1. Cyber Crime and regulations
The growth of technology has changed our lives dramatically. Computers were viewed as a luxury or even
an extravagance 30 years ago. People relied on television, newspapers, and radio as primary sources of
news and information. Cables, modems, and online services were virtually nonexistent.
Today, computers are prevalent in businesses, homes, schools, libraries, and even airports. The World
Wide Web provides instant access to news, reference information, shopping, banking, stock trading,
auctions, and travel information and reservations. People routinely use the Internet to take college courses,
play games, listen to music, and view videos. Chat rooms and e-mails are now replacing telephones as
favorite means of long-distance communication.
The rise of computer technology obviously has enhanced our lives in many ways, such as enabling
improved productivity and efficiency at work, school, and home. Anyone with access to a computer and
modem now has unparalleled recreational and educational opportunities.
Unfortunately, criminals are also using modern technology—to prey on innocent victims. Computers and the
Internet have made the criminal’s job easier. Historically, predators found their victims in
...
This approach eliminates many of the risks predators face when making contact in person.
Online Pornography - possessing or distributing child pornography is against federal law and distributing
pornography of any form to a minor is illegal.
There is a huge impact on the victims of cyber stalking. In contrast, the state attorney general's offices in
neighboring states indicated they have never received an inquiry into this type of behavior. Like conventional
terrorism, `e-terrorism' is classified as such if the result of hacking is to cause violence against persons or
property, or at least cause enough harm to generate fear. This act will create a national fraud alert system
so consumers have to make just one telephone call to report fraudulent activity.
The Cyber-Crime and Intellectual Property Theft program seeks to collect and disseminate data and
research on six 'popular' categories of cyber-crime that directly impact citizens and consumers.
• The lack of adequate statutory authority also can limit law enforcement's response to cyberstalking
incidents. Hacking is also the act by which other forms of cyber-crime (e.
“Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such
as following a person, appearing at a person's home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person's property. Then, one day, a regular participant
sent her a threatening e-mail. Most cyberstalking laws, however, allow for prosecution if someone receives
repeated e-mails threatening violence.