Hacking: The Cost Of Crime In The 21st Century

Great Essays
Since the creation of the internet in the late 1960’s, it has expanded even more than it creators could have thought. What was once just used by the government and researcher to share information across the world has now become the driving force of society worldwide, we depended upon it daily. With this expansion we have also seen it become a growing concern for law enforcement agencies around the world; the reason being that criminals have moved their operations from the traditional forms of crime into crime that is based in the cyber world (cybercrime). One of these cybercrimes is hacking, since it has become a massive threat not just to the public and private sectors, but also to national security. With hacking becoming such a threat to …show more content…
They were able to break up the hackers into three categories based on their findings, “good hackers”, “notoriety or fame driven hacking”, and “hacking for profit” (Leeson, 2005). Good hackers are a little harder to understand since there really isn’t any true motivation for them. The reason being that they don’t earn fame or fortune from their acts and are a “gray” area of the law, because they are still technically break the law. Fame hackers hack to become the best of the best and want the recognition from the hacker community. They are able to gain this fame by the amount of damage they are able to cause and the hacking programs they make and share with the community. They are also know shun the profit drive hackers who work for the big corporations, since they view the big corporations as the bad guys for not sharing information (Leeson, 2005). Lastly, the profit driven hackers are the ones that hack for the monetary gain, they can be white or black hat hackers, it just depends on what they hack or who they hack for. White hats work for corporations and find security weakness in their systems, while the black hats hack to steal money or data that can be sold on the black …show more content…
Then on top of this already long list of issues hackers are tech savvy and law enforcement officers usually aren’t and if they are, they do not have the skills needed to combat the hackers.
When it comes to the lack of resources facing law enforcement it can be summed up into one issue they don’t have the money to back a cyber unit. The fact is that to train and hire new officers to have the skills needed, it takes money and to get this money the public has to see that cybercrime really is a growing problem and to see that it has to be reported. However, since the public doesn’t know they have been hacked and most corporations don’t report it, due to the mistrust of the police and fear that the publicity will hurt their image and; law enforcement agencies can’t get the funding revenue (Goodman,

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, if a hacker attains a patient’s record and adds false information to it, the risk of a medical complication increases. Categorizing Cyber Attackers Cyber attackers are categorized according to who they target, what tactics they use and which techniques they employ. 1. The Hacktivist A hacktivist is politically-motivated and targets institutions that have opposing political beliefs.…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Structural Changes

    • 1038 Words
    • 4 Pages

    Another item that has changed since the attacks on the World Trade Center and the Pentagon on September 11, 2001 was that local law enforcement agencies and the federal government now interact more within one another. Both local law enforcement and the federal government progressed through a variety of “procedural and structural changes” (Marks 166). There were changes after 9/11 that caused federal agencies to have more interactions with local law enforcement than they would have had prior. One of the reasons there was a change among federal and local agencies and their level of interaction was because they wanted to eliminate the possibility of stove piping occurring again. They would communicate more frequently because of “departmental procedures…

    • 1038 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Academic Search Premier. Web. 24 Feb. 2015. http://web.b.ebscohost.com.ezproxy1.lib.asu.edu/ehost/detail/detail?vid=14&sid=59fa9ad9-2c8c-4d6d-9ad4-14cae4591c9d%40sessionmgr4003&hid=128&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aph&AN=98905897 Soraya Chemaly, a media critic and activist for Time, writes about how hacking is a hate crime. The majority of the celebrity hackings in 2014 were women and there hasn’t been a discussion in terms of gender-based hate, and why there aren’t pictures of men involved in the hackings.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    Homeland Security means only one thing, protect your country and the secret service is the first line of protection. “The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.” The Department of Homeland Security is charged with the primary responsibilities of protecting the United States divided into 22 divisions that respond to terrorist attacks, man-made accidents, and natural disasters. Perhaps the most significant of these divisions is the The United States Secret Service (USSS) who primarily focus on financial crimes and protection.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    Also, that hacking doesn't always mean bad and harm. The position that I endorse says Anonymous aren’t criminals and their actions are ethical from a utilitarian view. The details of this position go as follows. First, Anonymous is a hacker group that promotes free speech, unblocks access to information, and shows corruption in the government.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To beat a hacker, you should be a person who thinks like a hacker” and “To master hacking, you should need to…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Secret Service

    • 1262 Words
    • 6 Pages

    The Secret Service special agents duties include both investigations and protection. Special agents investigate financial crimes such as counterfeiting of currency, false identification, credit and debit card fraud, computer fraud, forgery or theft of U.S. They also have to protect the president in certain situation as well like, when he's on the move to go somewhere they are with him at all times. Just to make sure nothing were to happen to him or so he doesn’t get assassinated at that time as well. Abraham Lincoln was the one who created the secret service as part of the Treasury Department 150 years ago, he signed the bill the day he was shot.…

    • 1262 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    What is right or wrong is whether or not they get punished and their needs were satisfied (Taylor, Fritsch, & Liederbach, 2015). Ex: Hacking is a digital crime, whether it be for status quo, pleasure or criminal intent, all aspects of hacking is considered a digital crime. Most hackers, hack for status quo or pleasure, and feel as if they are not committing a crime as no harm is done. While some computer and of digital communication intrusion is caught, there are much that goes un-noticed, and unpunished. Leaving Hackers in the mindset that their criminal acts are acceptable and correct, as their needs are satisfied, and their criminal acts go unpunished.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Technology has been improved all around the world, having a huge impact on law enforcement. All the new technology that has been created such as body cameras, dash cameras, gunfire detection, and mobile systems are used as an advantage for policing in their daily work lives. These are just a few of the new and improved technology that not only is an assist in law enforcement but, also helps keep citizens safe. This new high-tech technology has been beneficial to law enforcement officials by helping improve police reputation, reduce crime rate, and being more responsive. New technology has helped point out the officers whoas well, with recordings of actual evidence of false claims.…

    • 1582 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unfortunately, different hackers see different moral boundaries in the attempt to achieve the end goal. Furthermore, this hacktivist stereotype is further fed if the hackers hold the view that Pierluigi mentions, “Those members [certain Anonymous members] that act just to refuse any social rules… profess themselves anarchists, they operate to destroy and create chaos” (“Anonymous Ethical code. Back to the origins”). No one can deny the immorality of certain actions done by activists, but some appear to be ignorant of the positive…

    • 1010 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Malicious hackers need to be prevented and stopped overall. Hacking in general whether it be for malicious reasons or not is becoming increasingly popular due to the exponential growth of technology in recent years. When is it not on the news that a database or a companys website has been breached? Very rarely because just about anyone is able get the software on the internet or get a tutorial off of youtube to teach them.…

    • 1785 Words
    • 7 Pages
    Improved Essays

Related Topics