Subscribe to RSS  |  Advertise on this Blog

  • HOME
  • ABOUT
    • RESUME
Alberto Matus
  • SERVICES
  • CONTACT
  • HOME
  • ABOUT
    • RESUME
  • SERVICES
  • CONTACT
February 11, 2020  |  By ajMatus In Cybercrime, Cybersecurity, Technology

Cyber-Trespass

Holt & Bossler (2015) summarize Wall’s categories of cybercrime typology which address four areas, out of these I personally believe that the one which deserves the most attention is Cyber-Trespass. Trespass in itself encompasses certain elements such as intentionally entering or remaining on someone else’s property without authorization (Gillespie, n.d). Now when we apply this to cyberspace it looks at several different aspects. “Web page hacks, spam email, and network break-ins, though technically very different in nature” all have one common element and that is that its trespass in cyberspace (Adida, Chang, Fletcher, Hong, Page, & Sandon, 1998). Holt & Bossler (2015) define it as “the act of crossing invisible, yet established, boundaries of ownership in an online environment”. 

As pointed out by Adida et al. (1998) this usually encompasses some sort of hack or malware attack on computer networks to gain access. As more and more advances are made in technology we have newer and more advanced operating systems. Unfortunately, many of these systems come with security holes that grow every day. Intentional hackers find their way into logging unto machines remotely and implement numerous other attacks and programs that implement and automate other attacks. Breaking into this invisible space in the online environment is in itself illegal, and different state, federal, and national laws dictate their own grounds. However, what makes this cybercrime typology category even more dangerous is its expanding reaches to other cybercrimes. 

Typically a person who is guilty of cyber trespass without authorization, and intentionally gaining access to computer systems has a high intent to commit another crime in violation of already established laws. This can lead to other cybercrime categories such as cyber deception and theft; cyber violence which may also lead to cyber pornography and obscenity. Essentially, this one area is directly or indirectly related and touches the basis with the other cybercrime typology categories.

A simple hack may give a person access to credit card information which in turn may lead to the use of committing fraud. Moreover, accessing personal or organizational data and files may lead to digital piracy through sharing with others. Not to mention, if the person is deviant in nature and finds illicit personal photos or videos of the victim and then shares them on the web it may cause other types of harm such as emotional and physical on the victim. Such instances can even lead to cyberbullying and promote cyberstalking by other deviant individuals. This has an evergrowing list of effects that it may cause such harassment on the individual, sexual deviance turned into pornography and other harmful effects on the individual or group of individuals.

Ultimately, I believe this is the category that needs the utmost attention for the reasons mentioned above. Raw, technical skills by individuals may turn into malicious hacks which lead to other substantial harm against individuals, businesses, and governments. It may cause businesses and government financial losses, trade secret losses, and emotional and physical harm on others while promoting more deviant acts. This is why cyber-trespass is not as simple as it may seem and requires top priority.

References

Adida, B., Chang, E., Fletcher, L., Hong, M., Page, K., & Sandon, L. (1998). The Future of Trespass and Property in Cyberspace. Retrieved from https://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall98-papers/trespass/final.html

Gillespie, J. (n.d). Criminal Trespassing Law. Retrieved from https://www.nolo.com/legal-encyclopedia/criminal-trespassing-law.html

Holt, T., & Bossler, A. (2015). Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. Routledge, Taylor & Francis Group

Cybercrime cybersecurity dark web

Article by ajMatus

Related Articles

  • alberto-matus-digital-piracy
    An Overview of Digital Piracy
  • belize cybersecurity strategy
    Belize National Cybersecurity Strategy 2020-2023

Leave your comment Cancel Reply

(will not be shared)

WELCOME

Hello, and welcome! I'm Alberto - a Cyber Security & Digital Forensics professional specializing in Digital forensics, Incident Response & Vulnerability Assessment. I hold a Master's degree in Cybersecurity with a concentration in Digital Forensics from the University of South Florida and a Bachelor degree in Information Technology from the University of Belize. Through this blog I hope to share tips, information about cybersecurity, cybercrime, digital forensics, open source technologies, business, and a bit of my amazing country. For those interested in any of my services please feel free to contact me using any of the associated contact details on this blog.

SEARCH

ARCHIVE

  • October 2022 (1)
  • July 2021 (2)
  • November 2020 (2)
  • October 2020 (1)
  • September 2020 (2)
  • August 2020 (2)
  • July 2020 (6)
  • June 2020 (6)
  • April 2020 (5)
  • February 2020 (1)
  • November 2019 (2)
  • October 2019 (1)
  • September 2019 (1)
  • June 2019 (1)
  • May 2019 (1)
  • November 2018 (6)
  • September 2018 (3)
  • August 2018 (4)
  • February 2018 (1)
  • January 2018 (3)
  • December 2017 (1)
  • October 2017 (5)
  • September 2017 (1)
  • December 2016 (2)
  • November 2016 (4)
  • October 2016 (1)
  • September 2016 (2)
  • August 2016 (5)
  • July 2016 (2)
  • June 2016 (2)

CALENDAR

March 2023
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Oct    

RECENT POSTS

  • Capture
    WordPress Empty template: Index Friday, 7, Oct
  • Belize – Benque Viejo to San Ignacio Town Drive Tuesday, 6, Jul
  • alberto-matus-digital-piracy
    An Overview of Digital Piracy Thursday, 1, Jul

REMOTE WORK

Remote work is my preferred way or working as I have a home office set up where all the magic happens. This method allows me to work with businesses, organizations, and all brands across the globe. I can manage projects via my own management applications or your own internal project management app. Any calls and meetings can be done through whatever tools fits your business, and I’m flexible to work on your time zone.

ON-SITE

Not every job assignment can be done via remote working methods, and so if it requires me to be on-site for the duration of the work then this can be done based on agreements or contractual work. I prefer doing these types of consultancies or hands-on types of work on the weekends but I am flexible enough depending on the terms. I am also open to traveling outside of Belize. All further afield work requires accommodation and travel expenses.

RETAINER

Sometimes clients are looking for long term partners that share a closer connection to their visions and goals. As such I am open to retainers. A retainer hires me for a certain amount of hours per month at a discounted rate. These discounted rates are usually between 10%-20% off depending on the contractual agreements.

Alberto - open source | technology | belize -Matus

Copyright ©2020. All Rights Reserved

en_USEnglish
en_USEnglish