Cyber Crimes and the FBI Essay

Pages: 4 (1435 words)  ·  Bibliography Sources: 4  ·  File: .docx  ·  Level: College Senior  ·  Topic: Criminal Justice

There was clearly a certain amount of arrogance present with these two hackers and it was an arrogance that the FBI cleverly exploited. The position entailed "a few good hackers who could break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out. Ivanov was familiar with the tactic" (Jahnke, 2005). The intelligence of this mission is clear: this was a simple hacking task. Not only would these hackers be competent in completing this task, they'd be eager to show off their skills in other areas: "agents posing as Invita officials asked the men to demonstrate their prowess on a computer outfitted with "sniffer" software to record every keystroke. After arresting the men, the agents used account numbers and passwords obtained by the program to gain access to data stored on the pair's computers in Russia" (Jahnke, 2005).

Some argue that the FBI went "off the reservation" because agents in America were afraid that a colleague of these agents might annihilate the original computer in Russia, the agents thus downloaded the evidence to their computers before getting a search warrant (Jahnke, 2005). While this may have been a violation of protocol, the agents had no choice. To not download those documents would have risked the success of the entire project. Those who argue that such actions were unethical don't have a clear understanding of how high the stakes of this particular situation were.Buy full Download Microsoft Word File paper
for $19.77

Essay on Cyber Crimes and the FBI Assignment

However, many disagree with this particular sentiment. Some feel that the sentencing of these Russian hackers based on the information obtained through American FBI agent hacking will permit subsequent illegal methods in the collection of information from countries around the world (Brunker, 2000). On the other hand, recent events indicate that this will not in fact be the case. "A federal judge in Texas has denied a Federal Bureau of Investigation request to move forward with an investigation tactic that would have tracked alleged hackers by turning a suspect's computer into a surveillance agent" (, 2013). Judge Stephen Smith disallowed the FBI's attempt to use a method of tracking down an individual (which was labeled as "extremely intrusive) (, 2013). This tactic would have meant that investigators could have installed something called a "Trojan Horse" on a computer which would have taken over the operating system and snapped photos of the potential suspect and taken record of all the documents on the system as well as all passwords (, 2013). One of the reasons this tactic was denied by Judge Stephens was that it was deemed overly broad, and had it been allowed, it would have set a dangerous precedent for future judges dealing with comparable cases (, 2013).

This particular incident sets a clear standard. Federal investigators like the FBI need to have a variety of tools at their disposal, but they still can't infringe drastically with individual rights, such as the right to privacy. However, in the case of Ivanov and Gorshkov, those particular individuals were cyber-criminals with a long list of prior violations. The FBI had really no choice but to engage in bold and creative maneuvers to both bait these individuals from their hiding places and to prevent them from seizing opportunities to cover their tracks. While some might consider the actions of the FBI unethical or illegal, in this particular case their methods were appropriate. Anything less would likely have left these criminals at large, eager and active in exploiting and victimizing U.S. businesses and the U.S. economy.


Brunker, M. (2000). Fbi agent charged with hacking. Retrieved from

Jahnke, A. (2005, April 25). A hacker story. Retrieved from http://www.crime-

Koerner, B. (2002, June). From russia with lopht. Retrieved from

Lemos, R. (2001, May 01). Fbi "hack" raises global security concerns. Retrieved from (2013, April 26). Judge rejects fbi's request to use 'extremely intrusive' hack tactic.

Retrieved from [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (4 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Cyber Crimes in Today's World Term Paper

Cybercrime Includes a Range Essay

Organized Crime Refers to Groups of People Research Paper

History of Organized Crime in the United States Research Paper

Staffing a New Crime Laboratory Research Paper

View 200+ other related papers  >>

How to Cite "Cyber Crimes and the FBI" Essay in a Bibliography:

APA Style

Cyber Crimes and the FBI.  (2013, May 1).  Retrieved July 2, 2020, from

MLA Format

"Cyber Crimes and the FBI."  1 May 2013.  Web.  2 July 2020. <>.

Chicago Style

"Cyber Crimes and the FBI."  May 1, 2013.  Accessed July 2, 2020.