Crimes have been existent throughout human history. In fact, some experts believe that crime is actually an important aspect of society, in which the balance of a society as a whole also depends upon the presence or occurrence of crimes (Henry 13). Actually, it is apparent that even though there are different measures to deter crime throughout the world leading to differences in crime rates, there has never been a country with a zero crime rate.
In addition, crimes have always evolved and changed along with the changes in the society as exhibited by the shifts in which acts are considered as a crime (Henry 3). For example, it is evident that technology has affected how crimes are committed, one of the significant technological advancements being the advent of computers. It is not difficult to discern t
...hat computer crimes, otherwise known as cyber crimes, are in general a new type or category of crime.
For one, conventional crimes were present even throughout the early stages of history, while computer crimes were of course expected to have started only after computers were developed and reached mainstream. In the current era however, it is evident that computers have become prolific if not almost ubiquitous, as if the whole world has indeed become truly interconnected through an information super highway.
In this sense, it is very conceivable that computer crimes are much more of an issue in the present day than ever before as computers have become even more important in numerous applications. Therefore, in order for one to be more prepared for such types of crime, it is important that its main
differences with conventional crimes be enumerated so as to develop a better overall understanding; this is achieved by identifying differences in terms of how crimes are done, the location of occurrence, and methods of investigation.
Form and Manner of Crime Through a simplistic view, computer crimes may be merely pertained to as crimes that involve the utilisation of computers or networks; however, it is clear that such a definition is not very efficient if used in understanding the differences between computer crimes and conventional crimes (Brenner). However, one way of efficiently creating a distinction between the two is through the analysis of the form or manner in which computer crimes and conventional crimes are done.
Conventional crimes are commonly perceived as either forms or results of direct manifestations of violence (McGuire 76). A common scenario or example of such is homicides and murders. In cases of such crimes, the actions of the culprit in using a specific method of killing is required; for example, poison or strangulation may be used in order to kill an individual. Another example of conventional crimes is theft, in which there is a direct presence of the criminal in order to acquire the item to be stolen (McGuire 82). In conventional cases of theft, the common perception of robbery still holds true.
The criminal needs direct access to the targeted resources which are achieved through different approaches such as stealth or intimidation. As expected, computer crimes are conducted through the use of computers; hence, its variants are of course dependent upon which function or capability of the computer is being focused on. One example of computer crime
and considerably one of the most popularly known to the public is hacking. In general, hacking a computer pertains to achieving access through illegal means. Thus, it is also pertained to as a form of unauthorised access (Pati).
In this sense, the act of gaining unauthorised access is by itself already a crime, regardless of what the individual plans to accomplish after access has been gained. Aside from hacking, there are also other computer crimes, one of which is email bombing. Email bombing is characterised by system crashes due to an immense influx of data sent through email. Computer crimes such as this are generally considered to have a specific target in mind such as crippling the computer systems of a certain company (Pati). Other more popular examples are also present.
In fact, some ways in which computer crimes are committed are commonly heard in computer-related talks even by common people. Virus attacks, Trojans, denial of service, and time thefts are some terms commonly heard in computer security discussions that are in fact forms or methods of conducting computer crimes (Pati). From these examples, it is evident that there are in fact similarities between conventional crimes and computer crimes as both can possibly cause harm, and both can be aimed towards individuals or organisations (Brenner).
However, as conventional crimes utilise aggression and in some cases ingenuity, they are mainly applied in the physical aspect, meaning that most of the time, they involve direct person to person contact. On the other hand, computer crimes are limited only by the extent of knowledge of an individual in terms of taking advantage of computer systems
and networks. Hence, in general, computer crimes do not necessarily involve the direct presence of the criminal which further add to the fact that computer crimes are much more difficult to trace and offenders are harder to identify (Pati).
Domain and Reach of Crime As discussed, computer crime offenders are in a way protected due to a higher level of anonymity gained from the use of computers in conducting crime. This can be assessed to be due to the fact that unlike conventional crimes, computer crimes occur at a different location or area. The term location in this sense does not merely pertain to a difference in city, state, or country, but in fact, it pertains to a different plane of existence.
The virtual world is considered as the place wherein computer crimes are committed; this virtual world is actually also referred to as cyberspace in various discussions (Brenner). This somehow explains the reason as to why computer crime offenders are increasing in number, and yet it is evident that news regarding the capture of such offenders is rather sparse in comparison to offenders caught doing conventional crimes. Conventional crimes occur in places in the real or actual world. Thus, the criminals or offenders are also found in the real or actual world.
In this sense, those that commit conventional crimes are easily caught as numerous other individuals may hold witness to the occurrence of the crime. Thus, conventional crimes are often apprehended also by direct actions. For example, a thief or robber enters a bank and the alarm goes off. In minutes, the police arrive to negotiate with or apprehend the
robber depending on the situation. In relation to this, the value or concept of harm is also more apparent as individuals have a direct and tangible view of what has occurred.
However, the fact that computer crimes occur in the virtual world does not necessarily mean that it is of limited threat or harm towards individuals. In fact, one must always consider that although the actual and virtual realms are rather distinct in terms of characteristics, it is irrefutable that an interconnection exists between the two (Brenner). Thus, when a hacker for example enters the database of a certain company or simply the personal files of an individual, the hacker may search for something that could be used to his or her advantage and lead to potential blackmail scenario.
This sample incident provides insight into how attacks in the virtual world can be used to gain advantage in the real world. As presented, the difference in terms of computer crimes and conventional crimes based upon the location of incidence also presents a difference in terms of how easily offenders are traced, identified, and caught. As pointed out, the conventional crime can be observed and reported by numerous individuals depending upon the situation, while computer crimes are more secretive and cannot be easily observed while in progress.
This provides a greater chance of escape for the offender; at the same time, it allows him or her to gain everything he or she aimed to acquire from the cyber crime he or she committed. Crime Investigation Although definitely different in terms of methods in which the crimes are committed, as presented in the first
portions of the discussion, it is rather true that there is an evident similarity in the classification of offenses and methodologies applied in conventional and computer crimes (Brenner).
In this sense, the examples of computer crimes and conventional crimes are classified in the same manner, and the methods used may in fact have similar underlying aims. For example, theft in the real world appears to be similar to data theft. Another example would be in terms of how similar in essence are trespassing and hacking (Brenner). Through such a perspective, it is not difficult to realise that the ways in which investigations are carried out for computer crimes and conventional crimes are similar in essence.
However, similar to the relationship of crimes, the specific techniques and methods in investigation highly vary between computer crimes and conventional crimes. In conventional crimes, there are usually physical evidences left in the crime scene; physical evidences range from marks, blood, injuries suffered by the victim, and other observable alterations in the crime scene, as the method of investigation depends upon the characteristics of the location (Horswell 2).
In addition to those found at the scene of the crime, investigators are also capable of searching for secondary evidences which rely upon details related to the actual crime scene; examples of secondary evidences are vehicles used for escape and interviews from individuals that are in some way related to the victim and/or the suspect, in some cases (Horswell 3). In this case, it is also important to consider that there are actually possibilities of a crime not being committed at all as there are instances wherein a diseased
individual does not necessarily mean that a suicide or a murder has taken place (Horswell 2).
There are also important factors to consider regarding the investigations done for conventional crimes. In fact, even though investigations rely on the presence of evidence, it is not difficult to conceive that not all are useful in solving the case. There are instances when the evidences gathered are already too damaged to be of any use (Horswell 8). In fact, it is obvious that in numerous cases, the criminal actually tries to eliminate as much evidence as possible.
Thus, in order to solve the case, investigators rely upon the various areas of science, including the well renowned subject of forensics, in order to gain as much information from the minimal amount of evidence present (Horswell 4). As presented, the investigation of conventional crimes requires the presence of tangible evidences; this is the main point of difference in relation to computer crimes as physical evidence is rarely considered in their investigations.
As a matter of fact, unlike the crime scenes in a conventional crime wherein it is assured that the killer has stayed in the location for a specified amount of time to commit the crime, in computer crimes, it is a generally accepted fact from the starting point of the investigation that the one who committed the crime may have come from and conducted the crime from any location (Mandia and Prosise 11). In terms of the analysis of clues, the investigations regarding computer crimes do not focus upon what can be found at a certain location wherein the crime has originated as this is often
impossible.
Instead, initial analysis focuses on how the damage was done or how did the attacker alter or gain access to the system (Mandia and Prosise 12). Also, in terms of clues, they are most often found in the malicious code that the attacker has sent across the computer network. In this sense, experts usually dissect the code in order to understand, gain information on the individual that has sent it, and provide potential solutions to the problem as well; hence, the concept of computer forensics has been established (Mandia and Prosise 88).
One must also take into consideration the variations in terms of the operating system used in computers. Thus, there are specific tools used for investigation and network surveillance for different systems such as Windows and UNIX (Mandia and Prosise 226). Conclusion In general, there are numerous differences between conventional crime and computer crimes as presented throughout the discussion. In fact, not only are differences identified regarding the way in which crimes are committed and the locations of the crime, but the manner in which investigations are made were also identified to be distinct as well.
However, it is important to note that even though differences are present, both are in fact general groupings of crime. Hence, both pertain to the occurrence of negative actions towards various individuals or groups in which the motive depends upon numerous factors including the state of mind and the society (Henry 13). This explains why the differences are mainly in relation to form while in essence, the two can be considered as analogues of each other. Hence, it is evident that the main defining
point that has resulted in such variations is that both technically occur in different areas.
As mentioned, the presence of the interconnections between the two allows for detrimental actions to be done in the cyberspace, in fact, there are numerous important items to consider which is not actually tangible but is rather in the form of data which can easily wreck the personal life of an individual or cause havoc in a company or in an organisation. Therefore, even if computer crime does not directly result in the presence of blood or dead bodies, the damage that it causes is also of serious concern especially since the way in which it manifests provides greater challenges and alternative approaches in order to be assessed and solved.
- Computer File essays
- Desktop Computer essays
- Servers essays
- Animal Cruelty essays
- Law Enforcement essays
- Juvenile Justice System essays
- Surveillance essays
- Forensic Science essays
- Crime Prevention essays
- Criminal Justice essays
- Criminology essays
- Drug Trafficking essays
- Juvenile Delinquency essays
- Organized Crime essays
- Penology essays
- Prison essays
- Property Crime essays
- Punishment essays
- Serial Killer essays
- Sexual Offence essays
- Victim essays
- Crime scene essays
- Punishments essays
- Charles Manson essays
- Juvenile Crime essays
- Piracy essays
- Stealing essays
- Gang essays
- Hate Crime essays
- Homicide essays
- Damages essays
- Murder essays
- Robbery essays
- Ted Bundy essays
- Prostitution essays
- Violent crime essays
- Rape essays
- Identity Theft essays
- Sexual Harassment essays
- Distracted Driving essays
- Drunk Driving essays
- Detention essays
- Sexual Assault essays
- Sexual Assault on College Campuses essays
- Cyber Crime essays
- White Collar Crime essays
- Fur essays
- Federal Bureau Of Investigation essays
- Fire Department essays
- Criminal Justice System essays