Transnational Organized Crime in the United States

Introduction

Transnational organized crime (TOC) is a consequential and growing danger to regional and worldwide sovereignty, with momentous outcomes for national protection, healthcare, democratic governance, and universal financial integrity. Organized crime syndicates are rising and widening their activities, arising in the convergence of previously various risks that now have disruptive and catastrophic effects. TOC infiltration is especially vulnerable in developing nations with poor governance rules. The penetration of TOCs into democracies is increasing, developing in co-option in specific situations and additionally frustrating leadership in others.

Transnational Organized Crime

TOC endangers American financial dividends and has the probability to destabilize the universal economic structure by distorting, exploiting, and subverting legal growth and financial activities. The World Bank estimates roughly one trillion dollars are consumed annually on bribing public authorities, causing many financial inefficiencies and damage to genuine commercial progress (Rose-Ackerman & Palifka, 2018). Corporation executives in the U.S. are worried that organized crime and graft are placing their businesses at a disadvantage competition-wise, especially in developing areas where individuals believe the legal system is not dependable.

In states impacted by TOC, entrepreneurs are allocating more funds to security investments, which negatively influences international direct investment in various universe regions. TOC operations can interrupt the international supply chain, decreasing socio-economic competitiveness and lowering the potential of the American infrastructure and industrial sectors to stay resilient in upheaval (Sanchez & Zhang, 2018). Furthermore, transnational criminal organizations could obtain influence over crucial raw materials businesses like oil, precious metal, gas, and aluminum, as well as prospective manipulation of the transport industry, by trying to leverage their connections with government entities, companies, or state-allied stakeholders.

Rebels and terrorists are progressively employing TOC to generate money and receive practical aid for their devastating activities. The Department of Justice asserts that terrorist networks were linked to its target list, which contains the most important global narcotics trafficking organizations posing a danger to the United States (Biswas, 2018). The Revolutionary Armed Forces of Colombia’s and the Taliban’s engagement in the narcotic business is essential to their position to uphold terrorist activities. Although the crime-terror connection is currently largely opportunistic, it is still important, particularly if it involves the efficient illicit transit of weapons of mass destruction material to terrorists or the infiltration of individual trafficking groups as a method for terrorists to access the United States.

TOC channels are increasingly engaging in cyberattacks, which cost clients hundreds of billions every year, present a risk to delicate organizations and federal computer systems, and erode universal certainty in the global funding structures. Transnational criminal groups, through hacking, portray significant harm to the global economy’s money and social arrangements, including banks, e-currency, stock markets, and debit and bank card operations. Digital scams organized by Central European cybercrime networks are approximated to have defrauded U.S. citizens and companies of one billion dollars in one year (Biswas, 2018). The investigation of this evidence path often requires the employment of extremely trained personnel. Though offenses can occur speedily, investigations are lengthy because of the scarcity of trained detectives and the experience required to evaluate the always-increasing data of potential online evidence.

Conclusion

In conclusion, many foreign challenges, like terrorism, the proliferation of nuclear weaponry, and cybersecurity, remain severe dangers to the country’s well-being. When it comes to each foreign topic evaluated, Americans feel collaboration with other nations is critical; therefore, the U.S. has more concerns regarding TOC threats than other nations. This is particularly accurate when it comes to the transmission of dangerous illnesses. Global climate change and Russia’s authority and control are seen as severe dangers by most citizens in the United States.

References

Biswas, R. (2018). Emerging Markets Megatrends, 10(1), 1-11. Web.

Rose-Ackerman, S., & Palifka, B. J. (2018). International Economic Association Series, 10(2), 75-11. Web.

Sanchez, G. E., & Zhang, S. X. (2018). The ANNALS of the American Academy of Political and Social Science, 676(1), 135-151. Web.

Transnational Organized Crime Network: Definition and Aspects

At present organized crime networks are transforming into transnational networks operating in different countries. It goes without saying that globalization has contributed greatly into this process.

The development of technology has brought new opportunities for criminal networks to achieve their goals without paying much attention to any boundaries. These transnational organized crime networks have much in common with other type of violent non-state actors (VNSAs), terroristic groups. Of course, there are certain differences.

In the first place, it is necessary to identify what transnational organized crime network is. Basically, the difference between traditional organized crime and transnational organized crime networks is insignificant in essence, but considerable in the sphere of influence.

Thus, “organized crime group” is defined as a group consisting of 3 or more individuals which exists for some time and is “acting in concert with the aim of committing one or more serious crimes or offences…in order to obtain, directly or indirectly, a financial or other material benefit.” (Finckenauer & Chin 2006, 8).

The transnational organized crime networks can be characterized in the same way but these groups are acting in two or more countries.

Admittedly, transnational crime networks are being developed from traditional ones. Globalization has made this process much easier since at present all these organizations can communicate using the latest devices. Such communication availability enables these groups to co-ordinate their activities and be one step ahead.

In fact, numerous organized crime networks have been using “technology as a force multiplier to carry out their entrepreneurial activities with greater efficiency at lower cost” (Williams 81).

It is important to note that transnational organized crime organizations can threaten any country. More so, these organizations usually threaten several countries. As far as the threats to the US are concerned, in-depth research has been implemented. For instance, Asian organized crime networks which transformed into transnational networks threaten the USA by human smuggling (Finckenauer & Chin 2006, 31).

Apart from this intellectual property safety is also threatened by these groups. Many other organizations worldwide are involved in narcotic and weapon trafficking, and these activities are serious threats for the United States.

Admittedly, the country has to resist numerous transnational and traditional organized crime networks. Apart from this terroristic groups threaten the safety of Americans as well. Basically, terroristic groups are usually well-organized and may resemble organized crime networks. Both types of VNSAs can have a complicated hierarchy.

However, there is a major difference between these actors. Thus, organized crime networks focus on financial benefits, whereas terroristic groups are more concerned with fighting the system.

The former use acts of violence in order to get profits, secure their positions, etc. However, terroristic groups’ major aim is violence and chaos in the society targeted. This major difference leads to several other peculiarities.

Thus, organized crime networks tend to operate secretly without attracting any attention (from government, officials or public). On the contrary, terroristic groups try to attract as much attention to their actions as possible.

Organized crime networks recruit people quite secretly. In other words, the organization is a kind of “elite” club where every member plays certain role. Whereas, numerous terroristic groups try to attract as many people as possible. For instance, on the Internet there are sites which “incite individual acts of violence and terrorism against Western regimes”, these sites’ visitors can be taught to create bombs as well (Kramer et al. 2009, 264).

In conclusion, it is possible to state that numerous traditional organized crime networks transform into transnational organizations which operate on the global scale. This has become possible and even quite easy due to the development of technology and globalization.

At present there are three major threats which many countries face: the two types of organized crime networks and terroristic organization which have a lot in common, but also have certain peculiarities.

Reference List

Finckenauer, James O., and Ko-lin Chin. 2004. “.” The National Institute of Justice. Web.

Kramer, Franklin D., Stuart H. Starr, and Larry K. Wentz, Eds. 2009. Cyberpower and National Security. Washington, DC: National Defense University Press.

Williams, Phil. 2001. Transnational Criminal Networks. In Networks and Netwars: The Future of Terror, Crime and Militancy, ed. John Arquilla and David Ronfeldt, 61-97. Santa Monica: RAND National Defense Research Institute.

Internet Crime Prevention by Law and E-Business

Introduction

Internet crime (or cybercrime) comprises illegal actions carried out by people who are using information technologies for criminal purposes. Examples of cybercrime include spam, hacking, and stealing of credit card numbers, as well as the spread of illegal information while preparing to perpetrate acts of terrorism or even to wage war. With this in mind, the paper analyzes some approaches to preventing Internet crime that might be conducted by law enforcement and e-business professionals.

Law Enforcement Preventative Measures

The first way to prevent cybercrime is for law enforcement personnel to cooperate with Internet service providers. The role of law enforcement is to guarantee the privacy of citizens’ personal information. For example, in order to deal with phishing, it is necessary for law enforcement agencies to “contact the actual business that supposedly sent the email to verify if the email is genuine” (Internet Crime Complaint Center, n.d., para. 13).

In addition, it is crucial to avoid links in an e-mail, as one may find himself on a fraudulent website as a result. It is better to type the website address manually in the address bar of the browser or use a bookmark that was previously configured as a “favorite” for ease and convenience of access. As one possible solution, the government might develop and implement appropriate laws that would prohibit embedding live links directly in an e-mail.

E-business Methods of Safeguarding from Cyber Crime

Credit card fraud remains one of the most widespread cybercrimes in the world. According to Dinesh and Adhiya (2015), authentication systems, such as image click point authentication, for example, can secure customers’ personal information, including passwords or login information that might be illegally collected to steal from customers’ accounts. Moreover, anti-virus (or anti-DDoS) systems can be beneficial in preventing Internet crime as they ensure protection against Distributed Denial of Service (DDoS) attacks.

An anti-virus program should be able to rapidly recognize attacks and thwart them both through the DDoS monitoring system and by using a special protective infrastructure. Therefore, the abovementioned measures are essential to prevent identity theft.

In addition, e-business professionals should encrypt all data. In order to secure information, the Secure Sockets Layer (SSL) certificate protects data from cybercriminals and hackers, making the data unreadable to everyone except the intended recipient (Mali, 2015). In particular, the SSL certificate is a unique digital signature for a website, necessary to any e-business in order to secure the connection between client and server, and especially important during the transmission of confidential information and financial transactions. Such a precaution might considerably increase the loyalty of customers.

Conclusion

In summary, it is of great importance to establish appropriate laws and apply e-business methods to prevent Internet crime. Such measures as laws prohibiting direct links in the e-mail, or authentication and anti-virus systems, might be beneficial to secure citizens from cybercrime.

References

Dinesh, T. L., & Adhiya, K. P. (2015). Credit Card Fraud Detection Using Hmm and Image Click Point Authentication. International Journal of Advanced Studies in Computers, Science and Engineering, 4(3), 1-7.

Internet Crime Complaint Center. (n.d.). Internet Crime Prevention Tips. Web.

Mali, J. (2015). Best ways to protect Ecommerce site from cyber criminals. Web.

Policing Operations: Application of New Technologies to Combat Crime

Technology is advancing at a very fast pace bringing with it relevant new ways of fighting crime as well ambivalence. This is so due to the innovation of crime brought by the technological advancement. The police have to adopt modern technologies in order to deal effectively with crime or risk being overtaken by it. One of the new invented technologies is the robotic camera. Robotic cameras have been developed and are used in crime scenes that may look dangerous to send a policeman in. This device is controlled through wireless means by a police officer as it moves on special wheels. It is used by the police in indoor crime scenes, bomb detection sites or outdoor crime scenes (Foster, 2005).

Shot spotter is a gunshot detection system that uses electronic sensors to detect and determine a location from which a firearm has been fired. The sensors are placed around a locality and use the mapping technology to identify the people living in the shooting area. The iPad is another advancement of technology that aids the police to be more on the street while doing their entire computer works. With it, they can walk into a crime scene; ask questions while filing a report in real-time. In future more tablets will be integrated as normal police gear (Ackroyd, Harper, Hughes, Shapiro, & Soothill, 1992).

Small drones equipped with camera offer police aerial surveillance over the crime scenes, a feature, they didn’t have in the past. These drones are controlled from a laptop by a specialist and are used to spy on the criminals while giving the police an insight of the crime scene. Another technique is a GPS dart. This device is used during the dangerous car chases and allows the police to chase after the suspect, but from a safe distance and at safer speeds. It is shot from a police car by use of a laser and attaches to the suspect’s vehicle (Ackroyd, Harper, Hughes, Shapiro, & Soothill, 1992).

Vehicle number plate readers usually get attached on the highways and are used to monitor traffic offenders. This device is then connected to a database that it uses to identify an offensive car owner and send him a ticket. This greatly helps the traffic police in areas with heavy traffic. Facial recognition devices help identify a person at a crime scene using pictures taken from any camera. This technology enhances the accuracy with which the police can pursue and apprehend a suspect (Foster, 2005).

Technological challenges

Cybercrime is a new type of a criminal activity that is done using the computer. An example of such is the sending of malicious coders that are used to gather banking details such as the credit card numbers. Using this, the criminals can access a person’s or entity’s account and steal money from them. The act can be done across continents meaning that the local police might have challenges in apprehending the criminals as they lie outside the area mandated to them by law (Foster, 2005).

With the rise of internet usage, there are a number of criminal activities that have included the hijacking as well as child trafficking. In order for the police to fight against such crime, any technological inventions developed by them that spied on internet users have been resisted. The public is of the opinion that such acts are a breach of their privacy (Jurkanin & Hillard, 2005). The infiltration of the police databases by hackers using higher technology are another major hindrance to effective police service. Software advancement is a daily thing which needs the police to be well-financed in order to keep up or secure their databases. Lack of proper funding leaves the police exposed, with the criminals being aware of their move, something that hinders the law enforcers from effectively doing their work.

References

Ackroyd, S., Harper, R.H.R., Hughes, J.A., Shapiro, D., & Soothill, K. (1992). New technology and practical police work. London: Open University.

Foster, R. E. (2005). Police technology. Upper Saddle River, NJ: Pearson Prentice Hall.

Jurkanin, T. J., & Hillard, T. G. (2005). Chicago police: An inside view–the story of superintendent Terry G. Hillard. Springfield, IL: Charles C Thomas.

Financial Crime and Employment

The COVID-19 pandemic has created a fertile ground for financial crime to thrive. As the number of infections continues to increase, most governments have tightened labor mobility restrictions in a bid to contain the virus. However, this policy response has caused economic uncertainty and massive stock-market drop, making firms and individuals more vulnerable to fraud. Assessing key forms of financial crime prevalent during this unique economic situation can inform due diligence measures to reduce the risk.

Cybercrime

Increased COVID-19 cybercrime risks require that firms enhance customer due diligence procedures to guard against identity theft and data loss. With banking institutions moving monetary transactions online and employees and students working or learning remotely, the risk of cyber-attacks and identity theft has increased (Galvao et al., 2020). Virtual private networks (VPNs) have become important to organizations and schools. As a result, VPNs are now the target of phishing and denial of service attacks (Deloitte, 2020a). Cybercriminals send malicious spams and ransomware disguised as legitimate brands to deceive employees and clients. End users downloading applications meant to combat the pandemic are also at risk of such attacks. Sensitizing staff to be more cautious when clicking on hyperlinks or emails with COVID-19 content and enhancing the security of VPN services would ensure the security of data and reduce this threat.

Supply Chain Fraud

The supply chain (SC) disruption occasioned by the COVID-19 pandemic has compelled firms to look for different suppliers urgently. Engaging new third parties without proper scrutiny poses the risk of contracting disreputable organizations (Deloitte, 2020b). Further, working with different suppliers with a lower capacity to supply the volume needed can affect inventory levels. One emerging SC fraud includes fraudsters receiving payment and failing to deliver the goods (Deloitte, 2020b). Organizations have been defrauded this way when purchasing products presently in high demand, such as alcohol gels and facemasks. Identifying genuine suppliers has been a problem. For this reason, some UAE firms have adopted the blockchain technology to address vulnerabilities in the supply chains. For example, Saudi Aramco has used the Blockchain Deployment Toolkit to manage suppliers and verify their credentials (Lacina, 2020). The technology has enhanced efficiency, decreased verification time, and helped reduce supply chain fraud.

Investment Scams

While various industries are grappling with challenges of reduced operations, closure, and revenue decline, the healthcare sector has received more investment to bolster efforts to combat the pandemic. However, the risk of fraud has also increased. Investment scams involving products or services for preventing, diagnosing or treating COVID-19 have risen (Galvao et al., 2020). Alerts on research reports claiming to predict low-priced stocks of listed firms have been issued. For example, scammers using a counterfeit LinkedIn profile of the Dubai Financial Services Authority (DFSA) officials announced a $10 million grant to start-ups in India (Rodgers, 2020). The authorities flag up the loan, which was purportedly offered by the DFSA to help recipients cope with the COVID-19 effects, as a scam.

Corruption

The risk of bribery has increased in the healthcare industry during the COVID-19 crisis. The procurement of medicines and medical supplies, which are in acute shortage globally, make this sector prone to corrupt practices. According to Galvao et al. (2020), the scramble for hospital drugs and equipment by countries has increased corruption cases and bribes to expedite delivery. Allegations of bribery by governments to receive testing reagents and protective gear have been reported globally. Another aspect of corruption witnessed today is the price gouging for essential medical supplies due to relaxed procurement procedures. Transparency International (2020) notes that rushed public tenders for the purchase of ventilators and personal protective equipment (PPE) have created a fertile ground for corruption. Locally, hospitals are forced into the dilemma of purchasing products at inflated costs or combating the virus without adequate protections for their staff.

Employee Fraud

Firms face an internal fraud risk facing firms due to relaxed controls during this period of the COVID-19 pandemic. Among the forms of employee fraud expected are theft of cash, larceny, misuse of data, and release of payments without the requisite approvals (Deloitte, 2020a). Further, as remote working becomes the norm, some workers may exaggerate individual productivity to satisfy supervisors or keep their job. Falsification of compensation claims and misappropriation of resources are other ways employees may commit fraud (Stokes et al., 2020). The scheme to defraud a firm often stems from financial pressure and opportunity. Weaker internal controls, reduced working hours, dwindling sales, and remote working often motivate opportunistic employees to commit fraud (Paterson, 2020). Mitigating this risk requires training and software that tracks computer use to safeguard critical data. Performing employee background checks can also help organizations avoid hiring fraudulent employees.

Conclusion

Financial crime during the COVID-19 crisis comes in different forms. With the heightened fraud risk, ranging from cybercrime to investment scams, organizations must be vigilant to stem out internal and external threats. Due diligence measures can help reduce financial crime and protect firms from loss. Adopting a risk-based approach and data protection methods can stop criminals keen on exploiting the speedy digitization of operations to defraud firms.

References

Deloitte. (2020a). COVID-19’s impact on cybersecurity. Web.

Deloitte. (2020b). COVID-19 operating in the ‘new normal’ – A backdoor to increased fraud risk? Web.

Galvao, R., Walters, R., & Walters, L. (2020, April 17). The COVID-19 financial crime risk. Refinitiv. Web.

Lacina, L. (2020). . World Economic Forum. Web.

Paterson, J. (2020). Internal fraud surging during COVID-19. Security Boulevard. Web.

Rodgers, W. (2020). Combating COVID-19: Dubai warns of $10 million loan scheme fraud. ShuftiPro. Web.

Transparency International. (2020). First response: Procure medical supplies at any risk (and cost). Web.

Stokes, P., Case, T., Humble, G., Butler, S., & Schloffer, J. (2020). Australia: Opportunistic fraud by employees and officers during COVID-19. Mondaq. Web.

Human Factor in Enabling and Facilitating E-Crimes

Despite the increased integration of security measures in information and communication technology infrastructures, incidences of e-crime have grown exponentially over the years. The rapid internet penetration and accelerated digitization have created numerous opportunities for the perpetration of crimes through cyberspace. Although numerous initiatives have been developed to counteract e-crime, Akdemir and Lawless (2020) argue that computer and internet-enabled offenses are rising. In the article “Exploring the Human Factor in Cyber-Enabled and Cyber-Dependent Crime Victimization: A Lifestyle Routine Activities Approach,” the authors suggest that human behavior is the weakest link in the entire computer security arrangement. According to Akdmeir and Lawless (2020), external manipulators exploit the reasoning of technology users to penetrate information and technology establishments, thereby facilitating the orchestration of cybercrimes. Victims of e-crimes inadvertently contribute to the occurrence of cyberattacks through their behaviors, which neutralize the effectiveness of various security features, such as firewalls, antimalware, and antiviruses. Therefore, the human factor is the greatest enabler and facilitator of cybercrimes as it permits cybercriminals to infiltrate and compromise previously secure systems.

The characteristics and actions of internet users are fundamental components of computer security. According to Akdemir and Lawless (2020), there is a direct correlation between the risk of experiencing cyberattacks and the victim’s online activities. Fraudsters often profile their targets by evaluating the specific factors exhibited by the victims’ routine activities. Cybercrimes are primarily motivated and influenced by the casualties’ online presence (Jansen & Leukfeldt, 2016). Accordingly, Internet victimization is not randomly distributed but reflects potential targets’ successful profiling through their suitability, degree of exposure, and absence of deterring capacities (Akdmeir & Lawless, 2020). For instance, the utilization of networked internet technologies, surfing on public computers, voluntary and involuntary disclosure of personal information, and deviant online activities, exacerbate the occurrence of e-crimes.

Reaction

Cybersecurity is emerging as a prominent consideration in this era of rapid progress in information technology and internet penetration. Despite the integration of advanced protective measures, incidences of e-crimes have been skyrocketing. Although the exploitation of the inherent gaps in internet security is dynamic, human behavior and online characteristics play an influential role in increasing the risk of cyberattacks. I concur with the authors’ arguments that the traits and activities people manifest online amplify their potential of falling victim to e-crimes. For instance, using shared or interconnected network infrastructure drastically increases online users’ suitability and attractiveness to cybercriminals. Notably, no cybersecurity installations can mitigate the extensive exposure created through public connectivity. Therefore, the utilization of devices with technological vulnerabilities and susceptibilities, such as public computers and Wi-Fi networks, has been identified as prime avenues exploited by cybercriminals to perpetrate attacks.

Conclusively, the conduct and interests of the Internet facilitate the orchestration of e-crimes. Fraudsters rely on the reasoning of computer users whose activities and interests create entry points into protected devices. Using insecure and vulnerable internet connections, disclosing sensitive personal information, and engaging in deviant online activities, can be exploited by scammers and trigger subsequent compromise on the integrity of technology devices. As a result, victimization is disproportionately influenced by the behavioral disposition of internet users. The installation of anti-viruses and other cybersecurity software, such as firewalls, cannot protect individuals from e-crimes without a corresponding behavioral change. Therefore, the likelihood of falling victim to cyber-dependent and cyber-enabled crimes can be substantially mitigated by adopting a double-pronged plan, which combines personal conduct and cybersecurity strategies.

References

Akdemir, N., & Lawless, C. (2020). Exploring the human factor in cyber-enabled and cyber-dependent crime victimization: A lifestyle routine activities approach. Internet Research. Web.

Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79-91. Web.

How to Stop Internet Crime?

Today, the Internet crimes can be discussed as the significant part of the users’ everyday reality because the improvement of technologies is closely associated with the development of new crimes in the cyberspace. In his book The dotCrime Manifesto: How to Stop Internet Crime, Phillip Hallam-Baker discusses the controversial question of the Internet crimes with references to the ways proposed to overcome the problem and create the secure Internet environment.

Statement of the Book’s Purpose

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the notions of security, accountability, and privacy; and this approach is presented as more effective in comparison with the possible reconstruction of all the Internet security principles. Thus, Hallam-Baker discusses the development of the Internet security principles and mechanisms, provides the background for understanding the current tendencies associated with the Internet crime, and presents the comprehensive action plan on improving the Internet infrastructure (Hallam-Baker xxii). As a result, the book aims to provide methods to improve the Internet security with the focus on the existing principles and measures.

Overview of the Book’s Content

Hallam-Baker’s book can be discussed as the collection of the detailed guidelines on how to cope with the problem of Internet crimes while providing the guidelines with the strong background related to the Internet crimes’ development (Kessler 71). The book is divided into 19 chapters which are organized into four sections according to the subjects discussed in the chapters.

The first section titled “People Not Bits” combines five chapters on the subjects of the crimes’ motives and the idea of accountability. Hallam-Baker introduces many basic ideas associated with the Internet crimes in this section and states that the main motive for crimes is money. Discussing such basic notions as architecture, strategy, and design, the author states that to overcome crimes, it is necessary to reintroduce the idea of accountability in the cyberspace (Hallam-Baker 117).

The second section “Stopping the Cycle” includes four chapters which are oriented to discussing the measures to stop such crimes as phishing, botnets, and spam. Hallam-Baker is rather consistent in relation to presenting the techniques which can help users cope with phishing, botnets, and spam because these crimes are the most popular in the cyberspace (Hallam-Baker 198).

The third section “Tools of the Trade” includes two chapters on cryptography and ways to establish trust. In these chapters, Hallam-Baker accentuates the necessity of using cryptography to resolve the problem of the Internet crimes and pays attention to the notion of trust in the context of the cyberspace with references to the ideas of identity and digital certificates (Hallam-Baker 226).

The fourth section of the book is titled “The Accountable Web”. Eight chapters of the section present the clear guides on how to develop the secure transport, messaging, identities, networks, and platforms. To develop the accountable web, it is necessary to focus on the newly proposed technologies which can be helpful for protecting the data and activities important for users (Hallam-Baker 374). If the previous section proposed the short-term solutions to protect users from the Internet crimes, this section provides the strategically developed long-term solution according to which it is possible to build the accountable web. Much attention should be paid to the final chapter of the section which provides the list of easy rules necessary to implement the whole plan into action (Hallam-Baker 379).

Value of the Book’s Message or Content for Business

Hallam-Baker’s book can be interesting and helpful for many users relying on the Internet opportunities, but it is especially important for businessmen who can suffer significantly from the Internet crimes. If the goal and motive of the web criminals are to gain some benefits from the Internet crimes, the goal of businessmen is to create the secure cyberspace for their activities (Reich and Gelbstein 112). From this point, Hallam-Baker’s book can be discussed as the valuable source for businessmen because the book provides the comprehensive guidelines on the necessary actions to protect the users’ privacy and web activities.

In spite of the fact that the Internet security is the comparably new issue discussed by businessmen in the context of controversial ethical dilemmas, much attention should be paid to protecting the interests of businessmen as the active users of the Internet because the company’s profits can be at stake if the issue of the Internet crime is identified. Hallam-Baker offers the rational plan of action developed to stop phishing, botnets, and spam and to create the accountable web (Austin par. 1-2). Many short-term techniques proposed in the book can be used to enhance the businessmen’s efforts associated with building the secure cyberspace for their daily activities.

Thus, Phillip Hallam-Baker’s The dotCrime Manifesto: How to Stop Internet Crime can be discussed as the useful source to explain the concept of the Internet crime to many users, including businessmen, and as the important source to provide the action plan to create the secure Internet infrastructure.

Works Cited

Austin, Richard. by Philip Hallam-Baker. 2008. Web.

Hallam-Baker, Phillip. The dotCrime Manifesto: How to Stop Internet Crime. Upper Saddle River, NJ: Addison-Wesley, 2008. Print.

Kessler, Gary. “Book Review: The dotCrime Manifesto: How to Stop Internet Crime (Hallam-Brown)”. Journal of Digital Forensics, Security and Law 3.2 (2008): 71-73. Print.

Reich, Pauline, and Eduardo Gelbstein. Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization. USA: IGI Global Snippet, 2012. Print.

Rogue Security Software: Digital Crime Scenario

Introduction

According to the intelligence service, online fraud has been the most commonly used type of digital crime. In addition to that, they have released a report that says that one out of every ten users of the internet has at one time or the other been a victim of the online fraudsters who pose as clients or sellers or merchandise (Harkins, 2011). This prompted the government to create a website where one can be able to report any incidences of online fraud.

Thesis Statement

With reference to the given question, this paper will a scenario that details of a digital online fraud and will also give the specific detail of the fraud.

Scenario of an online fraud

A very good example of an online fraud is where internet users fall victim to the rogue security software that is found over the internet.

This type of software is used to trick the internet user into buying and installing a fake antivirus which in term takes over the operations of the computer (Harkins, 2011). This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website and once it has been clicked it automatically installs itself into the operating system of the computer (Bird, 2011).

The website will then display a warning of a virus in the computer operating system and will then encourage the internet user to buy and install an antivirus that they have. The internet user will go ahead and buy the antivirus without realising that it is not a genuine antivirus. The antivirus then installs its components into the computer which may appear in many forms.

Once the components have been installed, the website will continue to alert the internet user of more malicious components and will lure the internet user into paying for more services. The components will then disable some of the parts that are involved in the uninstalling of the malware so as to stop the user from being able to uninstall the components that are in the operating system (Bryant, 2008).

The developers of this rogue security software will play with the internet user’s mind to be able to make him / her pay for services using his / her credit cards yet nothing is being done to fix the situation. This kind of fraud account for 50% of the internet advertisement that are seen on a daily basis and this gives a more likely chance for internet users to be able to fall into the traps of the internet fraudsters.

These developers create a problem for the internet user who clicks on the fake advertisements that are displayed on websites and thereafter charge him / her lots of money so as to able to fix the problem which is not what they will do. They instead continue creating more problems for the internet user and continue luring him / her into paying for the services of trying to remove the malware that has been installed into the operating system of the computer (Thorsteinson, 2009).

Conclusion

In conclusion, for the developers of the rogue security software to be able to lure the internet users into their traps, they are creating an advertisement that informs that internet user of a win from visiting the website and after he /she has click of the win, malware is automatically installed into his / her computer thereby giving the chance to the developer to charge the internet user for the services of removing the malware.

References

Bird, R. (2011). CyberLaw: Text and Cases, Oklahoma, OK: Cengage Learning.

Bryant, R. (2008). Investigating Digital Crime, London, UK: Oxford University Press.

Harkins, B. (2011). Rogue Software. London, UK: John Wiley and Sons.

Thorsteinson, P. (2009). Net Security and Cryptography, New York, NY: Sage.

Hate Crimes and Demystification of the Evils Associated With Them

The present day society has evolved into a world where hate crime is the order of the day. Hate crime and its effects have spread out widely and as a result, it has clogged the minds of many (like is the case with Steve, whom the essay uses as a perpetrator) to an extent of acting inhumanly towards colleagues.

These people apparently are perceived to have different kind of lifestyle. Therefore, hate crime can be defined as a form of discrimination on a person or a group of people as a result of them identifying with the practices of a different minor group, for instance a religion or a race. Oppression can be manifested through intimidation, assault or even through the destruction and confiscation of property (Barbara, 2009).

This essay seeks to demystify the evils associated with hate crimes. Steve identifies with a certain ethnic group which craves to be in power. For this reason, Steve and his counterparts have jealousy and greed to deal with and will stop at nothing to attain power. Last time an election was carried out tension was high which soon grew to a full blown war after Steve’s ethnic group lost the elections.

Lots of the victims’ property and lives were destroyed due to the disagreement on the results based on claims of rigging. Violence and other forms of inhuman behaviors prevailed enormously.

Steve and other like minded perpetrators suffer from a condition called inferiority complex. They replace their inferiority with an urge to oppress others. In their minds such people believe in the notion that their victims are inferior so they can do to them whatever they please and get away with it. Perpetrators usually work in numbers so that no single person is accountable for the group’s acts (Barbara, 2009).

Victims of hate crime find themselves in such circumstances because of their unchangeable traits which define them. As such, victims are in a constant state of fear of the unknown. As a result they seldom relate or associate with others of their kind in the open as this could turn out to be catastrophic in the presence of their oppressors.

A survey carried out reveals that homosexuals (lesbians and gays) like to keep their sexual orientation to themselves since they feel intimidated at the thought of victimization, they are an easy prey (Mason, 1996). In the unlikely event that victims demonstrate or retaliate against oppression their efforts are met by violence and destruction from their enemies. Thus they prefer to keep their calm.

Hate crime like other crimes, is triggered by quite a large number of emotions. However unlike other crimes, it begins with the arousal of the emotions based on bias and directs them towards a minority group. Also prejudices play quite a remarkable role in fueling crime based on hate.

Assumptions made by the perpetrators regarding the difference the minorities have may not reflect the truth. In other cases the assumptions may be true but exaggerated in a manner that portrays the difference as a threat to other society members (Neil and Jon, 2009).

In our case, Steve fears for his ethnic group as he assumes that with power comes the right to discriminate others in terms of sharing of resources and opportunities. However much this could be true it does not cause danger to the society since there are rules and regulations put in place to regulate equal distribution of resources and opportunities.

The effect of hate crime is manifested both physically and physiologically (Neil and Jon, 2009). In our case, destruction of property and loss of lives characterizes the phenomenon. As a result this affects a states’ economy negatively as it robs a nation off its human resource.

Besides, the cost of fixing the destroyed property is quite expensive and the two feuding parties can hardly work together. From the psychological perspective victims are left overwhelmed with emotions of anger for their loss, fear in the likely event of the violence recurring and depression as a result of their hopelessness.

It is human nature when one protects his own kind whenever problems appear. Better yet, there is tendency to find a scapegoat to avert the problem. However much the problem of hate crime may seem to prevail it can be controlled through the laws that have been put in place.

For instance, “the local law enforcement hate crimes prevention act”, which gives the judiciary the mandate to convict these kinds of crime (Human Rights Campaign, 2007). Victims of such violence are advised to take action by seeking justice through the right channels so that perpetrators can be dealt with accordingly.

Besides, anyone having the fear of victimization has the mandate to protect himself and others of his kind. It is upon him to ensure that he is safe by avoiding isolated areas so that in the event of an attack he can at least seek help easily from other public members. Also it is important for him to be aware of his immediate environment in terms of who the neighbors are and whether they have anything against him and his kind.

Reference List

Neil, C & Jon, G. (2009). Hate Crime: Impact, Causes and Responses. SAGE Publications Ltd. Washingtone DC.

Human Rights Campaign (2007). The local Law Enforcement hate Crimes Prevention Act, Free Press.

Mason, A. (1996). Queer Bashing: A national survey of hate crimes against lesbians and gay men. London: Stonewall.

Barbara, P. (2009). Hate crimes. Greenwood Publishing Group. London.

Explaining Deviance and Crime

Introduction

In as much as the law advocates for equality irrespective of age, gender or social class, it sometimes tend to favors the socially and economically privileged persons. These favors can be noted by careful evaluation of certain implications and applications of the law. Many countries, whether developed and underdeveloped, suffer from this legal problem, despite their efforts of containing the situation.

Body

The law consists of several clauses including the ones that safeguard the rights of the general public. However, many citizens do not enjoy these rights due to various underlying reasons, which include poverty or lack of funds. This point is emphasized when an individual’s rights are violated, and thus requires a considerable amount to facilitate compensation claims.

A person will have to spend a substantial amount of money, in hiring a lawyer who will represent him or her in court. However, these fees paid to attorneys are always not affordable especially to the economically deprived persons.

This, therefore, places the underprivileged persons in a position of not being able to protect their rights or claim for damages incase of infringement. On the other hand, the economically privileged persons have the capacity of hiring some of the best attorneys, to represent them in courts, in cases of infringements. This grants them the capacity to protect their legal rights, when breached or disregarded.

In most countries, laws are made by the congress or parliament, which are bodies consisting of upper-class persons. As they make these laws, they often favor their interests, instead of protecting the rights and interest of the numerous citizens. For instance, they enact several laws that favor their interest, which in most cases entails the increase of remunerations and unreasonable privileges.

Despite being extraordinarily remunerated, they still draft laws which grant them automatic VIP treatments, pay their intercontinental trips, exempt them from tax, and pay for their overseas medical treatments (Hamutuk). However, this is often not a reflection of what most citizens would have wanted their money spent. On the contrary, most citizens prefer their taxes to be used in either development activities or improving the lives of the unfortunate.

These scenarios are common in developing countries, whereby citizens are left to languish in poverty, while their leaders enjoy their lavish privileges. This is extremely unfortunate to the unprivileged citizens, since they are denied fundamental rights to basic needs, which include food, clothing and shelter.

Law makers have various wealthy friends in the society, who influences some of their vital decisions. They often draft and enact laws that favor their friends as a reward to some of their previous assistances or deals (Kornblum, 165). For example, certain countries pass laws such as tax cuts to certain economic class (upper class) thus making them wealthier; for instance, the US (in 2001).

Additionally, certain countries restrict the number of immigrants based on an individual’s economical abilities; only the wealthy are allowed to enter the country. Such laws are unfair to the poor, since they lean in favor of one side i.e. the rich.

Conclusion

It is extremely significant for the law to uphold parity irrespective of an individual’s background, age, social status or class. However, in most scenarios, the law seems to protect the interest of the wealthy, instead of maintaining a level ground. This can be observed in various circumstances whereby the wealthy are, to a certain degree, favored by the law. The legal system should, therefore, consider adopting certain mechanisms that may help contain such scenarios.

Works Cited

Hamutuk, La’o. . Coalition to save the money of the people and nation. 2007. Web.

Kornblum, William. Sociology in a changing world. Belmont: Cengage learning 2007 (8) 165-168.