Articles Tagged with cybercrime

In a bad mood? Want to turn it around with a little cyberbullying? Think again. A Michigan woman is facing charges related to cyberbullying teenage students, including her own daughter, according to authorities. The woman is facing five counts, including, most importantly, stalking a minor. 

The woman’s own daughter and her boyfriend reported getting harassing messages to authorities which spurred forth the investigation, which lasted a year. Ultimately, the culprit turned out to be the girl’s own mother.

The mother used VPNs and other methods to hide her identity. At one point, she attempted to obscure her IP address in a manner that would lay the blame on classmates of her daughter. The woman was also working as a basketball coach at the time. Law enforcement says that the VPN exposed the defendant’s IP address for a fraction of a second before connecting. Indeed, you must connect your VPN prior to going onto the internet. If you do it after connecting, you will expose your actual IP while the VPN is unconnected or if it goes out. VPNs are not foolproof. A network interruption could expose your IP. Alternatively, not all VPNs are created equally. In this case, the woman’s IP was exposed. 

An Illinois man who was a registered sex offender was indicted on new child pornography charges after exchanging photos with an undercover agent on the Kik Messenger App. Kik has gained notoriety for being a den of child pornography enthusiasts exchanging photos. The app provides the user with total anonymity from other users, but the terms of service stipulate that individuals cannot exchange illegal material using the site’s infrastructure. 

The app itself is not nefarious. It was created by college students at the University of Waterloo as a free, anonymous messaging app. The app allows you to create group chats, upload videos, pictures, and files. The group chat feature is where most of the child pornography issues can be found. The only thing you need to use the app is an email address. You then have a username and a handle which is used by other members to find you. 

While uploading child pornography to the site violates its terms of service, Kik does not moderate these group chats, so it is left to law enforcement to ensure crimes are not being committed. 

benjamin-voros-160962-300x200The internet has been a useful platform for people to conduct business, keep in touch with their friends and family, and to communicate with people across the globe. Yet, not everyone who has access to the internet uses it with good intentions. If such use results in breaking laws, one stands to face charges of committing cyber crimes.

The Illinois state law stipulates unlawful cybercrime actions to include wire fraud, extortion, child pornography, credit card fraud, indecent solicitation of minors, identity theft, phishing, and infringement of copyrights, among others. Conducting such criminal activities could result in punitive measures on the perpetrators. This follows the rule of the Computer Crime Prevention Law. Criminal penalties are described for convicted perpetrators of cybercrime.

The Scope of the Law

markus-spiske-153537-200x300Cyber terrorism is a serious crime. Obviously, this falls on the higher end of the offenses that are committed on the internet. Chicago, like many states, is trying to update its laws in order to deal with these threats in an effective way, bearing in mind the fact that the technology is constantly changing. Likewise, there are employee training requirements for companies. The law firms that defend and participate in prosecutions are also coming to terms with the intricacies of the laws as well as the various regulations that have been put in place to regulate the activity that takes place on the internet.

One of the issues that has come to the fore is the possibility that in the pursuit of cyber legality, there is a danger of infringing on the privacy of Chicago citizens. The state and legislature are always willing to have more control over the activities of residents. However, that level of control might have serious implications in terms of protecting civil liberties and the integrity of the American Constitution. The International Association of Privacy Professionals (IAPP) has been at the forefront of advocacy work in this respect so as to moderate some of the excesses that are proposed in prospective legislation.

The Quagmire of Data Collection

benjamin-voros-160962-300x200One of the current and most insidious forms of harassment is cyber bullying. It is now recognized as a serious crime in Chicago and prosecutors are highly motivated to go for those that continue doing it under the auspices of instrument number 720 Ill. Comp. Stat. § 5/12-7.5. The problem with such cases is the degree of difficulty in actually proving that everything happened as the victim described. Institutions such as schools have come up with bespoke policies that are designed to manage the risks. Some local ordinances demand such measures as a prerequisite to being licensed.

Some defense attorneys have expressed concern that the zeal to prosecute may lead to a violation of the defendant’s civil liberties. What was once accepted as normal conflict between and amongst teenagers is now a crime that can land someone in jail. Others point out that the resultant criminal record is an overly excessive punishment for the crime. On the other hand, it is noted that cyber bullying can lead to serious consequences for the victim including self-harm and even suicide on some occasions.

Key Ingredients of the Crime

markus-spiske-153537-200x300Terrorism is the current concern of the cyber security community. The key legal principles are laid out at a national level. However, there are many other forms of cybercrime which are largely downgraded yet quite capable of harming people. This is not just a problem for Chicago, but for the entire world at large. As is often the case in these instances, the argument is about establishing the right parameters for upgrading a simple cybercrime into cyberterrorism or cyberwar. For example, internet trolling is rarely capable of meeting the standards of terrorism, yet it is also a serious crime that is often prosecuted by the authorities. Others have decided to define cyberterrorism as any form of cyber crime that involves nations or entire communities.

Some of the worst offenders under this law are not pariah states but individuals who have used their expertise in order to hack into government agency databases before strategically leaking the resultant data in order to cause maximum embarrassment to the government. Although WikiLeaks and Snowden might argue that they do not meet this criteria, the reality is that the US government considers their actions to be a threat to the state. Therefore, the prosecution process and the indicative sentencing might be a lot harsher than would be the case for other types of cybercrime. We might then argue that it is the state that determines the fine line between cybercrime and cyberterrorism.  

Investigating and Classifying the Crime

benjamin-voros-160962-300x200The computer has been used to commit crimes, right from its inception. More recently, the city of Chicago has had to contend with the reality of cyber extortion. The state has certain duties and liabilities which include investigation and prosecutorial powers. The essential ingredients of the crime are that the offender gets the victim to do or not do certain things in order to avoid being harmed. The internet is then the conduit through which they make the threats, agree the illegal contracts and collect on them. Hackers have found the computer to be perfect for blackmail and ransom notes. One of their favorite tricks is to obtain sensitive information from an organization and then threaten to publish it unless their demands are fully met.

The demands invariably include monetary compensation but the standards of the crime can still be met even if money does not exchange hands. At other times the hackers will plant malicious information or programs for which only they have the key. That means that unless the victim accepts their demands, they will let the program wreak havoc. That havoc might involve wiping out the entire database of company information. Hackers may even deny an organization access to its own files in order to ensure that they can comply with the extortion demands. The range of victims is startling including municipalities, hospitals, government agencies and even private individuals.

A Violation of Privacy and Property

Contact Information