20 Jul 2022

49

Rampant Issue of Internet Crimes

Format: APA

Academic level: University

Paper type: Research Paper

Words: 1115

Pages: 4

Downloads: 0

Introduction 

In recent years, Internet crimes have become more rampant because criminals have turned to the use of sophisticated skills to commit these crimes (Kosseff, 2017). The convenient, fast, and elusive nature of the internet contributed to the tendency of cybercriminals to taking part in illegal activities that harm individuals and organizations. Cybercrimes can be classified into several categories because of the diverse nature of content and information available on the internet. These categories include identify theft, financial fraud, copyright infringement, cyber-extortion, espionage, and phishing scams. In the United States, internet crimes are common with multiple cases of cybercrimes being reported every year. This paper discusses the details a few examples of past internet crimes, the specific laws that were broken and their prosecutions. 

Travon Williams Case 

This case is available on this website: https://www.securityweek.com/price-cybercrime-9-years-one-case-6-months-another 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Travon Williams is a thirty-four-year-old individual who was arrested in August 2017 and subsequently charged as one of twelve defendants in a cybercrime case involving the theft of credit card details. Williams was identified as the ring leader of a gang of cybercriminals. Williams and his gang would make anonymous purchases of stolen debit card and credit card information from the dark web for criminal purposes. The complex nature of the dark web has been a challenge for law enforcement agencies amidst the rising cases of criminal activities originating from there. In this case, Williams and his gang would then encode the numbers of the stolen cards into other fraudulent cards and use them to purchase merchandise from stores. The gang, then based in Northern Virginia, would mostly buy cartons of cigarettes and gift cards and sell them to buyers from New York area. 

Prior to his arrest, Travon Williams had obtained a total of $415,000 from the criminal activity within a period of two and a half years. Despite the complex nature of the case, law enforcement agencies were able to unmask this credit card racket leading to the arrest of Travon Williams and his gang for committing crimes in violation of the law as described in the federal code 15 U.S.C. 1644 – Fraudulent use of Credit Cards (Lee & Scott, 2017). Like the other members of his gang, Travon Williams pleaded guilty on his prosecution to the charges and was sentenced to nine years in jail by the District Court for the Eastern District of Virginia. 

Sanford Wallace Case 

This case is available on this website: https://www.nbcnews.com/tech/internet/spam-king-sanford-wallace-sentenced-2-years-facebook-scheme-n592651 

In 2016, a forty-seven-year-old hacker was sentenced to thirty months in jail for sending more than 27 million spam messages to different Facebook users. This hacker was Sanford Wallace, or “Spam King,” as he used to call himself. Wallace compromised more than half a million Facebook accounts through internet phishing. Phishing is the fraudulent activity where the perpetrator sends emails or links to websites that appear to be legitimate for the purpose of harvesting the personal information of the unsuspecting users. 

Wallace used to send links to external websites to different Facebook users in an elaborate plan to scam them. When these users clicked on the links, Wallace would harvest their log-in credentials as well as details of the other users in the accounts’ friends list. He would then send the Facebook users in the friends list links to the websites where and repeat the cycle by harvesting the friends’ lists of those accounts as well. This way, Wallace would earn money by directing traffic to the said websites. 

Although most of Wallace’s criminal activity was mainly focused on Facebook, his career in spamming did not start there. Wallace’s fraudulent behavior began way back in the ‘90s when he used to send junk messages on the fax machine. On previous encounters with Facebook and MySpace, Wallace faced civil suits that earned him hefty fines. The thirty-month prison sentence for Wallace came with fines amounting to $310,000. 

According to the details of his indictment in 2011, Wallace used the names Laura Frederix and David Frederix as aliases for his fraudulent activities, along with other 1500 fake internet domains. With these aliases and domains, Wallace would lure Facebook users into clicking a link that would automatically capture their user credentials and the details of their friend lists. Wallace violated the CAN-SPAM Act (federal code 18 U.S.C. Section 1037) that criminalizes any activity of obtaining email addresses through improper means (Mullen, Daniels & Gilmour, 2011).  

Stanislav Lisov Case 

This case is available on this website: https://www.justice.gov/usao-sdny/pr/russian-hacker-who-used-neverquest-malware-steal-money-victims-bank-accounts-pleads 

This case involves Stanislav Lisov, a Russian hacker who used malware to steal money from the bank accounts of his victims. Lisov used malicious software known as NeverQuest to infiltrate the computer systems of his victims and steal the credentials for their online banking accounts, and then use that information to siphon out money from the accounts. As with many other types of cybercrimes, Lisov’s criminal activities extended across the borders. Many unsuspecting victims from around the world ended up losing their money to Lisov’s fraudulent activities. Bank fraud does not only cause financial harm but also exposes the victims to risks of privacy infringements. 

Stanislav Lisov used his programming skills to spread a banking Trojan containing malware that would gather banking information from his victims. The Trojan was spread through social media websites and file transfers as well. Lisov would then use this information to steal from the victims and also sell the information to other third parties. Furthermore, he created a network of victim computers called “botnet.” This network contained millions of stolen credentials including the passwords, usernames, and security questions and answers captured from the victims’ computers. The money abducted by Lisov using his malware amounted to $855,000, with other unsuccessful attempts for financial transactions worth $4.4 million. 

Lisov was first detained in January 2017 in Barcelona, Spain and a trial held in Madrid the same year where he pleaded not guilty. Following these developments, the Spanish government processed his extradition to the United States. Stanislav Lisov pleaded guilty to computer fraud and conspiracy to distribute malicious software in a federal court in Manhattan. This case, therefore, describes an internet crime that goes contrary to the Computer Fraud and Abuse Act (CFAA), which is an amendment to the federal code 18 U.S.C. Section 1030 (Schroeder, 2012).  

Conclusion 

Cybercrimes are criminal activities that are of a complex nature. As seen in some of the cases discussed here, some cybercriminals use the dark to facilitate their criminal activities hence making it hard for law enforcement agencies to track and arrest them. However, with concerted efforts from the different local and international agencies such as the FBI and Interpol, the arrest and indictment rates for cybercriminals have gone high. Even though it can take a long time for some cybercriminals to be arrested and convicted, the cooperation and institutional efforts of these law enforcement agencies have ensured that this type of crime is cracked down. 

Cybercrimes may different forms such as bank fraud, phishing, copyright infringement, and credit card theft, among others. This type of crime does not only cause financial harm but can also lead to the exposure of sensitive information that can cause the collapse of institutions or even governments. Although there are laws that criminalize cybercrimes, it is crucial for more serious penalties to be introduced in cybercrime to deter individuals from taking part in such activities. 

References 

Kosseff, J. (2017).  Cybersecurity law . Hoboken: Wiley. 

Lee, J. G., & Scott, G. G. (2017).  Preventing credit card fraud: A complete guide for everyone from merchants to consumers . Lanham: Rowman & Littlefield 

Mullen, J., Daniels, D., & Gilmour, D. (2011).  Email Marketing: An Hour a Day . New York, NY: John Wiley & Sons. 

Schroeder, S. (2012).  The lure: The true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals . Boston: Course Technology PTR. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Rampant Issue of Internet Crimes.
https://studybounty.com/rampant-issue-of-internet-crimes-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 441

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 117

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration