This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
History

The History of Cybercrimes

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

The History of Cybercrimes

The advent of technology in the twenty-first century triggered the emergence of cybercrime over a short period. Society has been plagued with loosely interconnected networks that are vulnerable to cybercrimes. Hackers have raked in millions from trafficking stolen credit cards and developing premium underground systems that are resistant to manipulation by investigative agencies. Over the years, these immune networks produce botnets and malware that continue to prey on computers. Combating cybercrime requires governments and investigative agencies to develop secure information sharing channels that enhance cybersecurity awareness.

The History of Cybercrimes

Cybercrimes first gained ground in the 1970s when criminals used telephones to divert and phreak calls. As a result, underground marketplaces sprung drastically as criminals sold stolen products and card details. Ian Murphy was the first person convicted of cybercrime. He pleaded guilty of hacking a telephone company in the United States to enable telephone users to make free calls. Hackers also came up with secret codes that could provide free distance services to travelers. They impersonated computer operators and accessed telephone company databases to obtain confidential information. Besides, the criminals changed their tactics by using malware that was resistant to external attacks. Phreaking proved a complicated issue for law enforcement agencies as tracking the location of the hackers became impossible.

Don't use plagiarised sources.Get your custom essay just from $11/page

In 1986 Clifford Stoll, a computer systems administrator, discovered irregularities in financial and accounting data. He invented a digital forensic technique and found out that unauthorized users had hacked into computer networks. He used the ‘honey pot tactic’ to lure the hackers into using a traceable system that would help investigation officers to track the source and location of the cybercrime. Stoll’s efforts led to the arrest of Markus Hess and other criminals in West Germany who used malware to steal and sell military information. Stoll also contributed to the discovery of Morris Warm Virus, named after Robert Morris. The virus could damage more than six thousand computers leading to an estimated loss of $98 million. Consequently, Congress passed an act that made computer hacking a felony punishable by imprisonment or fine. Contributions by Stoll and Morris were pivotal in helping governments to implement measures that could curb cybercrime.

In 1990, FBI agents recovered forty-two computers and close to twenty thousand disks during Operation Sundevil. These devices were used by criminals to steal and sell payment cards. The investigation lasted for two years, and the government of the United States made significant progress in unearthing several crimes during Operation Sundevil. The event was an indication that cybercrime was on a steady increase, and criminals were defining new ways of intruding into private and public computer systems and accessing important information.

The history of cybercrime is incomplete without examining the rise of ransomware. The latter is a malware virus that allows hackers to gain access to computer systems and encrypt files, blocking users from accessing their data. During the early 1990s, hackers extorted users and threatened to delete or expose their files to the public. Criminals also used tone systems to hack phone networks, a process called phreaking. The attack would allow hackers to reverse tones used by companies and make calls to unintended locations. The first ransomware attack was witnessed in 1989. Hackers encrypted patient data in hospitals and demanded money to unlock the files. Joseph Popp, a biologist, distributed close to twenty thousand disks in ninety countries, claiming that the disks could be used as test controls for HIV/AIDS. However, the disks contained malware programs that required computer users to pay for a license. Today, encryption techniques have changed and become refined as criminals focus on concealing their identities and protecting themselves from arrests and data leaks. The WannaCry crybercrime in 2017 illustrates how hackers can manipulate computer systems and corrupt files without being tracked. Ransomware attacks are part of the history of cybercrimes that has continued to evolve over the years.

The late 1990s marked the rise of web browsers and emails which were used during cybercrimes. Cybercriminals only needed to initiate physical transactions such as providing hard disks to computer users. The hackers could then transmit coded viruses over the internet through vulnerable web browsers. Consequently, many people lost their payment card details and passwords, files, and computer data. Millions of users were tricked simultaneously by hackers who used web browsers and emails to send encrypted virus. The use of Internet Relay Chat platforms also allowed cybercriminals to lock computer systems and stay incognito. Investigative agents could hardly identify the locations or servers of hackers and this led to an increase in cybercrime in the 1990s.  A shift to web-based boards gave hackers underground structures that allowed them to build untraceable networks and corrupt computers in large-scale firms.

Today, the inception of social media has led to the rise of identity theft and cybercrime. The use of Personal Identifiable Information has allowed hackers to shift to financial frauds and extort more money from card holders. This technological advancement, coupled with lack of awareness on issues of cybercrime and cybersecurity, has allowed hackers to commit financial frauds easily. As computer systems are becoming complex and faster, cybercrime is becoming more sophisticated. The rise of botnets has infected many computers with malicious software that require premium subscription and are threats to information security. Accordingly, hackers can use botnets to overload vulnerable networks and conceal their location.

As computer systems become vital tools in the daily activities of organizations and governments, cybercriminals are constantly finding new ways of intruding into networks and corrupting files and devices. In the late nineteenth century, criminals would only access a person’s valuables through robbery. In the case of data theft, they would find access to a computer and sift through files. Today, hackers can access computer systems from far distance. The inception of technology has enhanced online access to vulnerable files and information without the need for a physical presence. Additionally, the use of malware programs has protected cybercriminals from arrests as they can stay incognito for a long time. Despite the evident technological advancements that have allowed investigative agencies to use modern trafficking tools, committing cybercrime in the twenty-first century has become easier as cybercriminals can conceal their identities and access vulnerable computer networks from all over the globe.

On the other hand, there has been a shift in the way cybercrimes are investigated. During the late nineteenth and early twentieth centuries, investigative agencies relied on conventional and tangible evidence to prosecute cybercriminals. Besides, poor technology led to delays in trafficking hackers and stopping crime. Over time, law enforcement authorities have improved their response to crime. Whereas international cybercrime control operations were uncommon in the last century, police officers can launch investigations on anybody in any part of the world. For instance, governments are hiring services from international investigative organizations such as FBI and Interpol. Contrary to the early 1990s where the goal of investigative agencies was to arrest perpetrators of cybercrime, governments are focusing on improving infrastructure and promoting cybersecurity awareness among computer users.

The Blackshades Attack

Blackshades is a malicious software that was invented by Alexander Yucel to allow hackers to remotely control computers, turn on webcams, and steal personal information. In 2010, the Swedish began selling floppy disks at $40 to hackers who used the devices to steal passwords and corrupt files from computers. Cassidy Wolf, a California beauty model, was a victim of the malicious software attack. A hacker sent an anonymous email, claiming to possess confidential photos taken from her laptop. Yucel’s software infected more than half a million computers. He was caught by FBI agents after being lured to use a traceable version of the malware software and was later sentenced to five years in prison. Blackshades is among the many cybercrimes that have been witnessed over the years, and whose impacts demonstrate the vulnerability of computer networks.

Conclusion

Cybercrime is a vice that requires governments and investigative agencies to adopt systems that reduce vulnerability of computer systems. With a history that dated back in the 1970s, cybercrime has adversely affected information security and privacy. The drastic surge of people storing their information in computers led to a rise in identity theft. To combat cybercrimes, investigative bodies should create reliable information sharing channels that enhance investigation experiences, protection measures, and public awareness.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask