Essay: Cyber Crimes and the FBI

Pages: 4 (1435 words)  ·  Bibliography Sources: 4  ·  Level: College Senior  ·  Topic: Criminal Justice  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] There was clearly a certain amount of arrogance present with these two hackers and it was an arrogance that the FBI cleverly exploited. The position entailed "a few good hackers who could break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out. Ivanov was familiar with the tactic" (Jahnke, 2005). The intelligence of this mission is clear: this was a simple hacking task. Not only would these hackers be competent in completing this task, they'd be eager to show off their skills in other areas: "agents posing as Invita officials asked the men to demonstrate their prowess on a computer outfitted with "sniffer" software to record every keystroke. After arresting the men, the agents used account numbers and passwords obtained by the program to gain access to data stored on the pair's computers in Russia" (Jahnke, 2005).

Some argue that the FBI went "off the reservation" because agents in America were afraid that a colleague of these agents might annihilate the original computer in Russia, the agents thus downloaded the evidence to their computers before getting a search warrant (Jahnke, 2005). While this may have been a violation of protocol, the agents had no choice. To not download those documents would have risked the success of the entire project. Those who argue that such actions were unethical don't have a clear understanding of how high the stakes of this particular situation were.

However, many disagree with this particular sentiment. Some feel that the sentencing of these Russian hackers based on the information obtained through American FBI agent hacking will permit subsequent illegal methods in the collection of information from countries around the world (Brunker, 2000). On the other hand, recent events indicate that this will not in fact be the case. "A federal judge in Texas has denied a Federal Bureau of Investigation request to move forward with an investigation tactic that would have tracked alleged hackers by turning a suspect's computer into a surveillance agent" (rt.com, 2013). Judge Stephen Smith disallowed the FBI's attempt to use a method of tracking down an individual (which was labeled as "extremely intrusive) (rt.com, 2013). This tactic would have meant that investigators could have installed something called a "Trojan Horse" on a computer which would have taken over the operating system and snapped photos of the potential suspect and taken record of all the documents on the system as well as all passwords (rt.com, 2013). One of the reasons this tactic was denied by Judge Stephens was that it was deemed overly broad, and had it been allowed, it would have set a dangerous precedent for future judges dealing with comparable cases (rt.com, 2013).

This particular incident sets a clear standard. Federal investigators like the FBI need to have a variety of tools at their disposal, but they still can't infringe drastically with individual rights, such as the right to privacy. However, in the case of Ivanov and Gorshkov, those particular individuals were cyber-criminals with a long list of prior violations. The FBI had really no choice but to engage in bold and creative maneuvers to both bait these individuals from their hiding places and to prevent them from seizing opportunities to cover their tracks. While some might consider the actions of the FBI unethical or illegal, in this particular case their methods were appropriate. Anything less would likely have left these criminals at large, eager and active in exploiting and victimizing U.S. businesses and the U.S. economy.

References

Brunker, M. (2000). Fbi agent charged with hacking. Retrieved from http://www.nbcnews.com/id/3078784/ns/news-internet_underground/t/fbi-agent-charged-hacking/

Jahnke, A. (2005, April 25). A hacker story. Retrieved from http://www.crime-

research.org/articles/hacker0405/

Koerner, B. (2002, June). From russia with lopht. Retrieved from http://legalaffairs.org/issues/May-June-2002/feature_koerner_mayjun2002.msp

Lemos, R. (2001, May 01). Fbi "hack" raises global security concerns. Retrieved from http://news.cnet.com/2100-1001-256811.html

Rt.com. (2013, April 26). Judge rejects fbi's request to use 'extremely intrusive' hack tactic.

Retrieved from http://rt.com/usa/judge-rejects-fbi-hack-tactic-422/ [END OF PREVIEW]

Cyber Crimes in Today's World Term Paper


Cybercrime Includes a Range Essay


Organized Crime Refers to Groups of People Research Paper


History of Organized Crime in the United States Research Paper


Staffing a New Crime Laboratory Research Paper


View 58 other related papers  >>

Cite This Essay:

APA Format

Cyber Crimes and the FBI.  (2013, May 1).  Retrieved October 16, 2019, from https://www.essaytown.com/subjects/paper/cyber-crimes-fbi/1878649

MLA Format

"Cyber Crimes and the FBI."  1 May 2013.  Web.  16 October 2019. <https://www.essaytown.com/subjects/paper/cyber-crimes-fbi/1878649>.

Chicago Format

"Cyber Crimes and the FBI."  Essaytown.com.  May 1, 2013.  Accessed October 16, 2019.
https://www.essaytown.com/subjects/paper/cyber-crimes-fbi/1878649.