Textbook Notes (270,000)
CA (160,000)
U of G (10,000)
SOC (1,000)
SOC 2700 (100)
Chapter 14

SOC 2700 Chapter Notes - Chapter 14: Transnational Organized Crime, Cyberwarfare, Computer Virus

Course Code
SOC 2700
Reza Barmaki

This preview shows page 1. to view the full 4 pages of the document.
Chapter 14
High- Tech Crime
High crime are emerging that contain combined elements of fraud, theft, swindles, and false claims
The technological revolution has provided new tools to misappropriate funds, damage property, sell illicit
material, or conduct warfare, espionage and terror.
Cybercrime: a new breed of offences that can be singular or ongoing, but typically involve the miss/use of
information, resources or funds through the use of computers, networks and the internet
With new tools and opportunities, organized criminals have morphed from local gangs into transnational
criminal organizations whose illegal activities cross borders
Criminals are becoming more technologically sophisticated, using the internet to carry out their criminal
The widespread use of computers and the internet has ushered in the age of information technology (IT) and
made it an intricate part of daily life in most industrialized societies. It is key to the economic system and will
become more important as major industries shift their manufacturing plants to areas of the world where
production is much cheaper
Information technology: the use of computer networks and communications for education and commerce
The process of globalization creates transnational markets, politics and legal systems- a global economy
3 types of cybercrime:
Cyber theft: the use of computer technology to commit traditional crimes, such as fraud and modern offences,
such as identify
Another type of cybercriminal is motivated less by profit and more by the urge to commit cyber vandalism or
technological destruction
Cyber vandalism: the use of computer technology for malicious purposes, such as brining down business
Cyber war: the use of computer technology and communications to disrupt networks of foreign governments.
It is political, involving espionage and even cyber terrorism: an effort by convert forces to disrupt the
intersection between the virtual electronic reality of computers and by the physical world (ie: China against US
in 2014)
This new array of crimes presents a compelling challenge for the justice system and law enforcement
community because (a) these new crimes are rapidly evolving (b) they are difficult to direct through traditional
law enforcement channels and (c) their control demands that agents of the justice develop technical skills that
match those the perpetrators
Cyber and transnational crimes also present a significant challenge for criminologists because they defy long
held assumptions about the causes of crime
Computer Crimes
The widespread use of computers for business transactions has encouraged people to also use them for illegal
purposes such as:
1. Theft of services or using the computer for unauthorized purposes
2. Use of data in a computer system for personal gain
3. Unauthorized use of computers employed for financial processing to obtain assets
4. Theft of property by computer for personal use or conversion to profit
5. Use of a computer as the object of a crime such as spreading a computer virus
find more resources at oneclass.com
find more resources at oneclass.com
You're Reading a Preview

Unlock to view full version