Combatting Cyber Crime With Technology discussion

Our academic writers are ready and waiting to assist with any assignment you may have. From simple essays to full dissertations, you're guaranteed we've got a writing expert to perfectly match your needs.

Order a Similar Paper Order a Different Paper

Review the posts of your fellow learners and respond to at least two. In your response posts, you must do one or more of the following:

  • Ask an analytical question.
  • Offer a suggestion.
  • Elaborate on a particular point.
  • Provide an alternative opinion supported with research.

Be sure to support your initial post and follow-up posts with scholarly examples from the module readings and additional literature where appropriate. You must cite all references according to APA style.

Classmate # 1 Charles

Between 2002 and 2004, a group of cyber-criminals known as Shadowcrew dealt in stolen credit card and personal information, and their crimes have been estimated to cost over $4 million. They used phishing and spamming techniques to capture credit card numbers, then purchase items with the stolen card numbers, and send the merchandise to specified addresses. The criminal group reached 4000 members at its peak. One of the main administrators of the site, Aleksi Kolarov was arrested a decade later in Paraguay. Kolarov pleaded guilty to conspiracy to commit identity theft and access device fraud, and was sentenced to 30 months in federal prison.

When asked how cyber-criminals such as Kolarov are caught, Chris Painter, Deputy Chief, Computer Crime and Intellectual Property Section of the U.S. Department of Justice, credits the ability to trace communications when attacks begin. He added that these crimes are profit based, and therefore, there are money trails to follow. He gives much credit to “good old-fashioned investigations” (Greene 2006). The “good old-fashioned” tactic used in this case was the arrest of a Miami, Florida hacker named Albert Gonzalez, an administrator for Shadowcrew, who cooperated with law enforcement, became an informant, and created an electronic porthole for federal agents in New Jersey to track and record transactions through a modified, encrypted computer board. This was completed during a year-long operation known as “Operation Firewall”. On a side note, while working as an informant for federal law enforcement, Gonzalez was working his own scheme stealing millions of dollars from banks, businesses, and consumers. He was caught in 2008, and is now serving a twenty year federal prison sentence (Sherman, 2013).

Classmate # 2 Jessica

The article I chose was a woman was sentenced for cyber stalking. She started sending texts, phone calls, and posting things on social media. She had never met the person she was harassing but did not stop. The FBI stepped in and tried to see who was behind all of these texts and phone calls. The woman was threatening her and they needed to find out who it was. The FBI caught the woman months later by a video call. The suspect was demanding 100,000 dollars to stop so they set up a meeting and that is how she was arrested. The technology that was used was the computer, they used the video chat to set up a in person meeting so they could arrest her. She was sentenced to 22 months in jail.

Do you need help with this or a different assignment? In a world where academic success does not come without efforts, we do our best to provide the most proficient and capable essay writing service. After all, impressing professors shouldn’t be hard, we make that possible. If you decide to make your order on our website, you will get 15 % off your first order. You only need to indicate the discount code GET15.

Order a Similar Paper Order a Different Paper