history of cybercrime only peer reviewed sources

Anonymous
timer Asked: Oct 19th, 2018
account_balance_wallet $5

Question Description

I would like you to write about history of cybercrime an timeline order

Use APA style for citations within the text and for the bibliography.The paper should be 3 pages long, using Times New Roman 12pf, double spaced with 1 inch margins all around. The page count should not include the title page, endnotes, and works cited page).

Peer reviewed sources

https://books.google.com/books?hl=en&lr=&id=hmiWBQAAQBAJ&oi=fnd&pg=PA11&dq=history+of+cybercrime+&ots=K1vr94Y90Y&sig=bQE7zICS-iKu8wx4Pw1SU2UCY4A#v=onepage&q=history%20of%20cybercrime&f=false

http://shodhganga.inflibnet.ac.in/bitstream/10603/188293/10/10_chapter%202.pdf

Non peer reviewed sources

https://www.cwjobs.co.uk/careers-advice/it-glossar...





Unformatted Attachment Preview

Disclaimer: This is a machine generated PDF of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace original scanned PDF. Neither Cengage Learning nor its licensors make any representations or warranties with respect to the machine generated PDF. The PDF is automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. CENGAGE LEARNING AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NONINFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the machine generated PDF is subject to all use restrictions contained in The Cengage Learning Subscription and License Agreement and/or the Business Economics and Theory Collection Terms and Conditions and by using the machine generated PDF functionality you agree to forgo any and all claims against Cengage Learning or its licensors for your use of the machine generated PDF functionality and any output derived therefrom. Cybercrime in the Year 2025; in 1981, criminal-justice seholar Gene Stephens wrote an article for the futurist on "Crime in the Year 2000," and in 1995, an article on "crime in cyberspace." in both, he suggested the role the computer and Internet would play in crime and crime fighting in the future. ...... Gene Stephens The Futurist. 42.4 (July-August 2008): p32+. Copyright: COPYRIGHT 2008 World Future Society http://www.wfs.org/wfs Full Text: Cybercrime in the Year 2025; in 1981, criminal-justice seholar Gene Stephens wrote an article for the futurist on "Crime in the Year 2000," and in 1995, an article on "crime in cyberspace." in both, he suggested the role the computer and Internet would play in crime and crime fighting in the future. here, he reviews what he rot right, what he got wrong, and why, and he suggests the types of cybercrimes and cybercrime fighting that will occur by the year 2025. In a 1981 article for THE FUTURIST, I wrote, "Data from all areas of the [criminal justice] system will be computerized and cross-referenced. Computers will store the modus operandi of convicted felons, and when a crime occurs, police may call on the computer to name the most likely suspects, or, in some cases, the exact offender" ("Crime in the Year 2000," April 1981). It seemed quite logical at the time, but the forecast turned out to be overly optimistic; I underestimated the antipathy to change and the turf protection within the system. The first paragraph of a subsequent article was more on target: "Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the cyberspace offender" ("Crime in Cyberspace," September-October 1995). Admittedly vague, it still seems to be a fairly accurate evaluation of the evolution of cybercrime. In the same article, I correctly forecast an explosion of cellular phone time theft and phone fraud; increased cyberattacks and fraud against government and business; massive credit card theft and fraud; internal theft of clients' identities by financially struggling and/or greedy financial service employees; more cyberporn, cyberstalking, cyberharassment, and cybervengeance; and the use of biometrics and encryption as methods of protecting data in cyberspace. In some other areas, my forecasts weren't as accurate. My fascination with the embryonic field of nano-technology led to a prediction of organic nanocomputers implanted in citizens' brains by the early twenty-first century. Related forecasts included terrorists sending subliminal messages directly to the brain implants of potential recruits, cyberextortion by hacking into brain implants and scrambling or threatening to scramble information in it, and the problem of people with brain implants being unable to a separate virtual reality created by cyberoffenders in flesh-andblood reality. This forecast may yet come true, however, for it's still early twenty-first century, and there is plenty of time for this technology and these disturbing crimes to begin to appear. In the 1995 article, I was rather pessimistic about the short-term capacity of police to cope with emerging cybercrime: The outlook for curtailing cyberspace crime by technology or conventional law-enforcement methods is bleak. Most agencies do not have the personnel or the skills to cope with such offenses.... Cybercrime cannot be controlled by conventional methods. Technology is on the side of the cyberspace offender and motivation is high--it's fun, exciting, and profitable (p. 28). My suggested solution, unfortunately, seems even more "Pollyanna" today than it did then: "the only real help is ... conscience and personal values, the belief that theft, deception, and invasion of privacy are simply unacceptable." According to Ray Kurzweil's "Law of Accelerating Returns," technological change is exponential rather than linear; thus, "we won't experience 100 years of progress in the twenty-first century--it will be more like 20,000 years of progress (at today's rate)." Predicting advances and their impacts on crime and crime fighting by 2025, then, is analogous to reviewing the next 5,000 years of technological progress in society. Kurzweil himself made several forecasts that could have major implications for cybercrime; for instance, he said that by 2010 personal computers will be capable of answering questions by accessing information wirelessly via the Internet (this is one prediction that arrived a little early). By 2019, he held, a $1,000 personal computer will have as much raw power as the human brain; possibly more important, he believed that computer chips will be everywhere, embedded in furniture, jewelry, walls, clothing, and so on. Also by 2019, computers and humans would communicate via two-way speech and gestures rather than keyboards. Virtual sex via computer will become a reality, and education, business, and entertainment will also be increasingly computer based. Roadways would be automated and computer controlled, while human--robot relationships will be commonplace. Possibly the most renowned of Kurzweil's predictions is the coming of "the Singularity"--when computers become self-aware--and the melding of humans and machines. Kurzweil sees this process well under way by 2025 as nanobots begin to surf the human bloodstream on search-and-destroy missions to combat pathogens and data nanobots augment human intelligence and access to information. Transhumans will be on their way to having an internalized capacity to communicate and interact with humans, machines, and other transhumans. TECHNOLOGY'S POTENTIAL IMPACTS ON CRIME What follows are my forecasts for how these developments might affect crime and crime fighting over the next two decades. Computer and Internet use will become increasingly seamless, as hands-free, voice-activated communications and data entry and retrieval will be commonplace by the early teen years of this new millennium (the 2010s). The world community will have moved a long way in a few short years, since by late 2007,1.25 billion people already had access to the Internet, though only about 2% of the world population regularly accessed it. Science-fiction writer William Gibson, who coined the term cyberspace in his 1982 short story, "Burning Chrome," forecasts that a fully wired world--a single unbroken interface without need for computers--will complete the evolution to full access of all Earth's citizens. The Defense Advanced Research Projects Agency (DARPA) set up the Internet and fostered its early development, but DARPA will likely over haul its invention in the 2010s. Not only will the outcome be faster and larger capacity usage, but also, by virtually starting over with the security aspects in mind, the future Internet will be safer and more difficult to attack and disable. Nanotechnology will increasingly impact cyberspace by the late 2010s, and as we try to gain the most advantage possible from new technologies, new security gaps will emerge that could turn into nightmares if not handled carefully. For example, as data nanobots are implanted in users' brains (later, organic bots will become an integral part of the individual), special attention will have to be paid to providing advanced firewalls to keep intruders from cracking into the bots and terrorizing the recipient. Could there be a more frightening crime than having your brain-stored knowledge erased or scrambled, or hearing voices threatening to destroy your memory unless you pay extravagant blackmail? Welcome to the prospects of mindstalking. Designer nanobots may also be loosed on the World Wide Web to engender types of mischief and destruction not yet contemplated. All advanced technology has the capacity to be used for good or evil, depending on the developer/user; and nanotech would appear to be the ultimate example, as it literally can be used to develop either nanosize weapons that could destroy the world or nanosize defense systems that could protect the planet. WHO'S IN CHARGE? The exponentially improving capabilities of emerging Web technologies spotlights the long-ignored issues of who owns the World Wide Web, who manages it, and who has jurisdiction over it. The answer now is: Nobody! Can the world's most powerful sociopolitico-economic network continue to operate almost at random, open to all, and thus excessively vulnerable to cybercriminals and terrorists alike? Yet any attempt to restrict or police the Web can be expected to be met by extreme resistance from a plethora of users for a variety of reasons, many contradictory. Another reasonable prediction would be that the Internet will become not only the number-one means of communicating, conducting business, socializing, entertaining, and just living, but indeed will handle a huge majority of such interactions; thus, failure to establish and enforce some basic ground rules will likely lead to socioeconomic disaster. If exchange of resources is to be accomplished almost exclusively over the Internet, anonymous surfing will be a potential threat. Moving funds without identification could not only perpetrate individual fraud, but also bankrupt the system itself. Biometrics and more-advanced systems of ID will need to be perfected to protect users and the network. In addition, multinational cybercrime units will be required to catch those preying on users worldwide, as Web surfers in Arlington, Virginia, and Victoria, British Columbia, may be victims of cyberscams perpetrated in Cairo or Budapest. Coordination and cooperation will be keys to making the Internet a safer place to travel and conduct business. THE MATRIX MAY BE REAL Kurzweil predicts that the equivalent of 4,000 years of technological advancement will occur during the first two decades of the twenty-first century, so it is extremely difficult to forecast what will happen. The concepts, theories, and formulas for many of these changes have yet to emerge from the plethora of ongoing research and development. Still, some speculation is possible. For instance, every square meter of atmosphere hugging the earth may be filled with unseen nanodevices designed to provide seamless communication and surveillance among all people in all places. Humans will have nanoimplants, facilitating interaction in an omnipresent network. Everyone will have a unique Internet Protocol (IP) address. Since nano-storage capacity is almost limitless, all activity and utterances by people everywhere will be recorded and recoverable. Transparency will become increasingly ubiquitous as word and deed--whether spoken or acted out in anger, frustration, or as a joke--can be almost instantly compared to "the record." Can human or even transhuman behavior evolve rapidly enough to withstand such scrutiny? If current laws were enforced with this level of supporting evidence, who could pay for the prison space required to carry out the mandated punishment? Another possibility would be the perfection of The Matrix, as Gibson envisioned in a series of popular books and movies, where a powerful central force controls all activity in a seemingly free society. The reaction in individualistic societies such as the United States would likely be similar to that in these fictional portrayals--rebellion, with a goal of destroying the web of control. A counterforce that could create a different type of harm for the individual would be continuance of the policy of no control of the Internet, allowing often destructive activity e.g., harassment, terrorism, and fraud--without jurisdiction and authority to curtail it. Which would be worse would depend on which value dominates--security (i.e., safety and order) or civil liberties (freedom and chaos). As always, the role of public safety in all this is to find the balancing point, where the degree of safety is enough to allow the pursuit of individual happiness. CYBERCRIME PROGRESSION: PIGEON DROPS AND IDENTITY THEFT As technology advances at a dizzying pace, so will the ways and means of those wishing to use the rapidly changing cyberspace as a tool/milieu for fun and profit, or worse. In the immediate future, the increasingly creative scams to bilk Internet users of their resources will continue, with literally scores of new schemes appearing daily on the Web. Sheiks, abandoned Russian women, and unclaimed lottery winnings will be joined by relatives seeking heirs and other electronic pigeon drops yet unimagined. For those who burn with faith or passion for a cause, the Internet will continue to provide a means both to fleece infidels for funds to pursue their goals and to provide an avenue for recruiting others to their flock. The Internet presents opportunities to target one's enemies for economic and even physical destruction via cyberterrorism. Identity theft--already the number-one crime in the United States and rapidly expanding throughout the Internet world--can be expected to increase at a faster pace and wreak havoc on the financial and social worlds of millions around the globe. It well may be that the only way to gain control over identity theft will be the suggested DARPA reconfiguration of the Web and its security apparatus. These, however, are short-term crises, which may soon become out moded by the ubiquitous wireless communications network that should be fully evolved by the middle to late years of the 2010s. With no computers, and only signals in the air to handle all social and economic activity, expect new cybercrimes yet to be invented. Unless a values revolution (whether spiritual, religious, or humanistic in origin) occurs and humans/transhumans choose to refrain from stealing, killing, and defiling one another, you can bet creative malcontents will develop new methods to manipulate the system for their own ends. In the quest for speed and efficiency on the Web, networks will grow in size and scope. For example, a network including all branches of a large bank grows when several banks merge and becomes larger still when all banks in a region join to reduce costs and speed service delivery. Then a national banking net emerges and is soon replaced by a multinational and finally a worldwide net. While the network becomes more powerful as it grows, it also becomes more vulnerable to attack. A shutdown of a regional net would create havoc, but the slack could be picked up by other nets. If the worldwide net is closed, however, true chaos would ensue, leaving banks and their customers at the mercy of blackmailers, extortionists, or terrorists. Thus, the larger the networks (e.g., energy, medical, education; regional, international, worldwide), the more critical security becomes. On the other hand, there may be a greater threat evolving from the powerful technology available to thwart cybercrime and, indeed, all criminal activity. Authorities have long said, "If you have nothing to hide, you have nothing to fear" when talking about police state surveillance capabilities. This theory may well be tested by the evolving technology of the next few years: All activity could be seen and recorded, ready for retrieval and prosecution. Next comes the development of preventive strategies. Do we really want to live in a society where law is supreme, without recourse, and where mistakes are not allowed, where "the record" is proof positive, and where there is no place for plea bargaining, mediation, or arbitration? Have we evolved to this level of "perfection"? TAMING THE CYBERCRIMINAL The future path through cyberspace is filled with threats and opportunities, most of which cannot even be imagined today. With the equivalent of 5,000 years of technological progress expected between 2000 and 2025, it's difficult to forecast the dilemmas that lie ahead, but thanks to the creativity and genius of William Gibson, Ray Kurzweil, and others like them, some predictions have been made and can be used as a basis for forecasting future cybercrime and crime fighting. The Internet as we know it--computers, Web sites, e-mail, blogs, e-commerce, etc.--may be outdated as soon as the early years of the next decade (the "twenty-teens"). All communication will be handled by a seamless, wireless network of airborne signals moving between nanobots and individuals with transmitters implanted in them. At this point, cyberoffenses will become very personal, as an attack on the Web is a direct attack on the user--possibly even invading his brain and memory stored in neural networks. As nanoscience advances to the point that bots in the atmosphere capture and record all spoken and physical activity, the choice for law enforcement--and society--will evolve: Do we tightly control all human interaction by holding individuals responsible for every deed and action (each of which is supported by permanently stored evidence) in an efficiently networked Web, or do we allow creativity and individualism to emerge by refusing to set boundaries and jurisdictions on the Internet, leaving it much as it is today--without management or enforcement? Choosing a "total control" future might curtail cybercrime and make the Web a safe vehicle for communication, socializing, commerce, etc., but at a substantial cost to privacy, freedom of speech, and other civil liberties. Choosing a "nobody-in-charge" future might allow a free flow of information and exchange of goods and services without government interference, but with a substantial threat to the economic and social lives of individuals and society itself posed by cyberoffenders. By 2025, the whole concept of the Internet and cybercrime may be dumped into the dustbin of history. The greatest threat then might be the extreme difficulty of separating virtual (cyber) reality from physical reality. Already, psychologists warn that perception can be more important than truth: If cyberreality is more convincing than physical reality, the virtual world might become the "real" world. Welcome to The Matrix. About the Author Gene Stephens, distinguished professor emeritus of the University of South Carolina, Columbia, South Carolina, is the criminal justice editor of THE FUTURIST His last article, "Policing the Future: Law Enforcement's New Challenges," was published in March-April 2005. His address is 313 Lockner Court, Columbia, South Carolina 29212. E-mail stephens-gene@sc.rr.com. Source Citation (MLA 8th Edition) Stephens, Gene. "Cybercrime in the Year 2025; in 1981, criminal-justice seholar Gene Stephens wrote an article for the futurist on 'Crime in the Year 2000,' and in 1995, an article on 'crime in cyberspace.' in both, he suggested the role the computer and Internet would play in crime and crime fighting in the future. ......" The Futurist, July-Aug. 2008, p. 32+. Business ...
Purchase answer to see full attachment

Tutor Answer

TeacherKate19
School: UC Berkeley

Attached.

Running head; HISTORY OF CYBER CRIME

1

History of Cyber Crimes
Student’s name
Institution
Date

HISTORY OF CYBER CRIME

2

HISTORY OF CYBERCRIME
The first electronic digital computer was designed in 1940s towards the end of the
Second World War. The most profitable being the Electronic Numerical Integrator and
Computer (ENIC). This was invented in the US in 1946. With the continued development in the
technology there has been increase in the rate of cyber-crimes. The computer developed from a
calculator to word processor to the multimedia device. Besides the research on the computer
development scholars also researched on the development of cybercrimes. This in particular
involves the history of hackers Thomas 2002, Peterson 2003, Raymond 2001, fielding 19451990, or the viruses (Dvorak & Pirillo, 2004). Some of the scholars have researched on
cybercrimes and how the law regarding the same was enacted in all over the world. The scholar
helps deal with the case on how to deal with cybercrimes. They deal with several dimensions on
how to deal with cybercrimes. The history of cyber-crimes can be divided into several stages; a
stage of germination, a rapid development stage, broad expansion stage, and stage og
reutilization.
Computer hacker’s discovery of a lawless new frontier
It was assumed that the development of cybercrimes developed soon after the invention of
computer but the first cybercrime developed from the late 1940s up to late 1960s when t...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors