By CHRIS UWAJE
In 1982 and 1983, the first desktop computers began to appear, many were equipped with operating system called Berkeley UNIX which includes Network Software – which allows relatively easy connection to the Internet.
The personal computer revolution continued through the eighties, making access to computer resources and networked information increasingly available to the general public.
The rapid growth of the Internet and other Telecommunications technologies are promoting advances in virtually every aspect of society and every corner of the globe. Most of these advances represent positive changes in our society.
Unfortunately, many of the attributes of this technology – low cost, ease of use, and anonymous nature, among others – make it an attractive medium for fraudulent scams, child sexual exploitation, and increasingly, a new concern known as “cyberstalking.”
Cybertalking begins when 2 or more people communicate through emails or a chat room. You usually don’t know who is on the other side of the computer. Since people don’t usually know who that person is it encourages you to say things that you normally wouldn’t in person. The person or people you are corresponding with may be offended by your word or vice versa. The harassment may then start from that stranger you were chatting with. Then the cyberstalking starts with the constant abusive emails, obscene or inappropriate pictures. Your life could be threatened or even your computer could be sabotaged. Identity theft occurs during some of these encounters.
While some content of cybertalking maybe abusive, offensive and/or insulting, the content of cyber-crime e-mails are pretentiously camouflaged as friendly, business like and even loving – but the core trade is deceit and fraud. The resultant effects are “identity theft” in cyberspace and related crimes and socio-economic personal and/or corporate damages.
Can it be rightly said therefore that Man has become entrapped in its own techno-knowledge dynamics? Some of the most critical cyber crimes are: Insiders, Hackers (or “crackers”), “Hacktivism.” Or Political Hacking, Criminal Groups, The Phonemasters’, Internet Fraud, Foreign intelligence services. Information Warfare, Virus Writers, Internet Fraud, Identity Theft, Child Pornography, Terrorists Etc.
Recognizing this emerging problem, Vice President Al Gore asked the Attorney General on February 26, 1999, to study the problem and to report back with recommendations on how to protect people from this threat.
It is estimated that identity theft has become the fastest-growing financial crime in America and perhaps the fastest-growing crime of any kind in our society. Identity Theft: Is There Another You?: Joint hearing before the House Subcommittees.
Disclaimer
Comments expressed here do not reflect the opinions of Vanguard newspapers or any employee thereof.