computer crime w8

Take the cyber crime that is used  for assignment #2. Using information from assignment #5 (methods to stop cyber crime) , list methods the cyber criminals used to commit their crime and list methods that could have been used to either stop them or to catch them sooner. Complete a 5 to 7 page paper using APA style formatting, original content

#2 assignment: Software
piracy schemes when conducted involve large amounts of money. One of these was
uncovered in the US, Kansas, when six people pleaded guilty to charges that
stemmed from investigations into illegitimate software worth $100 million (Oberholtz, 2016). The justice department termed this one
of the largest software piracy schemes to involve stolen and/or counterfeit
software products that ranged from Microsoft access codes to products for Adobe
Systems. Software piracy is considered a
noteworthy crime that renders software manufacturers and developers as well as
unsuspecting consumers’ victims.

Software
piracy if conducted on a massive scale poses considerable damage to the
American economy and the private businesses. Microsoft and software developers
sued defendants and the entities they owned civilly for willful trademark
activities and the infringement on copyrights. The scheme, which was a
multi-million dollar undertaking, was characterized by co-conspirators who held
operations overseas in Germany, China and Singapore and across states in the US
and illegally selling Microsoft Corporation software products and Adobe Systems
key codes using a charitable organization as well as online business (Oberholtz, 2016). Key codes are important in that they
allow a user to acquire unlocked as well as licensed versions of programs that
are copyrighted by corporations. The conspirators in the software piracy scheme
sold precuts numbering to 170,000, key codes which were used and activated
severally.

One
of the defendants managed and maintained an online presence of a PayPal/eBay
charity (Project Contact Africa) which was used as a platform for selling
illicit and unauthorized software and its components and the payments were
facilitated using the charity’s PayPal account (Oberholtz,
2016). Customers paying to the charity believed that the proceeds from
the sale of the software were for charity while in reality, they were used to
purchase inventory and only a meager portion went to charity. The investigation
into the software piracy scheme uncovered that the inexplicably cheap copies of
the software like Microsoft Office and Photoshop were sold even over reputable
sites like Amazon and Oversctock.com.

Investigators
discovered that the ring that consisted of half a dozen men bought real,

|stolen
access codes that were listen in Word documents and Excel spreadsheets as well
as counterfeit packaging cards that looked genuinely official where the access
codes were faked and printed, and stolen authenticity certificates that were
used to make the software packages appear genuine. The six individuals took
plea deals in the fraud scheme selling copies of Creative Suite, Windows and
Office. Investigators from the Homeland Security tracked these men and
discovered pirated software copies through sites like Craigslist, eBay and even
personal websites(Oberholtz,
2016). The Department of Justice has meted punishments and penalties
ranging from between three and five years in federal prisons to restitution
fees of up to a quarter million dollars.

#5 assignment: Cyber-crimes have
become rampant recently. They can, however, be stopped by application of some
methods. Firstly, people should use strong passwords for their accounts. In
this way, it becomes difficult for the cybercriminals to hack one`s account.
Secondly, people should use different passwords for their different sites. This
will help stop people from easily getting access to all your accounts. Thirdly,
people should secure their computers. This will also stop cyber criminals from
easily acquiring information from one`s computers. Also, people should secure
their wireless networks. This will, in turn, stop people from hacking into the
wireless networks and accessing one`s information. In addition to that,
securing mobile phones can also stop cyber-crimes (Das, 2015). This is in the
sense that once mobile phones are secured it becomes difficult for cyber
criminals to hack and get information from one`s mobile phone.

  Catching cyber criminals can also
help stop cyber-crimes. Cyber criminals can be caught in several ways. To begin
with law enforcement in coordination with government agencies should be
applied. It will be easy for law enforcement bodies to catch cyber criminals as
compared to common man since once the bodies get to corporate with the
government, then they can get all the necessary resources to enable them to
catch these criminals. Also, employing of investigators who are technically
trained can also help catch cyber criminals. This is because most cyber
criminals use methods of high standards such that their paths remain
untraceable (Guitton, 2012). However, once the well-trained investigators are
employed, they can use the knowledge and skills that they have to be able to
catch the cyber criminals. With the application of the above methods of
stopping and catching cyber criminals, then cyber-crimes shall be eradicated.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Order Over WhatsApp Place an Order Online

Do you have an upcoming essay or assignment due?

All of our assignments are originally produced, unique, and free of plagiarism.

If yes Order Similar Paper