{"id":2302,"date":"2013-02-05T13:25:55","date_gmt":"2013-02-05T18:25:55","guid":{"rendered":"http:\/\/www.carnaghan.com\/?p=2302"},"modified":"2018-02-18T22:18:53","modified_gmt":"2018-02-19T03:18:53","slug":"cybercrime-vs-traditional-crime","status":"publish","type":"post","link":"https:\/\/www.carnaghan.com\/cybercrime-vs-traditional-crime\/","title":{"rendered":"Cybercrime vs Traditional Crime"},"content":{"rendered":"
\u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d\u00a0 The Associated Press (2013).\u00a0 This story has been in the news only in the last couple of days.\u00a0 It is a good example to show the severity of cybercrime and the extent to which it has a greater potential for harm than traditional crime.\u00a0 Robbing a bank traditionally meant isolated incidents at individual banks.\u00a0 Cybercrime opens new doors to criminals where they have the power to defraud entire institutions in ways that would not have been possible traditionally.<\/p>\n
The complexities in catching cyber-criminals has meant that, in the past, many have gotten away with their crimes and do not face the same punishment as traditional criminals, which most likely lead to the attraction of committing the crime in the first place.\u00a0 While laws have been slow to adapt to these newer forms of criminal activity, progress has been made.\u00a0 In InfoWorld\u2019s Security Central article on Cyber Crime, Roger Grimes reminds us that only a few years ago, malicious hackers could steal millions of dollars, cause mass damage and yet escape jail time.\u00a0 Nowadays prosecutions have greatly risen along with the prison time attached to such sentences.\u00a0 It is a difficult question to address whether cybercrime should be punished the same, more or less severely than traditional crime because there isn\u2019t always a clear cut way to compare the two.\u00a0 In some ways laws are improving, however Grimes argues that the pendulum has swung too far in some instances.\u00a0 We only have to look back over the last year to the case of Aaron Swartz, threatened to 30 years of prison for attempting to get free access to a university database, which ultimately led to him taking his own life.\u00a0 In contrast to traditional crime, people have served less time in murder cases.\u00a0 Richard O\u2019Dwyer, a 23 year old student in the UK, set up a website which provided links to pirated copyrighted films and television programs.\u00a0 He lost an extradition case where he would be sent to the US to be prosecuted, however this was later appealed.\u00a0 The case made worldwide headlines and many felt that the punishment was extreme.\u00a0 YouGov ran a poll confirming only 9% of British citizens felt he should be extradited to the US for trial.\u00a0 Jimmy Wales (founder of Wikipedia) launched a campaign calling for the extradition to be stopped.<\/p>\n
I firmly believe that malicious hackers, those who seek to do harm to or defraud other individuals or organizations should pay the price, certainly in cases such as the credit card fraud incident mentioned earlier.\u00a0 It is however going to be on ongoing challenge as it is not always clear the type of response that should be warranted in individual cases.\u00a0 The laws will need to continue to adapt in a way that punishes real cyber criminals, criminal organizations and those that seek to do harm to others, and spend less time wasting resources on students who download the latest movie or post links to television programs they haven\u2019t paid for.<\/p>\n
References:<\/p>\n
\u201cEighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.\u201d<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[356],"tags":[4235],"post_series":[409],"class_list":["post-2302","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-csec-620","post_series-human-aspects-in-cybersecurity"],"yoast_head":"\n