You are on page 1of 21

ALONE. AFRAID.

ONLINE
• Cybercrimes are criminal acts that use the computer or Internet. These
types of crimes are prevalent in modern technological society and are
becoming more high profile as a greater number of serious crimes are
committed.
• Three types of cybercrimes:
 those that use the computer as a weapon;
 those that use the computer as an accessory to a crime
 those that make the computer a target of a crime
• Identity theft involves stealing an individual’s personal
information, then using that information to either use their
financial resources without their consent, or to open new
financial or credit accounts, enabling the identity thief to
use the victim’s credit without their knowledge.
Information commonly stolen to make these crimes
possible include the individual’s name, date of birth, social
security number, and/or credit card numbers.
• Unlawfully accessing a computer without authorization and
sending multiple e-mails; resending multiple commercial
email messages with the intent to deceive recipients; or
falsifying header information in multiple email messages.
• Using the Internet to threaten to cause
damage with the intent to extort from any
person any money or other thing of value.
• In the digital age, many criminals easily commit fraud against
unsuspecting victims by misrepresenting the facts. For example, an
employee intentionally inputs false information into the company
database or intranet. Or consider the "Nigerian prince email,"
where an online predator attempts to steal money from targeted
consumers by gaining access to a shared bank account.
• Engaging in the business of betting or wagering on
any sporting event or contest over the Internet.
COMPUTER
VIRUS
• Computer hackers are digital age criminals that can bring down
large infrastructures with a single keystroke emitting a computer
virus. The most common way for the makers of computer viruses to
propagate their virus programs is to attach or embed them in
emails. When the email is opened, the virus activates and does
whatever it was programmed to do, such as steal valuable hard
drive disk space, destroy data on the recipient’s computer, access
personal information, or to send information (or itself) out to other
computers using the original victim’s contact list.
COMPUTER
VIRUS
PROSTITUTION
• Persuading, inducing, enticing, or coercing any
individual to travel in interstate commerce to
engage in prostitution.
PROSTITUTION
• Infringing a copyright for financial gain... or by
distributing a work being prepared for commercial
distribution on a computer network.
• Cyberbullying occurs when someone uses the internet, a cell
phone, email, instant messaging, chat rooms, or social networks,
such as Facebook and Twitter, to harass, demean, embarrass, or
intimidate someone else. It is commonly a crime committed by kids
and teens, as their growing access to electronic communication
makes it possible to make fun of or ostracize others. The problem
spreads like wildfire as the bully can hide behind the anonymity of a
login identity, while encouraging other kids to join in the “fun” of
harassing the victim.

You might also like