Professional Documents
Culture Documents
1.0 Inroduction: Hacking, Piracy, and Cyber Terrorism
1.0 Inroduction: Hacking, Piracy, and Cyber Terrorism
1.0 Inroduction: Hacking, Piracy, and Cyber Terrorism
0 Inroduction
Computer crime law transactions with the broad space of criminal offenses
committed using a computer or the same electrical implement. Almost all of these
offenses are commit online. The internet affords a degree of secrecy to offenders,
as well as potential admission to individual, business, and administration data.
Most of computer crimes are committed as a means of larceny money or valuable
material, however financial gain is not always the objective. In statistic, a big
amount of the notorious incidents of computer crime included hackers seeking
“bragging rights” by overcoming administration or corporate cyber safety
measures.[ CITATION HDO14 \l 1033 ]
Hacking, Piracy, and Cyber Terrorism
Hacking is one most popular types of computer crime.In this case, this part applies
to the unauthorized admission of another’s computer structure. These invasions are
often conducted in order to introduction malicious programs known as viruses,
and Trojan Horses that can shut down or break an entire computer system.
Cyber terrorism is a comparatively fresh appearance. All these crimes involve
politically-motivated bouts to targets such as administration websites or profitable
networks. Such attacks are designed to be huge in scale, and to create awe and
fright among the victim population. With economic fairs now commerce over the
network now so many other deal with taking place online, the danger of cyber
terrorism has obtained a great deal with of consideration. But, actual instances of
this type of crime are rare.[ CITATION HDO141 \l 1033 ]
Cyber Stalking, is a kind of online harassment, which is operated by a person subjected to blast online
communications. Typically, these stalkers know their exploited to make their lives more hopeless.
[ CITATION War12 \l 1033 ]
It is when someone deletes files from their own system; maybe no longer need them
or maybe they delete them by mistake. This is considered fine because there was no
intent to cause any damage. So this offence relates to the deletion or changes made to
files with intent to cause damage to an individual or a corporation. This offence also
covers purposely introducing viruses to other peoples’ system.
4. Making supplying or obtaining material that could use in computer misuse
offences, this includes writing or creation of computer viruses, worms, malware,
and scripts. If a person purposely obtains malicious files such as computer viruses
or scripts which could damage computer then the person is under an offence of
computer misuse act. For this type of crime a year prison sentence is obtained.
CMA 1990 of UK parliament is the baseline for computer act which helps to limit
the computer misuses. [ CITATION Law90 \l 1033 ]
b. Case 1:
A computer hacker was spared prison after the sale of virtual objects that he had
stolen break in the count of the players of fantastic game. Stuart Jeffery, defense, declared
Burrell was "mad" and used fantastic to treat problems in the real world. He added: «He is a
rational human being normal, line of conduct of which apparently caused a lot of troubles. He
used a dream world to try to regulate problems in the real world, which was financial and linked
to games of chance. Burrell was delayed an order of the community of 12 months and made to
perform 150 hours of not remunerated employment. He was also compelled to pay £ 100 costs
and a compensatory £ 60 amend, and to abandon his two computers.[ CITATION www1423 \l 2057 ]
c. Case 2
Lewys Martin, 21 years old made sites fall by scourging them with requests of
information. The police said that it attacked three Websites between January 29th and February
2nd of last year. Martin had pled guilty in nine offences during a previous audience to Maid
stone Crown Court. Martin accepted five counts of indictment of acts not allowed with the
intention of hindering the functioning of the computer, three accesses not allowed with the
intention of making other offences and that of the not allowed access to the equipment of the
computer. He was imprisoned during two years to attack the sites of Oxford and of Cambridge
universities and the police of the Kent.[ CITATION www1424 \l 2057 ]
d. Case 3
Three teenagers who founded and ran one of the biggest forums of crime on Internet of
English language of the world, described in court as "Chromebook", were condemned for a
maximum of five years of detention. The police thinks that the losses of the thousands of details
of credit negotiated on the site, Gh0stMarket.net, going up to 16,2 million £. Nicholas Webber,
owner and founder of the site, was stopped in October, 2009 with the administrator of the site,
Ryan Thomas, having tried to pay a bill of hotel £ 1000 using the co-ordinates of stolen cards.
They were then 18 and 17. Webber was imprisoned during five years on Wednesdays and
Thomas during four years.[ CITATION www1425 \l 2057 ]
Case 1
Case 3
Case 4