The Job That Was Too Good To Be True

Read Complete Research Material



The job that was too good to be true



The job that was too good to be true

Introduction

The present study was the result of long time collection and analysis of safety reports from various intelligence agencies and research that currently embedded in the analysis not only for prevention but also in the fight against cybercrime.

The new offenses technological progress day by day and with them, who studied the modern world internet has gestated, concerned about the progress of the new risks that put in suspense governmental infrastructures we seek cooperation of governments to combat and prevent technological crime.That is the Computer Crime

“Computer crimes "are all those illegal acts that could be sanctioned by criminal law, abusing any means of computer. The Computer Crime involves criminal activity that initially countries have tried to fit into typical figures of traditional, such as robbery, theft, fraud, forgery, damage, fraud, sabotage, etc. However, it should be noted that misuse of computers has prompted the need for regulation by the law. Since there is a complete security, the scope for a new security incident has always important, therefore, when it occurs, takes place in a high percentage that organizations not prepared to face the reality of an intrusion or incident.

An incident is a challenge to demonstrate the diligence of organization to face the fact, take control, collect and analyze evidence, and finally generate the report into the incident, including security recommendations and concepts about the facts of the incident (Pittaro, 2011).International Background

125 cyber criminals arrested in the United States, Timothy Muris, director of the Federal Trade Commission, is proud to the success of Operation Cyber Sweep call (cyber sweep)."The cyberspace is not the same as outer space, and we can track down and arrest anyone". Since the operation began last Oct. 1, it found that among all the scams committed by these people, cyber criminals have pocketed more than $ 100 million belonging to about 125,000 victims in recent months, so no wonder that in addition to the Trade Commission, FBI, Secret Service and up to 34 lawyers led by the Department of Justice United States were on her trail.

Among the cases covered, is the designer John William Racine II, guilty of redirecting web traffic wing of Al-Jazeera his own, where one could see an American flag. The prosecutor has asked for three years probation and a thousand hours of community service. Helen Carr has been declared guilty also simulate America Online emails and send to customers, asking them to update their credit card information (this known as "phishing").

In the first nine months of 2003, the Center for Internet Fraud Complaint, a joint project of the FBI and National White Collar Crime Center, 58392 reported frauds related to Internet, in contrast to the 48,000 complaints received throughout 2002 (Ferraro, 2005).

Two teenagers from the town of Cloverdale, San Francisco (U.S.) charged with computer sabotage. Through a network, of local Internet (Netdex Internet Services), mocked security keys and entered banking information essential for various government agencies among others, a data ...
Related Ads