Skip to main content icon/video/no-internet

The rapid, global growth of computing and communications technologies (collectively known as “information technologies”) has caused an increase in technologically sophisticated criminal activity and international economic espionage. Changes in the world's political, economic, and technological environments are fundamentally altering sophisticated crime. The collapse of communism, the end of the Cold War, the globalization of the economy, and the rapid development of new information technologies have combined to create new vulnerabilities and provide criminals with new capabilities. The reach of criminal sanctions has expanded as lawmakers change criminal codes to establish economic and social policies regarding the use and dissemination of technology and information.

Criminal innovation always accompanies technological advance. The computer and the Internet are radically transforming corporate management and the conduct of commerce. But they also have created new vulnerabilities. With cyberspace comes cybercrime. Malevolent hackers, fraudsters, industrial spies, mafias, terrorists, and other criminals are exploiting the Internet to market scams, steal secrets, sabotage commerce, or conceal illegal activities.

All of these new threats are difficult to assess and nearly impossible to quantify. Many of them, such as terrorism, organized crime, drug trafficking, economic espionage, and cybercrime, have been elevated to the level of national security concerns. Most of these threats transcend national frontiers and combating them effectively will require a level of international cooperation that remains to be achieved.

Attack Incidents

According to the most recent annual report from the Department of Defense's Computer Emergency Response Team (CERT), more than 4 million computer hosts were affected by computer security incidents in 1999. Both damaging computer viruses, such as Melissa, Chernobyl, Explorer Zip, and Love Bug, and remote intruders have exploited system vulnerabilities. CERT documented that such incidents grew at a rate of around 50 percent a year, which is greater than the growth rate of the Internet hosts.

A series of well-planned and coordinated attacks on several of the nation's biggest Internet sites began on February 8, 2000 and continued for several days. Within seconds of the first wave of attacks, two popular sites, search engine http://Yahoo.com and http://retailerBuy.com, were effectively shut down for several hours. Over the next two days, some of the Internet's flagship sites were similarly disrupted, including news outlets http://CNN.com and http://ZDNet.com, retailer http://Amazon.com, auction house http://eBay.com, and brokerage house E-Trade. These attacks inconvenienced millions of Internet users and resulted in a loss of revenue for several of the affected sites.

Investigatory Challenges for Law Enforcement

The changes the Internet has wrought on our society—to business, education, government, and personal communication—are evident all around us and still very much in flux. The cyberrevolution has permeated virtually every facet of our lives. Unfortunately, that revolution has entered the criminal arena as well. Just as millions of people around the globe have incorporated the Internet and advanced information technology into their daily endeavors, so have criminals, terrorists, and adversarial nations. Cybercrime presents a fundamental challenge for law enforcement in the twenty-first century. By its very nature, the cyberenvironment is borderless, affords easy anonymity and methods of concealment, and provides new tools to engage in criminal activity. Someone on the other side of the planet is now capable of infiltrating a computer network in the United States to steal money, abscond with proprietary information, or shut down e-commerce sites.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading