ROLE OF INTERNET CRIME COMPLAINT CENTER IN PROTECTION OF HUMAN RIGHTS IN US
Keywords:
Internet, cyber crime, human rights, security policyAbstract
The IC3 report describes many of the current Internet trends and models of crime. The data show that the examples of Internet crime on the rise seen in relation to data on the number of criminal charges, 275 284 in 2008. compared to 206 884 in 2007. year, 207 492 in 2006. years and 231 493 in 2005. year. Total losses of all reported cases of fraud were 264.6 million in 2008. against 239.1 million in 2007. year. Most frequently reported offense was non-delivery of goods / nonpayment and fraud by credit / debit cards. Among individuals who reported losses from fraud, the highest median dollar losses were found in victims of check fraud ($ 3,000), confidence fraud victims ($ 2,000), and victims of Nigerian scams (west African, 419, short-term loans on behalf of the advance) (1,650 dollars). When comparing data for 2007. and 2008. one can see that the e-mail and web pages are still two primary mechanisms by which the contact is linked to fraud. Although this report may give a brief overview of the prevalence and effects of fraud on the Internet, should be taken to avoid drawing conclusions about the ”typical” victims or perpetrators of these types of crimes. Anyone who uses the Internet can be compromised, and IC3 has received criminal reports from male and female from ten to a hundred years old. Applicants have criminal charges in all fifty states, in dozens of countries worldwide , and over them were committed offenses of fraud by working at home to identity theft.
Internet ”suffer” from the obvious problems related to security, which, if ignored, can have disastrous consequences for unprepared sites – Behrouz Forouzan (2009). Companies concerned about the safety of the Internet raise the following questions: 1) Will hackers disturb the internal systems?, 2) Will the companies important data be compromised (changed or read) the transfer? And 3) Will the company be brought into an unpleasant situation ? Appear in many technical solutions related to the basic problems related to Internet security. However, their price is very high – Randjelovic Dragan (2011). Many solutions limit the functionality to increase security. Internet security policy aims to make a decision about how to protect the company. It usually takes this policy divide into two parts: general policy and specific rules (which are equivalent to specific policies of the system) – Behrouz Forouzan (2009). The main problem is that the Internet is not designed to be very safe.
Downloads
References
Vacca, J. R. (2007), Practical Internet Security, Pomeroy, Ohio.
Vacca, J. R., Scott, R. E. (2005), Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, Florida.
Defler, F. (2008), How Networks Work, Digital Technologies and the New Media, Michigen.
Elliott, J. E. (2002), Cyber Terrorism: A Threat to National Security, Army War College, Pennsylvania-Carlisle Barracks.
Forouzan, B., (2009), TCP/IP Protocol Suite (Mcgraw-Hill Forouzan Networking), New York.
Gershwin, L. K. (2008), Cyber Threat Trends and US Network Security, www.cia.gov.
Preston, G. (2007), How to Internet Works, Que Pub, Indianapolis.
Ranđelović, D., Jaćimović, S. (2010), Policijska informatika, Kriminalističko.policijska akademija, Beograd.
Ranđelović, D. (2011), Poređenje komercijalnih i nekomercijalnih alata digitalne forenzike i njihova upotreba, Naučno-tehnička informacija, Vojnotehnički institut, Beograd.
Steling, W. (2006), Criptografi and Network security, New Age International, New Delhi.
Comer, D. (2006), The Internet Book: Everything You Need to Know About Computer Networking and How the Internet Works (3rd Edition), The Internet Book.
Council of Europe (2008), Cyberterrorism – The use of the Internet for terrorist purposes, Council of Europe Publications.