Articles Posted in Internet Crimes

On February 14 of this year, a disturbed individual entered Marjory Stoneman Douglas High School in Parkland, Florida. He took out a gun and opened fire, murdering 17 people.

Following this tragedy, the website Infowars.com published an article about the shooter. The headline read, “Reported Florida Shooter Dressed as a Communist, Supported ISIS.” The article was accompanied by a photo of Marcel Fontaine—a Massachusetts resident who had never been to Florida and had nothing to do with the shooting. In the photo, Mr. Fontaine was wearing a novelty T-shirt displaying cartoon images of historical communist party leaders.

The implication that Mr. Fontaine was somehow linked to the mass shooting has led to serious consequences. He has suffered from targeted harassment and threats from all over the world. He fears for his safety. Even though the lie has since been debunked, many InfoWars fans continue to believe there is a conspiracy of which Mr. Fontaine is a part. Mr. Fontaine has filed a lawsuit against InfoWars for defamation.

As cash succumbs to the convenience of credit and online shopping, personal information on everything from your finances to your favorite restaurants fly across the internet. As a business owner, you likely do your best to make sure that your customers’ data is under lock and key. Sometimes, however, someone can take advantage of a tiny crack in the system.

Following in the footsteps of the major Equifax leak, Uber has recently admitted to a gigantic data hack of 57 million people during 2016. Like Equifax, Uber failed to announce the danger to its users until long after the fact.

The hackers held this personal data hostage for a ransom of $100,000. They promised to destroy copies of the information once they received payment. Uber quietly paid the sum and expected the hackers to hold up their end of the bargain.

No one will have to break into your smart East Bay home. The key to the front door will be in your phone. The controls to the security system and surveillance cameras will be conveniently located in your phone as well.

Experts say the “smart” features in our wifi- or bluetooth-connected refrigerators, lighting, cars, watches, heating systems and more can easily be hacked by those intent on committing cybercrime.

“You just need a smartphone,” said a managing consultant at a cyber security firm. “A lot of these apps are available on the Internet.”

A Russian man who “directed and supervised” the operations of a popular bitcoin exchange known as BTC-E has been indicted on a range of charges. He was arrested recently in Greece.

The federal indictment, which was just unsealed in California, claims that BTC-E was the nexus for several criminal enterprises. The site allegedly facilitated ransomware, identity theft, drug trafficking, money laundering and public corruption, among others. The indictment also claims the director had co-conspirators.

According to a New York Times analysis of the indictment, BTC-E and/or its director may have been responsible for the hacking intrusion and theft of bitcoin that led to the bankruptcy of another bitcoin exchange called Mt. Gox in 2014. That year, the CEO of Mt. Gox admitted that hackers had stolen over 800,000 bitcoins, although it later recovered a portion of that number.

As a recent USA Today article duly stresses, so-called “revenge porn” is “a crime of the Internet Age.”

Indeed, revenge porn — which is outlawed and calls for criminal punishment in a clear and growing majority of states — provides for a modern-day twist on invasion-of-privacy laws that have been operative across the United States throughout much of the country’s history.

California was a relatively early state entrant with its 2014 drafting and implementation of statutory law addressing and providing criminal penalties for individuals convicted of revenge porn.

The term “cybertechnology” is a mouthful, to be sure, and a concept that is not yet uniformly understood among the general public.

It is “an emerging area of the law,” says one legislator and commentator, who adds that, “The law has to catch up in many instances.”

A summary description of cybertechnology might simply state that it centrally relates to computer — and especially Internet-based — knowledge and platforms, with consumers using progressively sophisticated acumen and applications to engage in myriad activities.

Do you think that law enforcement agencies and government regulators at the local, state and federal levels are paying much attention to so-called “cybercrime” these days?

That is squarely a rhetorical question that hardly requires a response in 2017. Cybercrime is a big deal, flat out In fact, many commentators on the subject matter believe that cybercrime — that is, identifying and preventing it, as well as mitigating its downsides when it has already occurred — is at the top of the list of concerns facing entities ranging from banks and retailers to service providers and national governments.

What exactly is the focus when it comes to cybercrime?

According to a 2015 FBI report, California leads the nation in cybercrimes. Nearly 15% of the approximately 300,000 cyber crimes affected the state and accounted for $195 million in losses.

Seniors residing in the Golden State and throughout the country are popular targets of digital criminal activity. They were born in a generation where one computer filled an entire room. Advances in technology from personal computers in homes to mobile devices on the go have only increased the struggle to catch up with younger generations.

Seniors Becoming A Growing Target Of Cyber Crimes

It might seem to most reasonable people that the Internet truly is ubiquitous. It took off as a global phenomenon a generation ago, and it is seemingly at the center of much of life in today’s world.

People use information technologies imbedded in the Internet to do just about everything imaginable. They bank and shop online, send photos, submit resumes, check their mail, order movie tickets, do research, date and listen to music.

And some of them commit crimes.

Technology has exploded in the last few decades, and nearly everyone here in California and across the country uses some sort of computer technology ,such as laptops, smartphones and tablets. The birth of the internet put the world in touch with a completely new way of relating to each other and conducting business, but the system is not perfect, and internet crimes expose its vulnerabilities. In response to these technological advances and an ever increasing use of the internet, a new area of law was created to deal with cybercrimes.

The question is what types of computer usage constitute cybercrimes. Nearly everyone has heard of “hackers” who break into supposedly secure systems and steal information. Some of them introduce viruses that wreak havoc on a computer system. However, these are not the only form of computer crime. Even preventing someone from gaining access to his or her computer can be illegal.

Using computers and the internet in the furtherance of a crime, falsifying the data on an email and using computers in a fraud scheme are also against the law. Somehow altering or obtaining data from a system could be a crime as well. Virtually any access to a computer system without authorization could cause an individual to cross the line from legal to illegal usage. Where that line is can sometimes be confusing.

Contact Information