Cybercrime: Technology Turns into a Curse. Technology has advanced drastically over the years. Specifically, computers continue to

Similar documents
Chapter Nine The Categorization and Evaluation Exercise

Fraud Awareness Workshop

ILLICIT DRUG TRADE. Future-oriented policing projects

purred on by the federal government, hospitals in Maryland have moved quickly in recent years to roll out electronic medical records.

CHILD SEXUAL EXPLOITATION AWARENESS RAISING CAMPAIGN

Get the Facts: Minnesota s 2013 Tobacco Tax Increase is Improving Health

ORDINE DEGLI AVVOCATI DI MILANO GUIDELINES TO FIGHT CYBERCRIMES AND PROTECT VICTIMS

ITEM 11: SPECIAL SEGMENT. Preparations for the ministerial segment to be held during the sixty-second session of the Commission, in March 2019

PushUpMadness. ISDS 3100 Spring /27/2012. Team Five: Michael Alford Jared Falcon Raymond Fuenzalida Dustin Jenkins

CRIMINOLOGY BY CHRIS HALE, KEITH HAYWARD, AZRINI WAHIDIN, EMMA WINCUP

THE IMPACT OF PERCEIVED COMPUTING SECURITY ON ETHICAL BEHAVIOR: A UNIT OF STUDY FOR MIS STUDENTS

2014 TRUE POWER OF HYDROGEN PEROXIDE, MIRACLE PATH TO WELLNESS - MARY WRIGHT, GOES BEYOND ONE MINUTE CURE BY MARY WRIGHT

Promote Leaders. Teresa Schmidt

THERE S NO EXCUSE FOR UNSAFE ACTS

GOC GUIDANCE FOR WITNESSES IN FITNESS TO PRACTISE COMMITTEE HEARINGS

CRJU Criminal Justice

Anti Aging:Stop That Clock: 55 Anti Aging Hacks To Stay Young Forever(Anti Aging Diet, Anti Aging Secrets,Anti Aging Drugs) (Fitness Book 1) PDF

Preventive detention as a measure to keep sentences short. Randi Rosenqvist Oslo University hospital and Ila prison

WHO DO I CONTACT WITH QUESTIONS? Our team is happy to answer any questions or address any concerns that you may have.

HOW TO CONTROL YOUR THOUGHTS: MIND CONTROL TECHNIQUES TO CHANGE THE WAY YOU THINK AND ATTRACT SUCCESS & HAPPINESS BY MAULIN HENDRIKS

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT

Scams: Influencing the Aging Brain

Investigating Elder Abuse Expanded Course Outline and Hourly Distribution For One-Day, 8 Hour Course

Do Serial Sex Offenders Maintain a Consistent Modus Operandi?: Findings from Previously Unsubmitted Sexual Assault Kits

xiv Preface INTRODUCTION

» Understand something of the history of unsafe products and. » Discuss some major cases in the tobacco, automobile, and

DRAFT OUTCOME DOCUMENT (14 JANUARY 2016) UNGASS

PEER REVIEW HISTORY ARTICLE DETAILS TITLE (PROVISIONAL)

Marijuana in Washington. Arrests, Usage, and Related Data

Criminal Justice in Arizona

Sex Crimes: Definitions and Penalties West Virginia

Before I begin, I want to ask our Leadership Award recipients to stand for a deserving round of applause.

How-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT

LEN 227: Introduction to Corrections Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION

Mapping fear of crime dynamically on everyday transport: SUMMARY (1 of 5) Author: Reka Solymosi, UCL Department of Security & Crime Science

Personal Growth Strategies

Topic: Recreational marijuana should be legalized for public use

Michael Pace. Click here if your download doesn"t start automatically

CYBER-THREATS AGAINST WOMEN Capacity Building Workshop on Promoting a Safer Cyberspace in the Arab region

VERSION 2016 INVESTIGATIONS CHAPTER 15 UTAH STATE BOARD OF EDUCATION CAREER AND TECHNICAL EDUCATION

CORROSION: UNDERSTANDING THE BASICS (06691G) BY J. R. DAVIS DOWNLOAD EBOOK : CORROSION: UNDERSTANDING THE BASICS (06691G) BY J. R.

ADDITIONAL TOOLS: Pushing Pause From Heads Up. Suggested Answers for Lesson Discussion Questions headsup.scholastic.com/pushingpause/lesson

TRUE RESILIENCE: BUILDING A LIFE OF STRENGTH, COURAGE, AND MEANING BY GAIL WAGNILD

Robbers Hitting Phoenix Medical- Marijuana Dispensaries: Is Bank Reform Needed?

Content Part 2 Users manual... 4

WHO DO I CONTACT WITH QUESTIONS? Our team is happy to answer any questions or address any concerns that you may have.

THE REGULATORY MORASS AT THE CENTERS FOR MEDICARE AND MEDICAID SERVICES: A PRESCRIPTION FOR BAD MEDICINE

AMERICAN CORRECTIONS: THEORY, RESEARCH, POLICY, AND PRACTICE BY MATT DELISI, PETER J. CONIS

The depression years have commonly been identified and accepted as the 1930 s.

PODS FORUM GUIDELINES

DOWNLOAD OR READ : THE 60 SECOND SHRINK 101 STRATEGIES FOR STAYING SANE IN A CRAZY WORLD PDF EBOOK EPUB MOBI

Test Bank Questions for Chapter 1

Crime and Criminal Justice Statistics Q Quarterly National Household Survey. 1 of 25

Forensic Science. Read the following passage about how forensic science is used to solve crimes. Then answer the questions based on the text.

UNDERSTAND RISK AND YOU WILL UNDERSTAND FRAUD

NANOTECHNOLOGY AND CYBER CRIMINALISTICS

6/19/2012. Disappearing Drugs. Disappearing Drugs: Protect Yourself from Diversion. Disappearing Drugs: Protect Yourself from Diversion

The Investigation and Prosecution of Domestic Violence Cases

Maryland State Commission on Criminal Sentencing Policy

Marijuana in Louisiana. Arrests, Usage, and Related Data

Sober By Grace. House Rules Code of Conduct

Observation and Assessment. Narratives

GUIDELINES FOR THE AVOIDANCE OF VIBRATION INDUCED FATIGUE FAILURE IN PROCESS PIPEWORK FROM ENERGY INSTITUTE

Briefing on the Fly for Faster Writing

Make a Difference: UNDERSTANDING INFLUENCE, POWER, AND PERSUASION. Tobias Spanier Extension Educator Center for Community Vitality

Auditory and Visual Stimuli System for Fast Eye Movement Analysis. Team #3: Brian Lewis Anthony Vessicchio Steven Kapinos

PSYCHOBIOLOGY (BPS TEXTBOOKS IN PSYCHOLOGY) BY CHRIS CHANDLER DOWNLOAD EBOOK : PSYCHOBIOLOGY (BPS TEXTBOOKS IN PSYCHOLOGY) BY CHRIS CHANDLER PDF

A Choice Theory Approach to Drug and Alcohol Abuse by Mike Rice, LISAC, CTRTC

NATIONAL GEOGRAPHIC MAGAZINE, MARCH 2012 (VOL. 221, NO. 3) FROM NATIONAL GEOGRAPHIC SOCIETY

Eric L. Sevigny, University of South Carolina Harold A. Pollack, University of Chicago Peter Reuter, University of Maryland

National Relay Service: The Deaf Perspective DISCUSSION PAPER

Volunteering for the Child Law Advice Service Colchester

Different Perspectives to Analyze the Penal Justice System in Function of Crime Control from Professionals of Social Sciences

Stahl's Essential Psychopharmacology PDF

REVISED ELEMENTS - PROPOSED BY THE UNGASS BOARD TO THE CND FOR FURTHER CONSIDERATION - STATUS 4 November 2015

MSc Enterprise Security and Digital Forensics. Examinations for / Semester 1

Public Opinion Survey on Tobacco Use in Outdoor Dining Areas Survey Specifications and Training Guide

Defendants who refuse to participate in pre-arraignment forensic psychiatric evaluation

See what they say with Captioned Telephone

Summary. In M ichael Pollan's article Escaping the Western Diet, which is derived from many books he has

Addiction And Choice Rethinking The Relationship

Trial Competency Restoration; The Thief of Justice?

* Inductive Reasoning. * Deductive Reasoning * Patterns of Logical Development

France: Millions of medicines seized in largest INTERPOL operation against illicit online pharmacies

2019 SPONSORSHIP PACKET. Friday March 8th, 2019 Union Depot, St. Paul, MN

Second China-EU Symposium on Gender Equality under HPPD

RESEARCH PAPER. The psychological basis for terrorism and terrorists

Our vision is to produce cutting-edge knowledge that helps create safe, just, well-governed and equitable societies.

FORENSIC HYPNOSIS WITH THE DEAF AND HEARING IMPAIRED

COMPLAINT NUMBER 17/008 COMPLAINANT. J Fuller ADVERTISER. Dr Ronald Goedeke, hcg Team ADVERTISEMENT. Diethcg.co.nz Website

Cyber-Analytics: Creating Security Profiles using Predictive Analytics

Correctional Systems. Rutgers University Summer 2012

Learning Target: I. Your letter should: II. Effective Verbs for Introducing Quotations Use a variety of verbs for a more effective paper

Book Review of Witness Testimony in Sexual Cases by Radcliffe et al by Catarina Sjölin

Cost-Benefit Analysis in Healthcare Creating investment incentives to drive adoption of a technical innovation

Technology Combating the Obesity Outbreak. In his essay, How Junk Food Can End Obesity, author David H. Freedman touches on

Chapter 15 - Biometrics

Justice Committee. Alternative Dispute Resolution. Written submission from Scottish Mediation

Transcription:

MOHAMMAD TANVIR HOSSAIN, CYBERCRIME: TECHNOLOGY TURNS INTO A CURSE (Mohammad Tanvir Hossain, 2015) 2014, Mohammad Tanvir Hossain ASIN: B00TJV360C Price: $3.00 Page Length: 30 Pages Keywords: Cyber Crime, Criminal Law, Technology, Computers Reviewed by Gabrielle King Journal of High Technology Law Suffolk University Law School Cybercrime: Technology Turns into a Curse Computer technology is at its peak this century. We can do anything with the computer and so can the cyber criminals. 1 Technology has advanced drastically over the years. Specifically, computers continue to change and they are now more accessible to individuals than ever. Today, there are personal computers, tablets, and advanced cell phones that essentially function as computers. In addition, Internet speed is faster, making it easier for people to browse the Internet from any location with their personal computers and devices. In Cybercrimes: Technology Turns into a Curse, Mohammad Tanvir Hossain explores the use of advancing technology by cyber criminals and the numerous ways in which individuals can use technology to commit crimes. Hossain suggests that criminals have made use of every technological development to achieve their targets and therefore, all individuals must be cautious and aware while using technology. 2 1 MOHAMMAD TANVIR HOSSAIN, CYBERCRIME: TECHNOLOGY TURNS INTO A CURSE loc. 140 (2014) (ebook). 2 See HOSSAIN, supra note 1, at 140. 1

While Hossain generally focuses on criminal law, he specifically discusses crimes that are committed with computers or through the use of technology. He begins his book with a definition of cybercrime and the different ways that these crimes can be classified in Chapter One. He then moves into the history of cybercrime in Chapter Two, detailing the ways in which these crimes have changed over time. It can be inferred from his history descriptions that as technology has changed, cybercrimes have altered as well. For example, Hossain describes how in the 1970 s, computer technology was being used in administration and business and this led to financial cybercrimes such as fraud. 3 Hossain ends this chapter with a section titled The menace of cybercrime in the 21 st century, where he asserts that cyber criminals are making full use of the technological development. 4 This section sets the overall theme of his book, the idea that cybercrime has become more frequent, dominant, and easier to commit in today s society. Therefore, Hossain stresses the importance of being aware and cautious of these criminal activities. Chapter Three focuses on the specific effects of cybercrime and the lasting impact that these crimes have on the lives of victims. Hossain highlights the danger of identity theft, the possibility of financial loss, and the potential for piracy. To illustrate this point, Hossain asserts that [a] recent report says over 1.5 million individuals become the victim of cyber fraud every single day, resulting in financial loss. 5 In Chapter Four, Hossain lists the recent strategies used by criminals to successfully commit their crimes. Their main strategy is to take advantage of places in the cyber world that lack proper security but also provide an opportunity for a large profit. 6 These cyber fields include social networking, smart appliances, the cloud, android 3 See HOSSAIN, supra note 1, at 121. 4 See HOSSAIN, supra note 1, at 140. 5 See HOSSAIN, supra note 1, at 158. 6 See HOSSAIN, supra note 1, at 172. 2

devices, Java, and small, vulnerable businesses. 7 Being aware of these strategies and types of devices or programs that are targeted more frequently by cyber criminals can aid in prevention. In Chapter Five, Hossain describes the different types of cyber criminals and asserts that these individuals work together as part of a larger, criminal organization. For example, money mules are the ones responsible for managing bank accounts and wiring transfers. 8 Tellers transfer and launder illegal money using digital and foreign exchange methods, while there are also leaders of the organization who assemble teams of cyber criminals. 9 Furthermore, hackers are now considered a community, and different types of hackers, such as White Hat hackers and Grey Hat hackers, perform different roles in committing and preventing cybercrime. 10 In the next couple of chapters, the realities of cybercrime are discussed. Cybercrimes are unpredictable and typically go unreported, which only adds to the difficulty of locating these criminals. 11 Hossain also describes the possible punishments for committing certain types of cybercrime in Chapter Seven. The author also provides a chapters on how to stay safe, the potential benefits of cybercrime are explained, and Hossain finishes his book with a chapter on the future of cybercrime. Hossain portrays the difficulties surrounding cybercrime and the exploitation of advancing technology to further the criminals activities. While technology has improved significantly, criminals can hack and steal from unsuspecting victims much easier than in the past. The difference between criminals and cyber criminals, who either target computers or use computers to commit illegal activity, is their unknown location and the way in which they 7 See HOSSAIN, supra note 1, at 172, 190. 8 See HOSSAIN, supra note 1, at 207. 9 See HOSSAIN, supra note 1, at 207. 10 See HOSSAIN, supra note 1, at 241. 11 See HOSSAIN, supra note 1, at 276. 3

manipulate innocent computer users who lack knowledge of these crimes. 12 Hossain s thesis is valid and his book is very informative. He describes the basics of cybercrime, the different types of cybercrime, the way in which these crimes are committed, and how to protect yourself when using the cyber world. He supports his thesis by explaining the history of cybercrime and how this area is vastly different in today s society with the daily use of computer technology and the Internet. Hossain further notes the ways in which criminals exploit new technology, devices, and programs because of their lack of proper security. This argument is given more validity because of the numerous data breaches and hacks that have occurred within the past few years. This book is outlined with logical, clear chapters. Hossain starts at the beginning with definitions, the history, and proceeds to describe the world of cybercrime in a systematic way. While the book is short in length, it is concise. Furthermore, it is readable and provides helpful information. Hossain appears to be targeting a wide audience and successfully reaches individuals who do not have a lot of knowledge in computers and technology. He lists specific methods and steps people can take to protect themselves. He also makes readers aware of the tricks that cyber criminals use online and provides information on how to avoid falling for them. His book is more practical, providing an overall guide on cybercrimes while simultaneously stressing the importance of awareness in order to prevent crime and all of the damage and loss that these crimes can cause. He does not comment much about the law behind these crimes, other than describing the punishments of fines and imprisonment, depending on which crime was committed. Although he provides a practical, concise guide on cybercrimes and the impact technology has had on this area, he does not provide many sources for his data. A couple of 12 See HOSSAIN, supra note 1, at 276. 4

times, Hossain relies on certain reports but does not cite these reports or mention where they have originated. While his assumptions and oversights appear to be innocent, his propositions are not well supported with statistical facts, data, or sources. Although he might lack support for some of his propositions, the book certainly provides helpful knowledge on this topic. It might not be an essential read for lawyers, however, prosecutors who are assigned to cybercrimes may find this book helpful in explaining the different types of crimes and how they are committed through, or with the use of computers. Hossain s Cyber Crime: Technology Turns Into A Curse successfully demonstrates the complexity of cybercrimes in a world with continuously advancing technology. 5