With the growing presence of the internet, it is becoming a target of lucrative organized crime for criminals. The internet is present in all aspects of our daily lives, and is essential to businesses. In this paper, we will study the nature of digital crime, and the challenges that it poses for criminal law.
Table of Content
Abstract2
Introduction4
Discussion5
Digital Terrorism5
Digital crime5
International Scope of Digital crime6
Different ways of digital crime6
US Response7
Terrorists' use of the Internet7
Digital-Attacks Common Goals8
Types of Attacks9
Vulnerability of Computer Networks9
Impact of Digital Crime on the Internet Banking10
Activities and Implementation11
Conclusion12
References13
Digital Crimes
Introduction
The potential for electronic government to make changes in technology has been emerging since many years. Since computers started to appear in government organizations, officials started to predict that there will be major changes in technology to assist public, as well. With the emerging information and communication technologies (ICTs), all organizations begin to consider government as the information age government. With the widespread use, of the Internet by both society and the government, seems to offer real possibilities for change in citizen-government relationships just as new channels of communication and transaction have opened up new possibilities for the relationship between shops and banks and their customers in countries with high levels of Internet penetration.
The key threats to security that the government has observed in the country can be categorized as follows:
Worms that are malicious computer codes that disrupt government systems; those are deliberately targeted and picked up from the Internet accidentally.
Usage of online techniques by one country on another to get political or economic pressures for the other country.
Theft of intellectual property with both commercial and national security implications
Discussion
Digital Terrorism
The digital-terrorism comprise of violent actions that strike terror carried out by one or more people on the Internet or through the improper use of communications technologies.
These groups prepare their shares through encrypted messages through email, preventing the penetration of the security agencies of states. Digital-terrorists are the people who want to radically, and entirely abrupt the democratic form of governments and established social system (Colarik, 2006).
Digital-terrorism is a low-cost weapon. However, it requires highly trained and dedicated people. At the same time, it remains difficult to track and cause damage to the enemy. Other than the traditional point of view of war and tactical, military doctrine, digital war and digital-terrorism incorporates other variables than the traditional battlegrounds (land, air and sea). These include two new fields which are the digital-space and information (Gustin, 2007).
Digital crime
Digital crime is a major problem for businesses, and “pose the most potentially damaging threat to IT-related activities, transactions, and assets”, which involve money. There is a large underground economy for digital crime, which “includes organized crime, hackers for hire, disgruntled current and former employees, and other insiders (meaning people who have or had authorized access), and terrorists and their supporters”. The types of digital crimes include “thievery, fraud, and misdirection of communication, identity theft, intellectual property theft, corporate espionage, system sabotage, data destruction, money laundering, and terrorism.”