Traditionally, the term “computer crime” usually referred
to the theft of computers or computer components Then came : cyberage New asset : Information In 2011, e-commerce amounted to nearly $200 billion in the United States alone. 16.1 percent increase over 2010 figures Legislative bodies have been slow to respond to the potentiality of contemporary computer crime in the twenty-first century The marriage of computer and telecommunications has resulted in an explosion of the crime Impression of anonymity Recent cases indicate that computer dependency and globalization of communication have been exploited by individual, group, and government hacking entities Other implications of computer crime include 1. financial losses, 2. personal security (i.e., identity theft), 3. industrial espionage, 4. international security, 5. public safety Six categories of online crime
Interference with lawful use of computers—DOS
attacks, viruses, worms, other malware, cybervandalism, cyberterrorism, spam, etc. Theft of information and copyright infringement— industrial espionage, ID theft, ID fraud, etc. Dissemination of contraband or offensive materials —pornography, child pornography, online gaming, treasonous or racist material, etc. Threatening communications—extortion, cyberstalking, cyberharassment, cyberbullying, etc. Fraud—auction fraud, credit card fraud, theft of services, stock manipulation, etc. Ancillary crimes—money laundering, conspiracy, etc. LIMITLESS
While the impact of a traditional mail bomb was
limited to the physical area surrounding the packaging, the implications of e-mail bombs are limitless in their application and may include a complete dismantling of a company’s informational infrastructure.