Cybercrime and Traditional Crime

Cybercrime refers to criminal acts performed with the aid of a computer. Issues surrounding cybercrime include hacking, copyright infringement, child pornography and child grooming (Nowak, 2009). Traditional crime on the other hand, refers to unlawful acts that are not necessarily computer related. Such acts may include organized crime, white collar crimes and political crimes. Based on this background, this paper will discuss these forms of crime in detail.

As the world becomes more computerised, traditional organised crime is taking on a new face. There is a gradual overlap between organised and cyber crime in the sense that, the internet is offering new ways of committing old crimes. Thus, cybercrime is more prevalent than traditional organised crime. On the same note, the internet provides anonymity, hence its attractiveness to individual criminals in general and organised groups in particular.

The internet and the continued growth of electronic commerce offer new opportunities to organised crime groups. It has thus become extremely easy to rob online banks, gain access to intellectual property and conduct money laundering activities at the click of a button. Cases such as the Love Letter worm and the Bloomberg extortion scheme illustrate the rapid growth and magnitude of cyber crime (Williams, 2002).

Given its far reaching effects, cyber crime should be combated. One way to achieve this is through encrypting and digitally signing e-mail with clients. Others include installation of a fire wall as well as password management software, conducting financial transactions at secure websites only, securing wireless networks, creating a Link Homepage and identification of suspicious e-mail (Leon, 2008).

The major complexity in cyber crime is its convergence with organised crime. In addition, the virtual world has no borders, making large scale investigations tedious and at times impossible (Williams, 2002). This is usually coupled with the lack of proper legislations to follow the trail of cyber criminals and their prosecution. Major players in the industry must embrace cooperation and mutual trust to stop cybercriminals right on their tracks. Ultimately, the integrity of computers and the internet must be protected for it to remain the blessing it was meant to be, rather than the curse it is being turned into by cybercriminals.

Reference list

Leon, J. F. (2009). Ten Tips to Combat Cybercrime . The CPA journal (May 2008 Issue).

Nowak, J. (2009, September 12). Twenty-five Years of Cyberspace. Retrieved August 13, 2010, from internet.suite101.com/article.cfm/twentyfive_years_of_cyberspace

Williams, P. (2002). Organized Crime and Cyber-Crime: Implications for Business. Retrieved August 13, 2010, from www.cert.org/archive/pdf/cybercrime-business.pdf