, and it was called UNIX. The first major hack occurred in 1971 by a man named John Draper. It was actually called ‘phreaking’, and it was the turning point at which ‘hacking’
…show more content…
Police agencies are having their officers take training classes in order for them to combat this threat. With the understanding of the technology comes the ability to investigate the crimes properly (South University Online, 2016). Cybercrime is here to stay, and the only way to combat it is by having well-trained officers. It should be a requirement for all new recruits that they either have a degree in some area of Information Technology, as well as Criminal Justice. For veteran officers, special training classes must be mandated. Everything is becoming computerized, and the police forces should be too. Law enforcement can keep up with ever changing cybercrimes, but it will take time and

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    The author, Steve Lillebuen, is a journalist who wanted to uncover the truth behind the layers of exaggeration and falsehoods that merged with real life in Mark’s case. He wanted to write the factual account of these events so he could document the story’s historical value and impact on present generation. This non-fictional narrative has been drawn from extensive research during Steve’s time as a police reporter at the Edmonton Journal and continuing on for years as the case progressed. The writings of this narrative clearly demonstrate the impact of digital and internet culture today.…

    • 178 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In the article “Internet Trolls” by Lisa Selin Davis, she talks about people who spread negativity on the internet. According to her article, people leave nasty comments on the internet because they feel like they are alone and can hide behind the computer. Also, they want to get a reaction out of people and gain attention, so they say harsh, hurtful comments. She believes people don’t think before they type. These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    More and more, criminals are using technologically advance…

    • 1447 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The study of crime and its various components have always been treated as the interdisciplinary studies. Though its predominance is highly concentrated among criminologists and sociologists, but even psychologists and political scientists have been actively involved in various aspects of crime. However, Economists are considered as the novice entrants. It was only after the work of Gary Backer in 1968 that started the post modern economists’ work on crime and criminal justice. Since then it has generated a growing flurry of articles on crime from the various economic perspectives.…

    • 1364 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    People have been trying to stop crime for many years and current and future technology may hold the answer. Science fiction author Ray Bradbury gives us a glimpse into the near future in his short stories, and shows us that the key to a crimeless future may be soon at hand. Technology will lead to the end of crime. Admittedly technology can be attributed to many problems in the world today such as bullying. nobullying.com says, “ Cyber bullying came in… with 17 percent of the reports involving cases that were associated with the internet.”…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Uniform Crime Report

    • 1554 Words
    • 6 Pages

    Crime is everywhere. Whether it is realized or not, there is no single place on earth without some type of crime. Theft is the most practiced crime in all parts of the world. When compared to the number of theft-related crimes, violent crime is, in reality, an extremely rare event. It simply appears to be more prevalent than it actually is since it is the most sensualized event in the media.…

    • 1554 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    London Rioting Sociology

    • 289 Words
    • 2 Pages

    Recently the telegraph wrote a bold heading: ‘London rioters have committed nearly 6,000 new crimes, including murder and rape, since they plunged the capital into chaos more than three years ago, new figures have revealed.’ The deputy mayor for policing and crime in London, said the figures, released by the Met Police under the Freedom of Information Act, showed the criminal justice system needs to "up its game". "Londoners remember how a minority of violent thugs caused mayhem in August 2011”. (Greenhalgh, S) .…

    • 289 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    A black-hat-hacker is one who discovers vulnerabilities and uses it for their own benefit. One such hacker named Kevin Poulsen in the 80’s hacked into telephone lines for a Los Angeles radio station. By doing so, he was the 102nd caller and won a Porsche 944 along with other prizes. He was on the FBI’s most wanted list when he hacked into federal systems and stole wiretap information. In 1991, he was captured.…

    • 242 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Crime is and always will be existent in society. Law enforcement officers tend to do what they can to keep that crime to a minimum, but they will never be able to abolish it completely. The other issue with crime is that there is a lot more of it than one would think. The reason being, that a lot of crimes go unreported. Although this may surprise some people, there are numerous reasons why a victim would not report a crime to the police.…

    • 688 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    When you think of crime and criminals, you probably think of the dangerous looking characters you see played on television or in the movies. But there are lawbreakers like these in real life, too, and you read about their crimes every week in the newspaper you would think to yourself what exactly, is a crime? According to google.com, crime is “an action or omission which contributes an offence and is punishable by law”. There are many types of crime, crimes such as violent crimes which includes murder, and abuse, financial crimes which deals with stealing and fraud. Also, sex crimes which involves rape and lastly drug crimes which includes drug dealing and trafficking.…

    • 1175 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    In this essay I will reflect on the few assumptions and understandings I had about crime and see how they have changed. Upon arriving at De Montfort University to study Criminology and Criminal Justice, I had average knowledge about crime and punishment i.e. insight into biological and psychological perspectives of crime having studied A-level Law and Psychology beforehand. However I did expect to delve so deep into the history and other aspects of Criminology during this first semester. During A-level Law I have read many case studies of murder, manslaughter, GBH, rape etc. I found the main reasons behind committing these crimes were usually motives for revenge, loss of control, hate, rage, and biological inheritance of 'criminal genes ' such as Monoamine oxidase A which makes individuals more prone to exert violence.…

    • 1262 Words
    • 6 Pages
    Superior Essays