Crimes via Electronic Communication
Price et al, (2009), refers to white-collar crimes as illegal and unethical acts that infringe fiduciary role as well as the public trust for selfish gains. Computers and internet emergence has significantly resulted to increase in electronic crimes. These electronic advances have made the process of committing fraud easier. These advances have also made it convenient for criminals as it helps to avoid detection. As a result, there have been rising cases of white collar crimes within our societies. Most of these criminals use mobile and electronic devices to pose as sellers after which they get access to personal information that aids them to commit fraud. The criminals often use influential titles that indicate that they are important people such as the wealthy, the lottery personnel or even prominent people. They use these techniques so as to entice victims into giving out their private information, pins for Automatic Teller Machines and security details. With this kind of information, swindlers have the chance to carry out their fraud acts. Being a swindler, I would use this information to empty the victim’s bank account or other offshore accounts.
The increased use of internet and electronics by criminals is one of the critical challenges facing the law enforcers in general. However, understanding and using the internet to combat white collar crimes is very essential. Law enforcers are therefore up to date with the internet advancement as this helps them in fighting these fraud cases. With these advances, the police officers are able to track the IP number and address of the criminals who commit these crimes. They are thus able to physically arrest and punish these criminals (Price, 2009).
According to Wright, (2008), he asserts that the fourth amendment offers protection to the people’s right to privacy. However, its scope is largely vague as changes in technological expectations on privacy are experienced. Recently, internal debate and national headlines have been incited following government searches and seizure of private electronic information. Most people argue that this is a violation of the fourth amendment law. As result, this extrapolates the restrictions of the fourth amendment in regards to electronic communications.
Phishing mostly commit fraud by sending scam emails to victims. This is a good strategy of stealing credit cards. The phishing criminal mostly uses emails that are intended to obtain personal information. They often send emails that are convincing as they appear legitimate. This technique lures the user into sending their personal information (Price, 2009). Some of these emails are sophisticated and they often direct the user to a link or website that appears as the official card site. One of the tasks that users are asked to undertake is to verify their account. This is one of the signals that may enable one to realize that there is some illegal activity happening. This is because official business never requests a person to verify their accounts. The internet and electronic communication serves as the hub for many other illegal and unethical acts. It is therefore important for users to be alert at all times especially while dealing with electronic communications. This will allow them to identify mischievous activities and hence calling the legit business company so as to confirm that the communication is from them. Electronic crimes are on the increase and we should all work towards eliminating them.
References
Wright, E. E. (2007). Right to Privacy in Electronic Communications: Current Fourth Amendment and Statutory Protection in the Wake of Warshak v. the United States. ISJLP, 3, 531.
Price, M., & Norris, D. M. (2009). White-collar crime: Corporate and securities and commodities fraud. Journal of the American Academy of Psychiatry and the Law Online, 37(4), 538-544.