refers to any activity that is illegal and uses a computer as itsmeans of executing the act. Over the years the number of cyber crimescommitted through the use of computers has surged. The list of crimescontinues to increase each day as hackers invent new ways ofintruding networks and disseminating computer viruses. Some of thecommon cyber crimes include: stalking, terrorism, bullying andidentity theft[ CITATION Rou14 l 1033 ].In this essay, the author will summarize an article by TK Kenaniniwho is aninformation security specialist. In his article the author discussesthe new vices that cybercriminals are using in their trade. Inaddition, the essay will cite two relevant cyber criminal cases inthe U.S and Canada in an attempt to shed more light on the subject.

TKKeanini is a worried information security professional, in hisarticle “Welcome to My Cyber Security Nightmare” Keanini explainssome ingenious tricks cyber criminals are utilizing to get to theirprize. Keanini explains that cyber criminals are not concerned on howto access an organization’s network. This is because companies andorganizations expect cyber attacks and have put measures to mitigatesuch. Nowadays, cyber criminals are infiltrating organizations byhaving willing participants orchestrate the crimes. The participantswho are usually employees only require to download or install apackage and this could earn them as little as $10 a day but whichcould translate to $300 a month. This allows the intruders to haveaccess to an organization’s network. Another way cyber criminalsare acquiring information is through the use of log in credentialsfrom coordination networks. The attackers pose as interested partiesin organizations, but end up getting into an organization’s networkfor personal and selfish gains or other reasons best known to them.Finally, cyber criminals are capable of coming up with acybercrime-as- a-service as TK call it. The service would allow cybercriminals to map out social networks and have personal informationfrom individuals. This information could then be used to database forleading the criminals to their objectives [ CITATION Kea14 l 1033 ].

InJuly of 2013, 5 hackers were charged in what was termed as one of thebiggest cybercrime case in U.S history. The individuals who arebelieved to hail from Ukraine and Russia were indicted for hackingand causing the loss of over $300 million to U.S companies. Some ofthe hacked companies include: Visa Inc., JetBlue Airways and J.C.Penney just to mention a few. The five men are believed to havestolen 160 credit card numbers. Each of the hackers had a specializedtask and the authorities suggest that while two of them hacked, onewas mining data, the fourth one provided an anonymous web-host whilethe last one distributed the stolen data and profits [ CITATION Pos13 l 1033 ].In another case of cyber crimes, the Canadian Anti-Fraud Centre(CAFC) received lots of complaintsfrom Canadian residents in 2012. The residents complained aboutgetting pop-up messages on their devices that suggested that theiroperating systems were locked because of violating the laws ofCanada. These fraudulent messages appeared to have originated fromthe Canadian Security Intelligence Service (CSIS) and it would promptthe individuals to pay $ 100 in order to have their computersunlocked. The Canadian authorities used their websites to inform thepublic about the malware threat and report the incidents to the CAFC[ CITATION Cyb14 l 1033 ].


: an overview of incidents and issues in Canada. (2014, June 2). Retrieved November 15, 2014, from Royal Canadian Mounted Police:

Keanini, T. (2014, October 30). Welcome To My Cyber Security Nightmare. Retrieved November 15, 2014, from DarkReading:

Post, A. (2013, July 26). Five hackers charged in biggest cyber crime case in U.S. history. Retrieved November 15, 2014, from Inside Counsel:

Rouse, M. (n.d.). . Retrieved November 15, 2014, from SearchSecurity: