27 Sep 2022

71

The History And Evolution of Cyber Crime

Format: APA

Academic level: College

Paper type: Research Paper

Words: 609

Pages: 2

Downloads: 0

Question 1 

Cyber criminal activities started in the 1960s when MIT train enthusiast realized that they could alter the operations of their model trains (Power, 2017). This realization led to the creation of the term hacking which means the ability to find a faster and non-conventional way of making things work faster. This activity led to the advent of computer hacking early computers by hacking and changing their codes use I early computer programs in 1961. In 170s, the malicious hacking into computers became more pronounced when cybercriminals realized that they could hack pho calls by making long distance calls. Phreakers came across the right codes, combed through the bell telephone company, impersonated operators and made several illegal phone calls just to find out how they could alter the entire phone system (Power, 2017). 

The 1980s and 990s are considered the golden era in hacking as many people gained access to computers for personal use. Hacking changed from being a fun activity to a criminal act. Children were able to gain access to different computers for the fun of it. They also accessed other computers illegally as they were playing games. Hackers from the 1990s to current generation have gone to the highest levels in hacking. They have access to government information, bank details, personal information and they can literally gain access to any computer (Power, 2017). They have the knowledge, skills, and ability to create malware and programs that allow them to do this. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Question 2 

The “new cybercriminal” is a term used to describe current cybercriminals who use different sophisticated methods t gain access to computers, government information, company information, and ban statements among other things (Power, 2017). The new cyber criminal uses sophisticated malware and programs to help them gain access to their target audience. They also have the ability to seal their trails thus making it hard for law enforcement officers to find them with ease. 

Question 3 

The 1960s–1990s: THE MIT train model enthusiast realizes that they can alter the operations of their train by changing some of its codes. Hackers used the IBM 704 computer to further their hacking activities (Power, 2017). In the 1970s, hacking entered the phone world and criminals realized that they could use codes to make long distance phone calls. In the 1980 more sophisticated hackers emerged. They were more concerned with creating viruses, hacking system to steal sensitive information, and pirating software. 

In the 1990s, hacker became more notorious they launched the first computer worm, conducted the first digital bank heist, and stole propriety software (Power, 2017). This is the time when law enforcement officers made most high profile hackers arrests such as Robert Morris, Kevin Mitnick, and Vladimir Levin among others. In the 2000s, criminals became even more ambitious. They used their technical skills and knowledge to create malware, spyware, and other software that can be used to access public and private information. Both the government and big companies such as Amazon, eBay, and business firms such as Walt Disney became victims of hacking (Power, 2017). The 2010s to date have also seen a significant rise in cybercriminal activities such as the creation of dark web, cyber bullying, and other sophisticated criminal activities. 

Question4 

Digital evidence refers to information transmitted or stored in binary form and may be used in a court of law (Power, 2017). Examples include computer and laptop hard drives, flash drive, PDA, mobile phones and CD among others. 

Question 5 

Hacking is the term used by cyber criminals to refer to the act of altering the operations of computers (Power, 2017). Many times hackers come up with programs that change how a computer works to enable them to get access to given types of information. 

Question 6 

By the 1980s, the FBI was catching up with many hackers who ad illegal access to organizational and government computers and thus stealing information. Therefore, Congress decided to pass the Computer Fraud and Abuse Act which made hacking a crime, illegal, and punishable by law (Floridatech, 2018). The punishment included long jail terms and payments of large amounts of money. 

References 

Floridatech. (2018). A brief history of time. Florida : Floridatech.com. Retrieved from https://www.floridatechonline.com/blog/information-technology/a-brief-history-of-cyber-crime/. 

Power, K. (2017). The Evolution of Hacking. Portland, OR: The TripWire.com. Retrieved from https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The History And Evolution of Cyber Crime.
https://studybounty.com/the-history-and-evolution-of-cyber-crime-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration