Digital financial loss (p.29). A type of

Computer Crime

Brandon Passer

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
Writers Experience
Recommended Service
From $13.90 per page
4,6 / 5
Writers Experience
From $20.00 per page
4,5 / 5
Writers Experience
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Professor Neal Basta

CIS170 1/16/2018

Strayer University
















most challenging type of crime to combat today is computer crime or otherwise

known as cybercrime. Cybercrime is essentially an act
of crime that involves the use of a

computer. In society today, this could involve many
different types of computers since almost

everything that we use has computer that allows it to
function.  There are several different

motives of why someone would want to use a computer to
commit a crime. Their motives are

also, not as simple as one would might think.  Often what a criminal is seeking is some type

This is what makes up information warfare.  According to Taylor (2015), there are

four categories of cybercrimes; infrastructure
attacks, information attacks, technological

facilitation, and promotion (p.24).  However, one of these categories presents
what can be seen

as a major issue for many government agencies within
the U.S. There are also some very

common forms of computer crimes that can cause
problems for many people, including the

Each government agency has its own plan or strategy to combat such types



of Cybercrime


There are four categories
of computer crime: infrastructure attacks, information attacks,

technological facilitation, and promotion.  Each one of these has a specific function and

a specific problem for combating it.  Infrastructure attacks are essentially
focused on destroying

a computer system or network that keeps a countries
infrastructure intact. The United States has

many examples of infrastructure that can be exposed
which can then cause the infrastructure to

be compromised. According to Taylor (2015), one such
type of infrastructure attack could be

compromising a computer system that controls passenger
and freight train routing systems which

could cause trains to collide (p.28). This could lead
to death or injury to people involved.

Another, more frightening type of infrastructure
attack, could be compromising the nuclear

power supply system of the United States. This type of
attack could cause a meltdown

and a crisis in which many people could die due to
exposure to nuclear radiation.  The next

category of computer crime is information
attacks.  This type of attack tends to be
more focused

on destroying and changing data files.  According to Taylor (2015), This type of
attack can cause

the most economic and financial loss (p.29).  A type of this form of attack are viruses and

worms. These are essentially computer programs that
can make copies of themselves which can

cause harm or damage to a computer system.  Viruses and worms have differences as
well.  A

virus is a type of coding that infects a computers
ability to give instruction. It can cause such

damage such as completely deleting files from a hard
drive or corrupting data to the point where

it can no longer function.  The most frightening aspect about a virus is
that it can lay in wait

within a computer program for a long period of time
and a victim may never know that it was

ever present. 
Worms are programs that can reproduce through a computer network by

compromising other computer systems.  They essentially act as a digital form of a
hacker. They

often work more faster and more direct than a virus
does and can cause larger amounts of

damage.  Another
form of attack is through technological facilitation.  This form of attack is

more of an indirect one.  It involves the use of technology to organize
potential attacks through

the use of online communication.  A type of attack is through the organization of
“flash mobs” or

“smart mobs”. 
These types of attacks involve the mass gathering of people at a
specific place

and time.  This
can be done through the simple use of text communication or social media

such as Facebook or Twitter.  The final form of attack is also indirect and
that is through the use

of promotion. 
This involves websites that are structured to specifically benefit a

organizations cause or agenda.  Examples of promotion include websites that a
geared towards

gaining numbers or websites that can be used to
collect donations to help fund a criminal or

terrorist organization.


Threatening Form of Cybercrime


Now, the most dangerous
and threatening category of cyber crime is through information

 attacks.  Information attacks can cause significant
harm and can cost billions of dollars in loss. 

According to the FBI’s website, one such dangerous
form of information attack is Ransomware.

Ransomware is a type of malware that takes data that
holds value hostage.  Hackers that use

ransomware essentially ask for some type of currency
in return for the data.  Most common way

that this form of attack is usually spread using
email.  Usually someone who is

unsuspecting will click on these emails and open files
that are attached to the email which

carry the harmful ransomware.  Once the ransomware infects the computer, it
spreads to every

aspect of the computer including file folders, hard
drives, back up drives and any drive that is

attached to the computer physically.  It can even spread to other computers that
are sharing the

same network. 
The FBI sates that this type of malware is becoming more
sophisticated.  A large

scale computer attack like this could cause victims to
lose millions of data as well as millions of

dollars.  The
FBI also does not recommend that any victim that suffers such an attack

give in and pay the ransom.  Even if a victim does pay the ransom they are
not necessarily

guaranteed to receive their data back.


are several government agencies within the United States that are constantly

to combat cybercrime. 
These agencies include the Federal Bureau of Investigation (FBI),

Department of Homeland Security(DHS), the Federal
Trade Commission (FTC), the U.S. Secret

Service, US Customs and Immigration Enforcement (ICE)
and The U.S. Department of Justice

(DOJ).  The role
that the FBI plays in combating cybercrime is that it conducts investigations

into cybercrime as well as making arrests. The
Department of Homeland Security also conducts

investigations into cybercrime as well as working with
other government agencies. They also

create tools in fighting cybercrime and share those
tools with other government agencies.  The

Federal Trade Commission is tasked with protecting
consumers from potential attacks.  The

Secret Service essentially controls the Electronic
Crimes Task Force.  This special task
force was

created to locate and track down international cyber
criminals who are involved in many forms

of cybercrime such as data breaches and bank
fraud.  The US Customs and Immigration

Enforcement are tasked with creating anti cybercrime
techniques to support in the protection of

borders. They are also tasked with investigating into
the exploitation of children.  The U.S.

Department of Justice investigates child pornography
and is tasked with prosecuting cyber



and What Can the U.S Government Do Better?


The one way that law
enforcement agencies can better counteract computer crime would

be to work with foreign governments to increase their
level of jurisdiction. These agencies only

have a certain level that they can reach in stopping
cyber criminals.  For instance, if a data

was to occur from another country and it affected our
security over in the United States, these

law enforcement agencies may be limited in what they
can do to bring the perpetrator to justice

because of jurisdiction lines.  By increasing a level of jurisdiction, this
can act as a potential

deterrent for cybercrime.  A potential cybercriminal may realize that
there could be harsh

penalties for such an act at an international level,
thus he or she may not feel inclined to commit

the act.  



















Taylor, R. W., Fritsch, E. J., & Liederbach, J.
(2015). Digital Crime and Digital Terrorism (3rd ed.). Boston: Pearson


Cyber Crime. (2017, March 22). Retrieved January 18,
2018, from


Brain, M., & Fenlon, W. (2000, April 01). How
Computer Viruses Work. Retrieved January 18, 2018, from


Combating Cyber Crime. (2017, June 20). Retrieved
January 18, 2018, from


Wolf, U. (2009, January 27). Cyber-Crime: Law
Enforcement Must Keep Pace with Tech-Savvy Criminals. Retrieved January 19,
2018, from


Brown, J. (2016, August 17). 5 Federal Agencies with a
Role in Ensuring Enterprise Cybersecurity. Retrieved January 19, 2018, from