Home Utilizing Computer Networks

Utilizing Computer Networks

Utilizing Computer Networks For Information Warfare

Utilizing Computer Networks For Information Warfare

Information warfare is a strategic tactic that involves using data in a potentially harmful way. Many criminals commit information warfare as a means to: spread slander, disperse propaganda, vandalize web pages, cause network interference (otherwise known as a “denial of services attack” or “DoS Attack”) either physically or by installing a virus, in order to exploit an individual or a particular situation, or just using someone’s personal information in an unethical manner.
Many times, information warfare is put into action using televisions and radios as a tool to disseminate information and jam frequencies in order to complete information warfare.
Information warfare is directly connected to a type of computer crime known as cyber warfare. Cyber warfare has the same intention as information warfare due to the fact that it involves the spreading of classified information or distorting the truth in order to achieve political, social, economic gain, or as a way to perpetrate destructive behavior. However, cyber warfare is more directly connected with computer and/or Internet usage.
Many times, cyber warfare is brought on when someone, or a group of people, hack into a computer’s system or there is a breach in security within the network. Criminal hackers will hack into an account to gather secured information in order to take part in information warfare via a computer’s network or Internet (cyber warfare). The action may be against a person or company against whom the perpetrators may have a personal vendetta, or it might be implemented for political, social, or financial gain.
Cyber warfare can result in cases being brought to court. A great deal of these computer crimes even involve high ranking military officials or politicians. Recent reports conclude that over one hundred countries have considered using the Internet as a way to wage cyber warfare against their enemies. Many cyber warfare cases were reported during the summer of 2009. The attacks were initially considered to be coming from North Korea, but further investigation revealed that the attacks were actually carried out by someone from the United Kingdom.

Utilizing Computer Networks Phishing Scams

Utilizing Computer Networks Phishing Scams

A phishing scam is a scheme that involves luring victims to fake Internet sites, often disguised as everyday social sites, popular banks, etc., in order to retrieve personal information from the victim. Sometimes, phishing scams might not involve fake sites, but instead might involve a person taking on a false identity. These impersonators may claim that they are there to help the victim gain profit, when really their intention is to exploit the victim and to take advantage of them financially.
 
 
Many times, phishing scams can cause serious consequences to the victim including financial loss, identity theft, and not being able to access websites that the victim would normally be able to log on to (i.e. a personal email, bank account, etc.).
 
 
One of the best ways to avoid falling victim to a phishing scam is to heed specific warning signs. For example, if one were to receive an e-mail from a bank he or she does not have an account with or an e-mail from his or her bank that sounds like a mistake, it would be best to call the bank directly rather than taking action online. This could be a clever phishing scam for personal information.
 
 
Another warning sign is when you receive an e-mail from an unknown person with a general beginning to the letter (for example: "Dear Friend" or "Dear Miss") or if the letter talks about any kind of financial transaction with an unknown source, it is most likely a phishing scam. Inside of many e-mail accounts, there may be an option within the browser where you can actually report e-mails as phishing scams.
 
 
The Anti-Phishing Working Group is an organization that is set up to combat phishing scams. It is the belief of this organization that, as the public becomes more and more aware of phishing scams, the practice of phishing scams will die out. Punishments for phishing scams can include jail time or fines.

An Overview of Utilizing Computer Networks

An Overview of Utilizing Computer Networks

In the past few years, the number of computer crimes has risen due to the ease of crimes utilizing computers as a tool to commit unlawful acts. These computer crimes include computer fraud, phishing scams, identity theft, cyberstalking, and information/cyber warfare. Most of the time, these tactics are carried out in order to achieve some sort of financial, personal, political, or even social gain, even though the means are considered illegitimate.
Cyberstalking
Although many computer crimes involve the use of computers for money, some criminals have another kind of agenda. A good example of a computer crime that is usually committed for more personal reasons is cyberstalking. Cyberstalking is when a criminal becomes infatuated with an individual (or sometimes more than one person) and continually uses the computer as a way to harass the victim.
Harassment can include unwanted photos, e-mails, chatting, or the criminal may do or say something via the Internet that could potentially harm the victim(s). In order to avoid being stalked via the Internet, law enforcement suggests that you do not have an obvious username/password and do not be too liberal about giving out this information.
It is also recommended to stay away from anything that could be deemed as “suggestive” (this includes: usernames, pictures, e-mails, chatting, etc.). Also, when chatting, if anyone tends to make you feel uncomfortable during a chat session or says or does anything that could be considered harassment, block them and then immediately report them to your Internet service provider.
Phishing Scams
Another scam that is a regular occurrence viewed via the Internet is what is commonly referred to as a phishing scam. A phishing scam often involves the victim being lured to a false website or an impersonator that will try to gain the victim’s trust and somehow steal their personal information. Many times, the criminal’s intention involves the use of the victim’s information for the purpose of invading their funds. However, there are ways to avoid becoming a victim of phishing scams.
One course of action that can be taken includes reporting suspicious or unfamiliar e-mails. Many times, e-mail accounts have an option within the browser to report e-mails as phishing scams. Also, if you receive a suspicious e-mail from your bank, or an e-mail from any bank, make sure to call the bank directly rather than filling out information online as this may be a scam to access personal data (the same also goes for any kind of loan or even a credit agency).

Cyber Stalking

Cyber Stalking

The act of stalking can be described as a constant unwanted pursuit of another individual. Cyber stalking is the same action, but with the use of a computer. Cyber stalking is considered to be a serious cybercrime. Many times, someone commits cyber stalking when he or she becomes fixated on one particular victim. Other times, the stalker can commit cyberstalking by stalking more than one victim at a time.
The stalker can use various ways on the Internet to contribute to his or her obsessive behavior. This includes: constantly trying to chat with someone who has expressed non-interest, sending unwanted materials (i.e. photos, e-mails, etc.), and anything that contains a harassing or threatening message or an action performed on the Internet that could bring harm to the stalker’s victim.
Unfortunately, because of the convenience and accessibility of the Internet, it becomes much easier to locate victims by collecting the victim’s phone number, address, and other various pieces of personal information, thus helping to enable cyberstalking. In the early 1990s, after the rise of Internet use, five women were murdered in the State of California as a direct result of cyberstalking. After this frightening chain of events, public awareness of cyberstalking had to be increased, including the serious repercussions that a victim could suffer.
Due to the increase of cyberstalking, penalties can range anywhere from a restraining order, to years of jail time depending on the State, the specific charges and the severity of the actions committed by the stalker.
So what can one do to avoid cyberstalking? When using the Internet, to avoid cyber stalking do not post anything that you would not wish anyone to see or that may be deemed as “suggestive”. This includes: photos, chats, or even user names. This will avoid attracting attention from any unwanted pursuers. If you are chatting with someone who starts to become aggressive or says anything that may make you uncomfortable, you should exit the program immediately and report them to your Internet service provider.
One of the perks of online chatting is that the conversation is documented and it is easier to monitor a particular user and thereby pinpoint cases of cyberstalking. There are also “safe sites” that encourage a no-harassment policy. These particular sites may be safer to browse and will probably take strong action against harassment claims.

Attorneys, Get Listed

X