Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: The Emerging Consensus on Criminal Conduct in Cyberspace


Senior Member

Status: Offline
Posts: 247
Date:
The Emerging Consensus on Criminal Conduct in Cyberspace



The Emerging Consensus on
Criminal Conduct in Cyberspace
by Marc D. Goodman and Susan W. Brenner


One of the most common types of cyberfraud is online auction fraud:49 You are buying something you saw advertised on eBay, for example. Is the person you are dealing with trustworthy? Often not: the vendor may be describing products or services in a false or misleading manner, or may take orders and money, but fail to deliver goods.50 Counterfeit goods might be supplied. 51 Investment fraud has been seen, whereby the Internet is used to fraudulently manipulate stock prices or facilitate illegal insider trading. 52

Using computers, thieves can steal credit card details53 and siphon funds from banks.54 A twenty-five year old Moscow hacker stole credit card information that was put onto blank cards and used at ATMs all over Europe; the fifty people involved in the scam managed to steal several million dollars before they were caught. 55

Cyberspace can be just as easily used to commit theft-by-threat or extortion, as one company learned last year.....


(more info......)




__________________
“There is a destiny that makes us all brothers: None goes his way alone. What we put into the lives of others, comes back into our own.”--Edwin Markham


Top Poster

Status: Offline
Posts: 3757
Date:


Couldn't resist...

Did you read the recent report wherein the Romanian police knew where to get the hacker, some 40 miles away, but did not have petrol to get there?

Hilarious!

Romania

The Romanian Criminal Code contains no special legislation on computer crimes. Several years ago, the government drafted "The Code for Information Technologies Development and Use." The draft Code stipulated that "IT offenses" would be punishable by imprisonment for terms ranging from two to ten years, depending on the offense and its severity. The offenses include: unauthorized access to an information system for the capture, storage, processing and distribution of data and/or programs or for altering, damaging and destroying hardware, data and/or software; data embezzlement, program disturbance, alteration and erroneous data transmission resulting in data flow disturbance; and computer fraud. An accidental entry into data flows that caused any of the above-mentioned types of damage would be criminalized if the perpetrator did not immediately acknowledge the act to the Romanian Authority for Informatics. Infringements, such as disobeying the recommendations or authorizations of Romanian Authority for Informatics, would be punished by fines.536 The Code for Information Technologies Development and Use was submitted to the European Commission, with comments received in March of 1998.537 The second revised Code was approved by the Government and forwarded to the Romanian Parliament in 1999, but Parliament has so far not acted upon it. 538



__________________

Exposing the sleazery of ebaY and PayPal

 

Page 1 of 1  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard