Special Issues Paper

Read Complete Research Material



Special Issues Paper

Special Issues Paper

Question 1

Cyber Crime in Past 10 Years

Despite the global recession, increased safety and greater international engagement in terms of repression, crime has flourished in the last ten years, with a double-digit growth, year after year. To consider this growth in perspective, just take account of the fact that, according to the Internet Crime Complaint Center of the FBI, the losses recorded by the agency that filled by the users only in the United States alone almost reached to the double figures within only a year 2008 to 2009, reaching to almost $ 560 million.

And at the same time, the reports of users have increased by more than 22 percent. The increase in reports is not surprising, given the large amount of software elements infected computers to which they are exposed online, including virus, worms and fake security software. In 2010, McAfee found a normal of sixty thousand new items malware per day. In addition, most of these fresh threats are bound to sites within which the user lowers the defenses and interact with friends and family: the social network sites.

Unfortunately, McAfee  has recently reported that malware aimed at social media is now the fastest growing type. As if that were not enough, recent events have shown further that cybercrime has reached new levels of maturity and diffusion. Fight against cybercrime at international level is both a necessity and a challenge. The Cybercrime has no borders - even if we still see it - and judicial systems, cultures, create physical boundaries as barriers to effective control of these forms of delinquency. After a little more than twenty years of activities, initiatives and successes dispersed but convincing, United States and Europe in the fight against cybercrime seems to take a new turn with the creation of a true common tool, a European Centre for the fight against Cybercrime and Internet Crime Complaint Center of the FBI - announced by the Council of the European Union on 29 April 2010 and should be released in 2013 (Rahman, et. al., 2011). After going through the issues and the different stages of this struggle, we will consider some of components that seem essential for these new tools.

Small back on history

Indeed, if we look at the evolution of the last 10 years, these phenomena play magnitude increased progressively acceptance of technology in society. The tool staff appeared in the late '70s and began to develop in the early 80s. This is primarily as supporting evidence that investigators rubbed computer by necessity to access accounting firms in financial affairs. But they are also objects and use more fun that developed. At that time, the only specific real crime was the circulation of illegal copies of software, sometimes sold by the hardware supplier. At the same time, more discreet, the ancestors of today's hackers were engaged in phreaking, free calling through blue box or breaking into the computers of companies, banks or research centers, by connecting to modems that allow dialogue between systems then.

In October 1984, security telematic system is British Prestel undermined by journalists curious and persistent than others who are famous in revealing the content of the email inbox Prince ...
Related Ads