Mid-way along the spectrum lie transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet. Another part of this type of crime involves individuals within corporations or government bureaucracy’s deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyber terrorism—that is, the use of the Internet to cause public disturbances …show more content…
There are many ways in which cyber stalking becomes a cyber-crime. Cyber stalking can include monitoring someone's activity real-time, or while on the computer or device in the current moment, or while they are offline, or not on the computer or electronic device. Cyber stalking becomes a crime because of the repeated threatening, harassing or monitoring of someone with whom the stalker has, or no longer has, a relationship.
Cyber stalking can include harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them. An example of cyber stalking would be to put a recording or monitoring device on a victim's computer or smartphone in order to save every keystroke they make so that the stalker can obtain information. Another example would be repeatedly posting derogatory or personal information about a victim on web pages or social media despite being warned not to do so. Cyber stalking has the potential punishment of a prison sentence.
Identity
…show more content…
There is now a classy and self-sufficient digital underground economy in which data is the illicit commodity. Stolen personal and financial data – used, for example, to gain access to existing bank accounts and credit cards, or to fraudulently establish new lines of credit – has a monetary value. This drives a range of criminal activities, including phishing, pharming, malware distribution and the hacking of corporate databases, and is supported by a fully-fledged infrastructure of malicious code writers, specialist web hosts and individuals able to lease networks of many thousands of compromised computers to carry out automated