Tuesday, May 4, 2010
Based on the Grabosky , we can classify crime in cyber space at nine types. One is the theft of information services, which may involve the "cloning" of cellular phones, counterfeiting of telephone cards, and unauthorized access to an organization's telephone switchboard. The second crime discussed involves communications in furtherance of criminal conspiracies. In this regard, there is evidence of information systems being used to facilitate organized drug trafficking, money laundering, child pornography, and trade in weapons. A third type of offense encompasses a range of activities collectively referred to as information piracy, counterfeiting, and forgery. Digital technology permits perfect reproduction of software, text, images, sound, and combinations of these. The potential for copyright infringement, falsification of documents, and fabrication of negotiable instruments has never been greater. Other crimes discussed pertain to the dissemination of offensive materials, electronic money laundering, electronic vandalism and terrorism, sales and investment fraud, the illegal interception of information, and electronic funds transfer fraud. Countermeasures are discussed under the topics of prevention, the harnessing of nongovernmental resources, enhancement of the capacity of law enforcement, and the fostering of international cooperation.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment