ipl-logo

Computer Crimes Fall Under Common Laws

2146 Words9 Pages

Any illegal activity used on the computers, Internet, Internet devices, and the Internet serves to trick people, governmental agencies of money, and different types of companies are known as fraud. Computer fraud is the only type of computer crime that falls under common law because it uses contemporary technology. Other types of computer crimes fall under traditional laws. The reason for this is that the evidence that is stolen or bought illegally may be intangible. Some examples of computer fraud are theft of information, the salami fraud, one off kamikaze fraud, software theft, manipulation of accounts/banking system, and corporate espionage. Theft of information occurs when a hacker illegally copies and sells computer software. Information …show more content…

The way fraud works in a large group starts with the malware exploiters then goes to the money mules. Malware exploiters are the big dogs in the group. They are responsible for creating or purchase the malware software that steals the victim’s banking credentials. The way they launch the malware is from a compromised machine that will let them transfer money without being traced. After the malware exploiters have stolen money from their victims they give the money to money mules. These so-called money mules distribute the money for the criminals over a vast network of individuals allowing them to keep a certain percentage of the money. Money mules are recruited by their malware exploiters from companies to help them move money anonymously from banks to accounts and other countries. Money mules are the face of the cybercrime circles. They also use their actual names, which makes them have a very short career in the business. The victims of these attacks are individuals, companies, and financial institutions can quickly turn into a global reach by having the malware exploiters in another country and having the money mules all over the world, as well as even the …show more content…

Viruses are abnormal programs stored on a computer’s hard drive, floppy disk, and CD. The purpose of the viruses is to destroy data on the computer and other unexpected effects. Another way that viruses can damage a hard drive is it can send annoying messages to a computer, and it can cause Ping-Pong ball to bounce back and forth to erase text from the computer. If a user had viruses in an email that they sent to someone else in the company, then the recipient of that email will have the viruses on their computer. It could also add garbage to the person’s trash, which could destroy the person’s system software. Worms are similar to a virus. The only difference is that worms copy themselves repeatedly to the computer’s memory. They can also send themselves to another person’s computer by email without allowing the person to access the

Open Document