{"id":2302,"date":"2013-02-05T13:25:55","date_gmt":"2013-02-05T18:25:55","guid":{"rendered":"http:\/\/www.carnaghan.com\/?p=2302"},"modified":"2018-02-18T22:18:53","modified_gmt":"2018-02-19T03:18:53","slug":"cybercrime-vs-traditional-crime","status":"publish","type":"post","link":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","title":{"rendered":"Cybercrime vs Traditional Crime"},"content":{"rendered":"

\u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d\u00a0 The Associated Press (2013).\u00a0 This story has been in the news only in the last couple of days.\u00a0 It is a good example to show the severity of cybercrime and the extent to which it has a greater potential for harm than traditional crime.\u00a0 Robbing a bank traditionally meant isolated incidents at individual banks.\u00a0 Cybercrime opens new doors to criminals where they have the power to defraud entire institutions in ways that would not have been possible traditionally.<\/p>\n

The complexities in catching cyber-criminals has meant that, in the past, many have gotten away with their crimes and do not face the same punishment as traditional criminals, which most likely lead to the attraction of committing the crime in the first place.\u00a0 While laws have been slow to adapt to these newer forms of criminal activity, progress has been made.\u00a0 In InfoWorld\u2019s Security Central article on Cyber Crime, Roger Grimes reminds us that only a few years ago, malicious hackers could steal millions of dollars, cause mass damage and yet escape jail time.\u00a0 Nowadays prosecutions have greatly risen along with the prison time attached to such sentences.\u00a0 It is a difficult question to address whether cybercrime should be punished the same, more or less severely than traditional crime because there isn\u2019t always a clear cut way to compare the two.\u00a0 In some ways laws are improving, however Grimes argues that the pendulum has swung too far in some instances.\u00a0 We only have to look back over the last year to the case of Aaron Swartz, threatened to 30 years of prison for attempting to get free access to a university database, which ultimately led to him taking his own life.\u00a0 In contrast to traditional crime, people have served less time in murder cases.\u00a0 Richard O\u2019Dwyer, a 23 year old student in the UK, set up a website which provided links to pirated copyrighted films and television programs.\u00a0 He lost an extradition case where he would be sent to the US to be prosecuted, however this was later appealed.\u00a0 The case made worldwide headlines and many felt that the punishment was extreme.\u00a0 YouGov ran a poll confirming only 9% of British citizens felt he should be extradited to the US for trial.\u00a0 Jimmy Wales (founder of Wikipedia) launched a campaign calling for the extradition to be stopped.<\/p>\n

I firmly believe that malicious hackers, those who seek to do harm to or defraud other individuals or organizations should pay the price, certainly in cases such as the credit card fraud incident mentioned earlier.\u00a0 It is however going to be on ongoing challenge as it is not always clear the type of response that should be warranted in individual cases.\u00a0 The laws will need to continue to adapt in a way that punishes real cyber criminals, criminal organizations and those that seek to do harm to others, and spend less time wasting resources on students who download the latest movie or post links to television programs they haven\u2019t paid for.<\/p>\n

References:<\/p>\n

    \n
  1. BBC.\u00a0 (2012).\u00a0 \u2018Piracy\u2019 student Richard O\u2019Dwyer loses extradition case. \u00a0Sheffield & South Yorkshire.<\/i>\u00a0\u00a0 http:\/\/www.bbc.co.uk\/news\/uk-england-south-yorkshire-16544335<\/a><\/li>\n
  2. Gardiner, B.\u00a0 (2012).\u00a0 O\u2019Dwyer extradition.\u00a0 Retrieved from http:\/\/yougov.co.uk\/news\/2012\/07\/09\/odwyer-extradition\/<\/a><\/li>\n
  3. Grimes, R. (2013).\u00a0 Cyber crime sentencing is out of whack.\u00a0 InfoWorld Security Central.<\/i>\u00a0 Retrieved from: http:\/\/www.infoworld.com\/d\/security\/cyber-crime-sentencing-out-of-whack-211700<\/a><\/li>\n
  4. Zezima, K.\u00a0 (2013).\u00a0 18 Charged in $200M global credit card fraud.\u00a0 The Associated Press.<\/i>\u00a0 Retrieved from http:\/\/www.nbcnews.com\/business\/18-charged-200m-global-credit-card-fraud-1B8260642<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

    \u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[356],"tags":[4235],"post_series":[409],"class_list":["post-2302","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-csec-620","post_series-human-aspects-in-cybersecurity"],"yoast_head":"\nCybercrime vs Traditional Crime - Ian Carnaghan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime vs Traditional Crime - Ian Carnaghan\" \/>\n<meta property=\"og:description\" content=\"\u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"Ian Carnaghan\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-05T18:25:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-19T03:18:53+00:00\" \/>\n<meta name=\"author\" content=\"Ian Carnaghan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:site\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian Carnaghan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\"},\"author\":{\"name\":\"Ian Carnaghan\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"headline\":\"Cybercrime vs Traditional Crime\",\"datePublished\":\"2013-02-05T18:25:55+00:00\",\"dateModified\":\"2018-02-19T03:18:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\"},\"wordCount\":617,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"keywords\":[\"CSEC 620\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\",\"url\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\",\"name\":\"Cybercrime vs Traditional Crime - Ian Carnaghan\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/#website\"},\"datePublished\":\"2013-02-05T18:25:55+00:00\",\"dateModified\":\"2018-02-19T03:18:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carnaghan.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime vs Traditional Crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carnaghan.com\/#website\",\"url\":\"https:\/\/www.carnaghan.com\/\",\"name\":\"Ian Carnaghan\",\"description\":\"Software Developer, Blogger, Educator\",\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carnaghan.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\",\"name\":\"Ian Carnaghan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"caption\":\"Ian Carnaghan\"},\"logo\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\"},\"description\":\"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.\",\"sameAs\":[\"http:\/\/www.carnaghan.com\",\"https:\/\/x.com\/icarnaghan\"],\"url\":\"https:\/\/www.carnaghan.com\/author\/icarnaghan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime vs Traditional Crime - Ian Carnaghan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime vs Traditional Crime - Ian Carnaghan","og_description":"\u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d","og_url":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","og_site_name":"Ian Carnaghan","article_published_time":"2013-02-05T18:25:55+00:00","article_modified_time":"2018-02-19T03:18:53+00:00","author":"Ian Carnaghan","twitter_card":"summary_large_image","twitter_creator":"@icarnaghan","twitter_site":"@icarnaghan","twitter_misc":{"Written by":"Ian Carnaghan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#article","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/"},"author":{"name":"Ian Carnaghan","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"headline":"Cybercrime vs Traditional Crime","datePublished":"2013-02-05T18:25:55+00:00","dateModified":"2018-02-19T03:18:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/"},"wordCount":617,"commentCount":2,"publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"keywords":["CSEC 620"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","url":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","name":"Cybercrime vs Traditional Crime - Ian Carnaghan","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/#website"},"datePublished":"2013-02-05T18:25:55+00:00","dateModified":"2018-02-19T03:18:53+00:00","breadcrumb":{"@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carnaghan.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrime vs Traditional Crime"}]},{"@type":"WebSite","@id":"https:\/\/www.carnaghan.com\/#website","url":"https:\/\/www.carnaghan.com\/","name":"Ian Carnaghan","description":"Software Developer, Blogger, Educator","publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carnaghan.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5","name":"Ian Carnaghan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","caption":"Ian Carnaghan"},"logo":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/"},"description":"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.","sameAs":["http:\/\/www.carnaghan.com","https:\/\/x.com\/icarnaghan"],"url":"https:\/\/www.carnaghan.com\/author\/icarnaghan\/"}]}},"views":754,"_links":{"self":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/2302"}],"collection":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/comments?post=2302"}],"version-history":[{"count":0,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/2302\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/media?parent=2302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/categories?post=2302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/tags?post=2302"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/post_series?post=2302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}