{"id":2071,"date":"2019-04-29T07:09:08","date_gmt":"2019-04-29T07:09:08","guid":{"rendered":"http:\/\/www.guyanapoliceforce.gy\/?page_id=2071"},"modified":"2021-10-13T13:44:08","modified_gmt":"2021-10-13T13:44:08","slug":"cyber-crimes","status":"publish","type":"page","link":"https:\/\/guyanapoliceforce.gy\/?page_id=2071","title":{"rendered":"Cyber Crimes"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<b>Cyber crime<\/b>, or\u00a0<b>computer-oriented crime<\/b>, is a crime that involves a\u00a0<a title=\"Computer\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer\">computer<\/a>\u00a0and a\u00a0<a title=\"Computer network\" href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_network\">network<\/a>.<sup id=\"cite_ref-moore_1-0\" class=\"reference\"><\/sup>The computer may have been used in the commission of a crime, or it may be the target.<sup id=\"cite_ref-kruse_2-0\" class=\"reference\"><\/sup>Cyber crime may threaten a person or a nation&#8217;s security and financial health.<\/p>\n<p>There are many\u00a0<a title=\"Privacy\" href=\"https:\/\/en.wikipedia.org\/wiki\/Privacy\">privacy<\/a> concerns surrounding cyber crime when\u00a0<a class=\"mw-redirect\" title=\"Confidential\" href=\"https:\/\/en.wikipedia.org\/wiki\/Confidential\">confidential<\/a>\u00a0information is intercepted or disclosed, lawfully or otherwise. Debarati Halder and\u00a0<a title=\"Karuppannan Jaishankar\" href=\"https:\/\/en.wikipedia.org\/wiki\/Karuppannan_Jaishankar\">K. Jaishankar<\/a> further define cyber crime from the perspective of gender and defined &#8216;cyber crime against women&#8217; as &#8220;Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones&#8221;.<sup id=\"cite_ref-igiglobal.com_3-0\" class=\"reference\"><\/sup>Internationally, both governmental and non-state actors engage in cyber crimes, including <a title=\"Espionage\" href=\"https:\/\/en.wikipedia.org\/wiki\/Espionage\">espionage<\/a>,\u00a0<a title=\"Theft\" href=\"https:\/\/en.wikipedia.org\/wiki\/Theft\">financial theft<\/a>, and other cross-border crimes. Cyber crimes crossing international borders and involving the actions of at least one nation-state is sometimes referred to as <a title=\"Cyberwarfare\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberwarfare\">cyberwarfare<\/a>.<\/p>\n<p>A report (sponsored by\u00a0<a title=\"McAfee\" href=\"https:\/\/en.wikipedia.org\/wiki\/McAfee\">McAfee<\/a>), published in 2014, estimated that the annual damage to the global economy was $445 billion.<sup id=\"cite_ref-4\" class=\"reference\"><\/sup>\u00a0Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US.<sup id=\"cite_ref-5\" class=\"reference\"><\/sup>In 2018, a study by\u00a0<a title=\"Center for Strategic and International Studies\" href=\"https:\/\/en.wikipedia.org\/wiki\/Center_for_Strategic_and_International_Studies\">Center for Strategic and International Studies<\/a>\u00a0(CSIS), in partnership with\u00a0<a title=\"McAfee\" href=\"https:\/\/en.wikipedia.org\/wiki\/McAfee\">McAfee<\/a>, concludes that close to $600 billion, nearly one percent of global GDP, is lost to cyber crime each year.<\/p>\n<div class=\"grey-box grey-box-top\">\n<div class=\"topic-content pt-15\">\n<section id=\"ref235699\" data-level=\"1\" data-has-spy=\"true\">\n<h2 class=\"h1\">Types of cybercrime<\/h2>\n<p class=\"topic-paragraph\">Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/breaches\" data-term=\"breaches\">breaches<\/a>\u00a0of personal or corporate privacy, such as assaults on the\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/integrity\" data-term=\"integrity\">integrity<\/a>\u00a0of information held in digital depositories and the use of illegally obtained digital information to\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/extortion\">blackmail<\/a>\u00a0a firm or individual. Also at this end of the spectrum is the growing crime of\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/identity-theft\">identity theft<\/a>. Midway along the spectrum lie transaction-based crimes such as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/fraud\">fraud<\/a>, trafficking in child\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/pornography\">pornography<\/a>, digital\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/piracy-copyright-crime\">piracy<\/a>,\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/money-laundering\">money laundering<\/a>, and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/counterfeiting\">counterfeiting<\/a>. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>. Another part of this type of crime involves individuals within corporations or government\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/bureaucracies\" data-term=\"bureaucracies\">bureaucracies<\/a>\u00a0deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/spam\">spam<\/a>, hacking, and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/denial-of-service-attack\">denial of service attacks<\/a>\u00a0against specific sites to acts of\u00a0<span id=\"ref1285671\"><\/span>cyberterrorism\u2014that is, the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a nation\u2019s economic and technological\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/infrastructure\" data-term=\"infrastructure\">infrastructure<\/a>. Since the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/event\/September-11-attacks\">September 11 attacks<\/a>\u00a0of 2001, public awareness of the threat of cyberterrorism has grown dramatically.<\/p>\n<\/section>\n<\/div>\n<\/div>\n<div class=\"md-sentinel--page-change undefined\" data-index=\"0\"><\/div>\n<div class=\"infinite-scroll-container page\">\n<div class=\"grey-box \">\n<div class=\"topic-content pt-15\">\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235700\" data-level=\"2\" data-has-spy=\"true\">\n<h1 class=\"h2\"><span id=\"ref829184\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/identity-theft\">Identity theft<\/a>\u00a0and invasion of privacy<\/h1>\n<p class=\"topic-paragraph\">Cybercrime affects both a virtual and a real body, but the effects upon each are different. This phenomenon is clearest in the case of identity theft. In the United States, for example, individuals do not have an official identity card but a\u00a0<span id=\"ref829185\"><\/span>Social Security number that has long served as a de facto identification number. Taxes are collected on the basis of each citizen\u2019s Social Security number, and many private institutions use the number to keep track of their employees, students, and patients. Access to an individual\u2019s Social Security number affords the opportunity to gather all the documents related to that person\u2019s citizenship\u2014i.e., to steal his identity. Even stolen\u00a0<span id=\"ref829186\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/credit-card\">credit card<\/a>\u00a0information can be used to reconstruct an individual\u2019s identity. When criminals steal a firm\u2019s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. For example, they might use the credit card information to run up huge bills, forcing the credit card firms to suffer large losses, or they might sell the information to others who can use it in a similar fashion. Second, they might use individual credit card names and numbers to create new identities for other criminals. For example, a criminal might contact the issuing bank of a stolen credit card and change the mailing address on the account. Next, the criminal may get a passport or driver\u2019s license with his own picture but with the victim\u2019s name. With a driver\u2019s license, the criminal can easily acquire a new Social Security card; it is then possible to open bank accounts and receive loans\u2014all with the victim\u2019s credit record and background. The original cardholder might remain unaware of this until the debt is so great that the bank contacts the account holder. Only then does the identity theft become visible. Although identity theft takes places in many countries, researchers and law-enforcement officials are plagued by a lack of information and statistics about the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/crime-law\">crime<\/a>\u00a0worldwide. Cybercrime is clearly, however, an international problem.<\/p>\n<p class=\"topic-paragraph\">In 2015 the U.S. Bureau of\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/Justice\" data-term=\"Justice\">Justice<\/a>\u00a0Statistics (BJS) released a report on identity theft; in the previous year almost 1.1 million\u00a0<span id=\"ref829188\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/United-States\">Americans<\/a>\u00a0had their identities fraudulently used to open bank, credit card, or utility accounts. The report also stated that another 16.4 million Americans were victimized by account theft, such as use of stolen credit cards and automatic teller machine (ATM) cards. The BJS report showed that while the total number of identity theft victims in the United States had grown by about 1 million since 2012, the total loss incurred by individuals had declined since 2012 by about $10 billion to $15.4 billion. Most of that decline was from a sharp drop in the number of people losing more than $2,000. Most identity theft involved small sums, with losses less than $300 accounting for 54 percent of the total.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235701\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829181\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>\u00a0fraud<\/h2>\n<p class=\"topic-paragraph\">Schemes to defraud consumers abound on the Internet. Among the most famous is the\u00a0<span id=\"ref829190\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Nigerian-scam\">Nigerian<\/a>, or \u201c419,\u201d scam; the number is a reference to the section of Nigerian law that the scam violates. Although this con has been used with both\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/fax\">fax<\/a>\u00a0and traditional mail, it has been given new life by the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>. In the scheme, an individual receives an\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/e-mail\">e-mail<\/a>\u00a0asserting that the sender requires help in transferring a large sum of money out of Nigeria or another distant country. Usually, this money is in the form of an asset that is going to be sold, such as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/science\/oil-chemical-compound\">oil<\/a>, or a large amount of cash that requires \u201claundering\u201d to conceal its source; the variations are endless, and new specifics are constantly being developed. The message asks the recipient to cover some cost of moving the funds out of the country in return for receiving a much larger sum of money in the near future. Should the recipient respond with a check or\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/money-order\">money order<\/a>, he is told that complications have developed; more money is required. Over time, victims can lose thousands of dollars that are utterly unrecoverable.<\/p>\n<p class=\"topic-paragraph\">In 2002 the newly formed U.S.\u00a0<span id=\"ref1253120\"><\/span>Internet Crime Complaint Center (IC3) reported that more than $54 million dollars had been lost through a variety of\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/fraud\">fraud<\/a>\u00a0schemes; this represented a threefold increase over estimated losses of $17 million in 2001. The annual losses grew in subsequent years, reaching $125 million in 2003, about $200 million in 2006, close to $250 million in 2008, and over $1 billion in 2015. In the United States the largest source of fraud is what IC3 calls \u201cnon-payment\/non-delivery,\u201d in which goods and services either are delivered but not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs without the victim\u2019s knowledge, these more traditional forms of fraud occur in plain sight. The victim willingly provides private information that enables the crime; hence, these are transactional crimes. Few people would believe someone who walked up to them on the street and promised them easy riches; however, receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets. Despite a vast amount of consumer education, Internet fraud remains a growth industry for criminals and prosecutors. Europe and the United States are far from the only sites of cybercrime.\u00a0<span id=\"ref829192\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/South-Korea\">South Korea<\/a>\u00a0is among the most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming rate.\u00a0<span id=\"ref829193\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/Japan\">Japan<\/a>\u00a0has also experienced a rapid growth in similar crimes.<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"md-sentinel--page-change undefined\" data-index=\"1\"><\/div>\n<div class=\"infinite-scroll-container page\">\n<div class=\"grey-box \">\n<div class=\"topic-content pt-15\">\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235702\" data-level=\"2\" data-has-spy=\"true\">\n<h1 class=\"h2\"><span id=\"ref829194\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/automated-teller-machine\">ATM<\/a>\u00a0fraud<\/h1>\n<p class=\"topic-paragraph\">Computers also make more\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/mundane\" data-term=\"mundane\">mundane<\/a>\u00a0types of\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/fraud\">fraud<\/a>\u00a0possible. Take the automated teller machine (ATM) through which many people now get cash. In order to access an account, a user supplies a card and\u00a0<span id=\"ref1253121\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/personal-identification-number\">personal identification number<\/a>\u00a0(PIN). Criminals have developed means to intercept both the data on the card\u2019s magnetic strip as well as the user\u2019s PIN. In turn, the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual\u2019s account. For example, in 2002 the\u00a0<em>New York Times<\/em>\u00a0reported that more than 21,000 American bank accounts had been\u00a0<span id=\"ref1253122\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/skimmer-electronic-device\">skimmed<\/a>\u00a0by a single group engaged in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in shopping centres and convenience stores. These machines are free-standing and not physically part of a bank. Criminals can easily set up a machine that looks like a\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/legitimate\" data-term=\"legitimate\">legitimate<\/a>\u00a0machine; instead of dispensing money, however, the machine gathers information on users and only tells them that the machine is out of order after they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the world, ATM fraud has become an international problem.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235703\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829195\"><\/span>Wire fraud<\/h2>\n<p class=\"topic-paragraph\">The international nature of cybercrime is particularly evident with wire fraud. One of the largest and best-organized wire fraud schemes was orchestrated by\u00a0<span id=\"ref829197\"><\/span>Vladimir Levin, a Russian programmer with a computer software firm in\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/St-Petersburg-Russia\">St. Petersburg<\/a>. In 1994, with the aid of dozens of confederates, Levin began transferring some $10 million from subsidiaries of\u00a0<span id=\"ref829199\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Citibank-NA\">Citibank, N.A.<\/a>, in Argentina and Indonesia to bank accounts in San Francisco,\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/Tel-Aviv-Yafo\">Tel Aviv<\/a>, Amsterdam, Germany, and Finland. According to Citibank, all but $400,000 was eventually recovered as Levin\u2019s accomplices attempted to withdraw the funds. Levin himself was arrested in 1995 while in transit through London\u2019s Heathrow Airport (at the time, Russia had no extradition treaty for cybercrime). In 1998 Levin was finally extradited to the United States, where he was sentenced to three years in jail and ordered to reimburse Citibank $240,015. Exactly how Levin obtained the necessary account names and passwords has never been disclosed, but no Citibank employee has ever been charged in connection with the case. Because a sense of security and privacy are paramount to financial institutions, the exact extent of wire fraud is difficult to\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/ascertain\" data-term=\"ascertain\">ascertain<\/a>. In the early 21st century, wire fraud remained a worldwide problem.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235704\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829202\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/file-sharing\">File sharing<\/a>\u00a0and\u00a0<span id=\"ref829201\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/piracy-copyright-crime\">piracy<\/a><\/h2>\n<p class=\"topic-paragraph\">Through the 1990s, sales of\u00a0<span id=\"ref829212\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/compact-disc\">compact discs<\/a>\u00a0(CDs) were the major source of revenue for recording companies. Although piracy\u2014that is, the illegal duplication of\u00a0<span id=\"ref829211\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/copyright\">copyrighted<\/a>\u00a0materials\u2014had always been a problem, especially in the Far East, the proliferation on college campuses of inexpensive personal computers capable of capturing music off CDs and sharing them over high-speed (\u201cbroadband\u201d)\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>\u00a0connections became the recording industry\u2019s greatest nightmare. In the United States, the recording industry, represented by the\u00a0<span id=\"ref829200\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Recording-Industry-Association-of-America\">Recording Industry Association of America<\/a>\u00a0(RIAA), attacked a single file-sharing service,\u00a0<span id=\"ref829203\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Napster\">Napster<\/a>, which from 1999 to 2001 allowed users across the Internet access to music files, stored in the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/data-compression\">data-compression<\/a>\u00a0format known as\u00a0<span id=\"ref829206\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/MP3\">MP3<\/a>, on other users\u2019 computers by way of Napster\u2019s central computer. According to the RIAA, Napster users regularly violated the copyright of recording artists, and the service had to stop. For users, the issues were not so clear-cut. At the core of the Napster case was the issue of\u00a0<span id=\"ref829205\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/fair-use-doctrine\">fair use<\/a>. Individuals who had purchased a CD were clearly allowed to listen to the music, whether in their home stereo, automobile sound system, or\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/personal-computer\">personal computer<\/a>. What they did not have the right to do, argued the RIAA, was to make the CD available to thousands of others who could make a perfect digital copy of the music and create their own CDs. Users rejoined that sharing their files was a fair use of copyrighted material for which they had paid a fair price. In the end, the RIAA argued that a whole new class of cybercriminal had been born\u2014the digital pirate\u2014that included just about anyone who had ever shared or downloaded an MP3 file. Although the RIAA successfully shuttered Napster, a new type of file-sharing service, known as\u00a0<span id=\"ref829207\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/P2P\">peer-to-peer<\/a>\u00a0(P2P) networks, sprang up. These decentralized systems do not rely on a central\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/facilitating\" data-term=\"facilitating\">facilitating<\/a>\u00a0computer; instead, they consist of millions of users who voluntarily open their own computers to others for file sharing.<\/p>\n<p class=\"topic-paragraph\">The RIAA continued to battle these file-sharing networks, demanding that ISPs turn over records of their customers who move large quantities of data over their networks, but the effects were minimal. The RIAA\u2019s other tactic has been to push for the development of technologies to enforce the digital rights of copyright holders. So-called\u00a0<span id=\"ref829209\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/digital-rights-management\">digital rights management (DRM) technology<\/a>\u00a0is an attempt to forestall piracy through technologies that will not allow consumers to share files or possess \u201ctoo many\u201d copies of a copyrighted work.<\/p>\n<p class=\"topic-paragraph\">At the start of the 21st century, copyright owners began accommodating themselves with the idea of commercial digital distribution. Examples include the online sales by the iTunes Store (run by\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Apple-Inc\">Apple Inc.<\/a>) and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Amazoncom\">Amazon.com<\/a>\u00a0of music, television shows, and movies in downloadable formats, with and without DRM restrictions. In addition, several cable and satellite television providers, many\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/electronic-game\">electronic game<\/a>\u00a0systems (<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Sony\">Sony Corporation<\/a>\u2019s\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/PlayStation\">PlayStation 3<\/a>\u00a0and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Microsoft-Corporation\">Microsoft Corporation<\/a>\u2019s\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/Xbox\">Xbox 360<\/a>), and streaming services like\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Netflix-Inc\">Netflix<\/a>\u00a0developed \u201c<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/video-on-demand\">video-on-demand<\/a>\u201d services that allow customers to download movies and shows for immediate (streaming) or later playback.<\/p>\n<p class=\"topic-paragraph\">File sharing brought about a fundamental reconstruction of the relationship between producers, distributors, and consumers of artistic material. In America, CD sales dropped from a high of nearly 800 million albums in 2000 to less than 150 million albums in 2014. Although the music industry sold more albums digitally than it had CDs at its peak, revenue declined by more than half since 2000. As broadband Internet connections proliferate, the motion-picture industry faces a similar problem, although the digital videodisc (<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/DVD\">DVD<\/a>) came to market with encryption and various built-in attempts to avoid the problems of a video Napster. However, sites such as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/The-Pirate-Bay\">The Pirate Bay<\/a>\u00a0emerged that specialized in sharing such large files as those of movies and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/electronic-game\">electronic games<\/a>.<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"md-sentinel--page-change undefined\" data-index=\"2\"><\/div>\n<div class=\"infinite-scroll-container page\">\n<div class=\"grey-box \">\n<div class=\"topic-content pt-15\">\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235705\" data-level=\"2\" data-has-spy=\"true\">\n<h1 class=\"h2\"><span id=\"ref829215\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/counterfeiting\">Counterfeiting<\/a>\u00a0and forgery<\/h1>\n<p class=\"topic-paragraph\">File sharing of\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/intellectual\" data-term=\"intellectual\">intellectual<\/a>\u00a0property is only one aspect of the problem with copies. Another more\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/mundane\" data-term=\"mundane\">mundane<\/a>\u00a0aspect lies in the ability of digital devices to render nearly perfect copies of material\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/artifacts\" data-term=\"artifacts\">artifacts<\/a>. Take the traditional\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/crime-law\">crime<\/a>\u00a0of\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/counterfeiting\">counterfeiting<\/a>. Until recently, creating passable currency required a significant amount of skill and access to technologies that individuals usually do not own, such as printing presses, engraving plates, and special inks. The advent of inexpensive, high-quality colour copiers and printers has brought counterfeiting to the masses.\u00a0<span id=\"ref829216\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/ink-jet-printer\">Ink-jet printers<\/a>\u00a0now account for a growing percentage of the counterfeit\u00a0<span id=\"ref829220\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/currency\">currency<\/a>\u00a0confiscated by the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/US-Secret-Service\">U.S. Secret Service<\/a>. In 1995 ink-jet currency accounted for 0.5 percent of counterfeit U.S. currency; in 1997 ink-jet printers produced 19 percent of the illegal cash. By 2014 almost 60 percent of the counterfeit money recovered in the U.S. came from ink-jet printers. The widespread development and use of computer technology prompted the U.S. Treasury to redesign U.S. paper currency to include a variety of anticounterfeiting technologies. The\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/European-Union\">European Union<\/a>\u00a0currency, or\u00a0<span id=\"ref829218\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/euro\">euro<\/a>, had security designed into it from the start. Special features, such as embossed foil holograms and special ribbons and paper, were designed to make counterfeiting difficult. Indeed, the switch to the euro presented an unprecedented opportunity for counterfeiters of preexisting national currencies. The great fear was that counterfeit currency would be laundered into legal euros. Fortunately, it was not the problem that some believed it would be.<\/p>\n<p class=\"topic-paragraph\">Nor is currency the only document being copied. Immigration documents are among the most valuable, and they are much easier to duplicate than currency. In the wake of the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/event\/September-11-attacks\">September 11 attacks<\/a>, this problem came under increasing scrutiny in the United States. In particular, the U.S.\u00a0<span id=\"ref1253123\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Government-Accountability-Office\">General Accounting Office<\/a>\u00a0(GAO) issued several reports during the late 1990s and early 2000s concerning the extent of document\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/fraud\">fraud<\/a>\u00a0that had been missed by the\u00a0<span id=\"ref829222\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Immigration-and-Naturalization-Service\">Immigration and Naturalization Service<\/a>\u00a0(INS). Finally, a 2002 report by the GAO reported that more than 90 percent of certain types of benefit claims were fraudulent and further stated that immigration fraud was \u201cout of control.\u201d Partially in response to these revelations, the INS was disbanded and its functions assumed by the newly\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/constituted\" data-term=\"constituted\">constituted<\/a>\u00a0U.S.\u00a0<span id=\"ref829224\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/United-States-Department-of-Homeland-Security\">Department of Homeland Security<\/a>\u00a0in 2003.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235706\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829226\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/child-pornography\">Child pornography<\/a><\/h2>\n<p class=\"topic-paragraph\">With the advent of almost every new media technology,\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/pornography\">pornography<\/a>\u00a0has been its \u201ckiller app,\u201d or the application that drove early deployment of technical\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/innovations\" data-term=\"innovations\">innovations<\/a>\u00a0in search of profit. The\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>\u00a0was no exception, but there is a criminal element to this business bonanza\u2014child pornography, which is unrelated to the lucrative business of legal adult-oriented pornography. The possession of child pornography, defined here as images of children under age 18 engaged in sexual behaviour, is illegal in the United States, the European Union, and many other countries, but it remains a problem that has no easy solution. The problem is\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/compounded\" data-term=\"compounded\">compounded<\/a>\u00a0by the ability of \u201ckiddie porn\u201d Web sites to\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/disseminate\" data-term=\"disseminate\">disseminate<\/a>\u00a0their material from locations, such as states of the former\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/Soviet-Union\">Soviet Union<\/a>\u00a0as well as\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/Southeast-Asia\">Southeast Asia<\/a>, that lack cybercrime laws. Some law-enforcement organizations believe that child pornography represents a $3-billion-a-year industry and that more than 10,000 Internet locations provide access to these materials.<\/p>\n<p class=\"topic-paragraph\">The Internet also provides\u00a0<span id=\"ref829228\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/pedophilia\">pedophiles<\/a>\u00a0with an unprecedented opportunity to commit criminal acts through the use of \u201c<span id=\"ref829229\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/chat-room\">chat rooms<\/a>\u201d to identify and lure victims. Here the virtual and the material worlds intersect in a particularly dangerous fashion. In many countries, state authorities now pose as children in chat rooms; despite the widespread knowledge of this practice, pedophiles continue to make contact with these \u201cchildren\u201d in order to meet them \u201coff-line.\u201d That such a meeting invites a high risk of immediate arrest does not seem to deter pedophiles. Interestingly enough, it is because the Internet allows individual privacy to be\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/breached\" data-term=\"breached\">breached<\/a>\u00a0that the authorities are able to capture pedophiles.<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"md-sentinel--page-change undefined\" data-index=\"3\"><\/div>\n<div class=\"infinite-scroll-container page\">\n<div class=\"grey-box \">\n<div class=\"topic-content pt-15\">\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235707\" data-level=\"2\" data-has-spy=\"true\">\n<h1 class=\"h2\"><span id=\"ref105877\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/hacking-computing\">Hacking<\/a><\/h1>\n<p class=\"topic-paragraph\">While\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/breaching\" data-term=\"breaching\">breaching<\/a>\u00a0privacy to detect cybercrime works well when the crimes involve the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/theft\">theft<\/a>\u00a0and misuse of information, ranging from\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/credit-card\">credit card<\/a>\u00a0numbers and personal data to file sharing of various commodities\u2014music, video, or child pornography\u2014what of crimes that attempt to wreak havoc on the very workings of the machines that make up the network? The story of hacking actually goes back to the 1950s, when a group of phreaks (short for \u201cphone freaks\u201d) began to hijack portions of the world\u2019s\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/telecommunications-network\">telephone networks<\/a>, making unauthorized long-distance calls and setting up special \u201cparty lines\u201d for fellow phreaks. With the proliferation of computer\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/bulletin-board-system\">bulletin board systems<\/a>\u00a0(BBSs) in the late 1970s, the informal\u00a0<span id=\"ref829230\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/phreaking\">phreaking<\/a>\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/culture\" data-term=\"culture\">culture<\/a>\u00a0began to coalesce into quasi-organized groups of individuals who graduated from the telephone network to \u201chacking\u201d corporate and government\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/computer-network\">computer network<\/a>\u00a0systems.<\/p>\n<p class=\"topic-paragraph\">Although the term\u00a0<em>hacker<\/em>\u00a0predates computers and was used as early as the mid-1950s in connection with electronic hobbyists, the first recorded instance of its use in connection with computer programmers who were adept at writing, or \u201chacking,\u201d computer code seems to have been in a 1963 article in a student newspaper at the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Massachusetts-Institute-of-Technology\">Massachusetts Institute of Technology<\/a>\u00a0(MIT). After the first computer systems were linked to multiple users through telephone lines in the early 1960s,\u00a0<em>hacker<\/em>\u00a0came to refer to individuals who gained unauthorized access to computer networks, whether from another computer network or, as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/personal-computer\">personal computers<\/a>\u00a0became available, from their own computer systems. Although it is outside the scope of this article to discuss hacker culture, most hackers have not been criminals in the sense of being vandals or of seeking illicit financial rewards. Instead, most have been young people driven by\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/intellectual\" data-term=\"intellectual\">intellectual<\/a>\u00a0curiosity; many of these people have gone on to become\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/computer-security\">computer security<\/a>\u00a0architects. However, as some hackers sought notoriety among their peers, their exploits led to clear-cut crimes. In particular, hackers began breaking into computer systems and then bragging to one another about their exploits, sharing pilfered documents as trophies to prove their boasts. These exploits grew as hackers not only broke into but sometimes took control of government and corporate computer networks.<\/p>\n<p class=\"topic-paragraph\">One such criminal was\u00a0<span id=\"ref829231\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Kevin-Mitnick\">Kevin Mitnick<\/a>, the first hacker to make the \u201cmost wanted list\u201d of the U.S.\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Federal-Bureau-of-Investigation\">Federal Bureau of Investigation<\/a>\u00a0(FBI). He allegedly broke into the\u00a0<span id=\"ref829232\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/North-American-Air-Defense-Command\">North American Aerospace Defense Command<\/a>\u00a0(NORAD) computer in 1981, when he was 17 years old, a feat that brought to the fore the gravity of the threat posed by such security\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/breaches\" data-term=\"breaches\">breaches<\/a>. Concern with hacking contributed first to an overhaul of federal sentencing in the United States, with the 1984\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/Comprehensive\" data-term=\"Comprehensive\">Comprehensive<\/a>\u00a0Crime Control Act and then with the Computer Fraud and Abuse Act of 1986.<\/p>\n<p class=\"topic-paragraph\">The scale of hacking crimes is among the most difficult to assess because the victims often prefer not to report the crimes\u2014sometimes out of embarrassment or fear of further security breaches. Officials estimate, however, that hacking costs the world economy billions of dollars annually. Hacking is not always an outside job\u2014a related criminal endeavour involves individuals within corporations or government\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/bureaucracies\" data-term=\"bureaucracies\">bureaucracies<\/a>\u00a0deliberately altering\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/database\">database<\/a>\u00a0records for either profit or political objectives. The greatest losses stem from the theft of\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/proprietary\" data-term=\"proprietary\">proprietary<\/a>\u00a0information, sometimes followed up by the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/extortion\">extortion<\/a>\u00a0of money from the original owner for the data\u2019s return. In this sense, hacking is old-fashioned\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/industrial-espionage\">industrial espionage<\/a>\u00a0by other means.<\/p>\n<p class=\"topic-paragraph\">One of the largest known case of computer hacking was discovered in late March 2009. It involved government and private computers in at least 103 countries. The worldwide spy network known as\u00a0<span id=\"ref1036379\"><\/span>GhostNet was discovered by researchers at the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/University-of-Toronto\">University of Toronto<\/a>, who had been asked by representatives of the\u00a0<span id=\"ref1036378\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Dalai-Lama-14th\">Dalai Lama<\/a>\u00a0to investigate the exiled Tibetan leader\u2019s computers for possible\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/malware\">malware<\/a>. In addition to finding out that the Dalai Lama\u2019s computers were compromised, the researchers discovered that GhostNet had infiltrated more than a thousand computers around the world. The highest concentration of compromised systems were within embassies and foreign affairs bureaus of or located in South Asian and Southeast Asian countries. Reportedly, the computers were infected by users who opened e-mail attachments or clicked on Web page links. Once infected with the GhostNet malware, the computers began \u201cphishing\u201d for files throughout the local network\u2014even turning on cameras and video-recording devices for remote monitoring. Three control servers that ran the malware were located in\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/Hainan\">Hainan<\/a>,\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/Guangdong\">Guangdong<\/a>, and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/place\/Sichuan\">Sichuan<\/a>\u00a0provinces in China, and a fourth server was located in California.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235708\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829233\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/computer-virus\">Computer viruses<\/a><\/h2>\n<p class=\"topic-paragraph\">The deliberate release of damaging\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/computer-virus\">computer viruses<\/a>\u00a0is yet another type of cybercrime. In fact, this was the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/crime-law\">crime<\/a>\u00a0of choice of the first person to be convicted in the United States under the\u00a0<span id=\"ref829236\"><\/span>Computer Fraud and Abuse Act of 1986. On November 2, 1988, a\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/science\/computer-science\">computer science<\/a>\u00a0student at\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/Cornell-University\">Cornell University<\/a>\u00a0named Robert Morris released a software \u201c<span id=\"ref829237\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/computer-worm\">worm<\/a>\u201d onto the\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>\u00a0from MIT (as a guest on the campus, he hoped to remain anonymous). The worm was an experimental self-propagating and replicating\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/computer-program\">computer program<\/a>\u00a0that took advantage of flaws in certain\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/e-mail\">e-mail<\/a>\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/protocols\" data-term=\"protocols\">protocols<\/a>. Due to a mistake in its programming, rather than just sending copies of itself to other computers, this software kept replicating itself on each infected system, filling all the available\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/computer-memory\">computer memory<\/a>. Before a fix was found, the worm had brought some 6,000 computers (one-tenth of the Internet) to a halt. Although Morris\u2019s worm cost time and millions of dollars to fix, the event had few commercial consequences, for the Internet had not yet become a fixture of economic affairs. That Morris\u2019s father was the head of computer security for the U.S.\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/National-Security-Agency\">National Security Agency<\/a>\u00a0led the press to treat the event more as a high-tech Oedipal drama than as a foreshadowing of things to come. Since then, ever more harmful viruses have been cooked up by anarchists and misfits from locations as\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/diverse\" data-term=\"diverse\">diverse<\/a>\u00a0as the United States, Bulgaria, Pakistan, and the Philippines.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235709\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829239\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/denial-of-service-attack\">Denial of service attacks<\/a><\/h2>\n<p class=\"topic-paragraph\">Compare the Morris worm with the events of the week of February 7, 2000, when \u201cmafiaboy,\u201d a 15-year-old Canadian hacker, orchestrated a series of\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/denial-of-service-attack\">denial of service attacks<\/a>\u00a0(DoS) against several\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/e-commerce\">e-commerce<\/a>\u00a0sites, including\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Amazoncom\">Amazon.com<\/a>\u00a0and\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/eBay\">eBay.com<\/a>. These attacks used computers at multiple locations to overwhelm the vendors\u2019 computers and shut down their\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/World-Wide-Web\">World Wide Web<\/a>\u00a0(WWW) sites to\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/legitimate\" data-term=\"legitimate\">legitimate<\/a>\u00a0commercial traffic. The attacks crippled Internet commerce, with the FBI estimating that the affected sites suffered $1.7 billion in damages. In 1988 the Internet played a role only in the lives of researchers and academics; by 2000 it had become essential to the workings of the U.S. government and economy. Cybercrime had moved from being an issue of individual wrongdoing to being a matter of national security.<\/p>\n<p class=\"topic-paragraph\">Distributed DoS attacks are a special kind of hacking. A criminal salts an array of computers with computer programs that can be triggered by an external computer user. These programs are known as\u00a0<span id=\"ref829240\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Trojan-horse\">Trojan horses<\/a>\u00a0since they enter the unknowing users\u2019 computers as something\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/benign\" data-term=\"benign\">benign<\/a>, such as a photo or document attached to an e-mail. At a predesignated time, this\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/Trojan-horse\">Trojan horse<\/a>\u00a0program begins to send messages to a predetermined site. If enough computers have been compromised, it is likely that the selected site can be tied up so effectively that little if any legitimate traffic can reach it. One important insight offered by these events has been that much software is insecure, making it easy for even an unskilled hacker to compromise a vast number of machines. Although software companies regularly offer patches to fix software vulnerabilities, not all users\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/implement\" data-term=\"implement\">implement<\/a>\u00a0the updates, and their computers remain\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/vulnerable\" data-term=\"vulnerable\">vulnerable<\/a>\u00a0to criminals wanting to launch DoS attacks. In 2003 the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/Internet-service-provider\">Internet service provider<\/a>\u00a0PSINet Europe connected an unprotected server to the Internet. Within 24 hours the server had been attacked 467 times, and after three weeks more than 600 attacks had been recorded. Only vigorous security regimes can protect against such an\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/environment\" data-term=\"environment\">environment<\/a>. Despite the claims about the pacific nature of the Internet, it is best to think of it as a modern example of the Wild West of American lore\u2014with the sheriff far away.<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"md-sentinel--page-change undefined\" data-index=\"4\"><\/div>\n<div class=\"infinite-scroll-container last page\">\n<div class=\"grey-box grey-box-bottom\">\n<div class=\"topic-content pt-15\">\n<section id=\"ref\" data-level=\"1\">\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235710\" data-level=\"2\" data-has-spy=\"true\">\n<h1 class=\"h2\"><span id=\"ref829241\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/spam\">Spam<\/a>, steganography, and e-mail hacking<\/h1>\n<p class=\"topic-paragraph\"><span id=\"ref829243\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/e-mail\">E-mail<\/a>\u00a0has spawned one of the most significant forms of cybercrime\u2014<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/spam\">spam<\/a>, or unsolicited advertisements for products and services, which experts estimate to\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/comprise\" data-term=\"comprise\">comprise<\/a>\u00a0roughly 50 percent of the e-mail circulating on the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/Internet\">Internet<\/a>. Spam is a\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/crime-law\">crime<\/a>\u00a0against all users of the Internet since it wastes both the storage and network capacities of ISPs, as well as often simply being offensive. Yet, despite various attempts to legislate it out of existence, it remains unclear how spam can be eliminated without violating the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/freedom-of-speech\">freedom of speech<\/a>\u00a0in a liberal democratic polity. Unlike junk mail, which has a postage cost associated with it, spam is nearly free for perpetrators\u2014it typically costs the same to send 10 messages as it does to send 10 million.<\/p>\n<p class=\"topic-paragraph\">One of the most significant problems in shutting down spammers involves their use of other individuals\u2019 personal computers. Typically, numerous machines connected to the Internet are first infected with a virus or\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/Trojan-horse\">Trojan horse<\/a>\u00a0that gives the spammer secret control. Such machines are known as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/technology\/zombie-computer\">zombie computers<\/a>, and networks of them, often involving thousands of infected computers, can be activated to flood the Internet with spam or to institute DoS attacks. While the former may be almost\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/benign\" data-term=\"benign\">benign<\/a>, including solicitations to purchase\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/legitimate\" data-term=\"legitimate\">legitimate<\/a>\u00a0goods, DoS attacks have been\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/deployed\" data-term=\"deployed\">deployed<\/a>\u00a0in efforts to\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/extortion\">blackmail<\/a>\u00a0Web sites by threatening to shut them down. Cyberexperts estimate that the United States accounts for about one-fourth of the 4\u20138 million zombie computers in the world and is the origin of nearly one-third of all spam.<\/p>\n<p class=\"topic-paragraph\">E-mail also serves as an instrument for both traditional criminals and terrorists. While libertarians laud the use of\u00a0<span id=\"ref829245\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/cryptography\">cryptography<\/a>\u00a0to ensure privacy in communications, criminals and terrorists may also use cryptographic means to conceal their plans. Law-enforcement officials report that some terrorist groups embed instructions and information in images via a process known as\u00a0<span id=\"ref829244\"><\/span>steganography, a sophisticated method of hiding information in plain sight. Even recognizing that something is concealed in this fashion often requires considerable amounts of computing power; actually decoding the information is nearly impossible if one does not have the key to separate the hidden data.<\/p>\n<p class=\"topic-paragraph\">In a type of scam called\u00a0<span id=\"ref1253124\"><\/span>business e-mail compromise (BEC), an e-mail sent to a business appears to be from an executive at another company with which the business is working. In the e-mail, the \u201cexecutive\u201d asks for money to be transferred into a certain account. The\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/Federal-Bureau-of-Investigation\">FBI<\/a>\u00a0has estimated that BEC scams have cost American businesses about $750 million.<\/p>\n<p class=\"topic-paragraph\">Sometimes e-mail that an organization would wish to keep secret is obtained and released. In 2014 hackers calling themselves \u201cGuardians of Peace\u201d released e-mail from executives at the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/art\/motion-picture\">motion picture<\/a>\u00a0company Sony Pictures Entertainment, as well as other\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/confidential\" data-term=\"confidential\">confidential<\/a>\u00a0company information. The hackers demanded that Sony Pictures not release\u00a0<em><span id=\"ref1253125\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/The-Interview-film\">The Interview<\/a><\/em>, a comedy about a CIA plot to assassinate North Korean leader\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Kim-Jong-Eun\">Kim Jong-Un<\/a>, and threatened to attack theatres that showed the movie. After American movie theatre chains canceled screenings, Sony released the movie online and in limited theatrical release. E-mail hacking has even affected politics. In\u00a0<span id=\"ref1253126\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/United-States-presidential-election-of-2016\">2016<\/a>, e-mail at the Democratic National Committee (DNC) was obtained by hackers believed to be in Russia. Just before the Democratic National Convention, the media organization WikiLeaks released the e-mail, which showed a marked preference of DNC officials for the presidential campaign of\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/biography\/Hillary-Clinton\">Hillary Clinton<\/a>\u00a0over that of her challenger\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/biography\/Bernie-Sanders\">Bernie Sanders<\/a>. DNC chairperson\u00a0<span id=\"ref1253127\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Debbie-Wasserman-Schultz\">Debbie Wasserman Schultz<\/a>\u00a0resigned, and some American commentators speculated that the release of the e-mail showed the preference of the Russian government for Republican nominee\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Donald-Trump\">Donald Trump<\/a>.<\/p>\n<\/section>\n<div class=\"md-sentinel--spy-target\"><\/div>\n<section id=\"ref235711\" data-level=\"2\" data-has-spy=\"true\">\n<h2 class=\"h2\"><span id=\"ref829246\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/sabotage-subversive-tactic\">Sabotage<\/a><\/h2>\n<p class=\"topic-paragraph\">Another type of hacking involves the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/hijacking\">hijacking<\/a>\u00a0of a government or corporation\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/Web-site\">Web site<\/a>. Sometimes these crimes have been committed in protest over the incarceration of other hackers; in 1996 the Web site of the U.S.\u00a0<span id=\"ref829247\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Central-Intelligence-Agency\">Central Intelligence Agency<\/a>\u00a0(CIA) was altered by Swedish hackers to gain international support for their protest of the Swedish government\u2019s prosecution of local hackers, and in 1998 the\u00a0<em>New York Times<\/em>\u2019s Web site was hacked by supporters of the incarcerated hacker\u00a0<span id=\"ref1253129\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/biography\/Kevin-Mitnick\">Kevin Mitnick<\/a>. Still other hackers have used their skills to engage in political protests: in 1998 a group calling itself the Legion of the Underground declared \u201ccyberwar\u201d on China and Iraq in protest of\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/alleged\" data-term=\"alleged\">alleged<\/a>\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/human-rights\">human rights<\/a>\u00a0abuses and a program to build weapons of mass destruction, respectively. In 2007, Estonian government Web sites, as well as those for banks and the media, were attacked. Russian hackers were suspected because\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/Estonia\">Estonia<\/a>\u00a0was then in a dispute with Russia over the removal of a Soviet war memorial in Tallinn.<\/p>\n<p class=\"topic-paragraph\">Sometimes a user\u2019s or organization\u2019s\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/technology\/computer\">computer system<\/a>\u00a0is attacked and encrypted until a ransom is paid. The software used in such attacks has been dubbed\u00a0<em><span id=\"ref1253130\"><\/span>ransomware<\/em>. The ransom usually demanded is payment in a form of virtual currency, such as\u00a0<a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/Bitcoin\">Bitcoin<\/a>. When data are of vital importance to an organization, sometimes the ransom is paid. In 2016 several American hospitals were hit with ransomware attacks, and one hospital paid over $17,000 for its systems to be released.<\/p>\n<p class=\"topic-paragraph\">Defacing Web sites is a minor matter, though, when compared with the specter of cyberterrorists using the Internet to attack the\u00a0<a class=\"md-dictionary-link md-dictionary-tt-off\" href=\"https:\/\/www.merriam-webster.com\/dictionary\/infrastructure\" data-term=\"infrastructure\">infrastructure<\/a>\u00a0of a nation, by rerouting airline traffic, contaminating the\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/science\/water-supply\">water supply<\/a>, or disabling nuclear plant safeguards. One consequence of the\u00a0<span id=\"ref829249\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/event\/September-11-attacks\">September 11 attacks<\/a>\u00a0on\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/place\/New-York-City\">New York City<\/a>\u00a0was the destruction of a major telephone and Internet switching centre. Lower Manhattan was effectively cut off from the rest of the world, save for radios and cellular telephones. Since that day, there has been no other attempt to destroy the infrastructure that produces what has been called that \u201cconsensual hallucination,\u201d\u00a0<a class=\"md-crosslink autoxref\" href=\"https:\/\/www.britannica.com\/topic\/cyberspace\">cyberspace<\/a>. Large-scale\u00a0<span id=\"ref1285670\"><\/span><a class=\"md-crosslink\" href=\"https:\/\/www.britannica.com\/topic\/cyberwar\">cyberwar<\/a>\u00a0(or \u201cinformation warfare\u201d) has yet to take place, whether initiated by rogue states or terrorist organizations, although both writers and policy makers have imagined it in all too great detail.<\/p>\n<p class=\"topic-paragraph\">In late March 2007 the Idaho National Laboratory released a video demonstrating what catastrophic damage could result from\u00a0<span id=\"ref1036380\"><\/span>utility systems being compromised by hackers. Several utilities responded by giving the U.S. government permission to run an audit on their systems. In March 2009 the results began to leak out with a report in\u00a0<em>The Wall Street Journal<\/em>. In particular, the report indicated that hackers had installed software in some computers that would have enabled them to disrupt electrical services. Homeland Security spokeswoman Amy Kudwa affirmed that no disruptions had occurred, though further audits of electric, water, sewage, and other utilities would continue.<\/p>\n<\/section>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p><sup id=\"cite_ref-6\" class=\"reference\"><\/sup>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=Jwu_7IqWh8Y&#8221; align=&#8221;center&#8221; title=&#8221;How to help some one over comer cyber BULLYING.&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Cyber crime, or\u00a0computer-oriented crime, is a crime that involves a\u00a0computer\u00a0and a\u00a0network.The computer may have been used in the commission of a crime, or it may be the target.Cyber crime may threaten a person or a nation&#8217;s security and financial health. There are many\u00a0privacy concerns surrounding cyber crime when\u00a0confidential\u00a0information is intercepted or disclosed, lawfully or otherwise. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2071","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2071"}],"version-history":[{"count":4,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2071\/revisions"}],"predecessor-version":[{"id":3741,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=\/wp\/v2\/pages\/2071\/revisions\/3741"}],"wp:attachment":[{"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guyanapoliceforce.gy\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}