
ILLEGAL ASPECTS OF THE WEB
The Deep Web has many aspects to it as it has been previously stated (see "Law" tab). One of the most important to keep in mind is that of internet crime. In a simple definition it is crime (illegal activities) that are committed over the internet. Nevertheless, there are internet crimes that are not rooted only in the cyber world. Many of these crimes start in the real world and move to the cyber world or vise versa. In sum, there is a fine line between the two and anyone can blur it.
One of the biggest issues with this type of crimes is that our government has yet to get caught up with the power of the internet or world wide web. There is no clear definition about whom is the supposed to patrol certain sites or activities and the anonymity of the using the internet makes it harder to catch and stop criminals. Even if they create new laws or policies to govern the cyber world, professional hackers or those who know their way around the internet can find ways over security walls or other security settings.
In addition, it is easier for people to become victims to cyber/internet crimes because most of them cannot or do not understand how their activity is archived in the cyber world. We have all heard the saying that once something goes on the internet there is no way to remove It. We put our information into new sites and use different computers because we do not think that anybody would be there to take or steal our information, but there are people out their who feed off the ignorant.
The following crimes are those that prevail in the cyber world.
Assault
Cyber Bullying
Cyber Bullying is bullying, but through the internet. Bullying takes places when one person or people, pick on another person by posting about them or attacking them through their own social media pages. Most of the time the person being bullied is being bullied outside of the internet as well. Cyber bullying is also a great example of law enforcement not being caught up with the internet. In the case of Megan Meier, an adult women created a fake profile of a young boy to bully and harass Megan, causing her to commit suicide. However, since their were not laws addressing this issue the woman was not charged with a any crime.
Cyberstalking
Using the internet to follow a person's actions or come into contact with them in most cases in order to harm them. This other person does not want contact with the person.
Online sexual exploitation of children
When child predators use the internet to come into contact with children, in most cases the children do not know exactly who they are talking to. This could be through online chatrooms or fake online social media profiles.
Online Fraud
Auction Fraud
The action where an individual buys an item online; however, they do not receive the item that was describe.
Lottery scams
You won a trip for four to Disney Land! The act of an individual or group of individuals creating fake sweepstakes where they contact the individual via email or phone and announce to them that they have one a great prize such as a trip to Disney Land. However, they ask the for victims information and once they have the information they use it to conduct illegally activities such as getting into their bank account.
Nigerian Schemes
When an individual from another country contacts a possible victim and promises a large quantity of money; however, in return for a smaller quantity of money.
Phishing
When an individual or group of indviduals act like a legitimate business and try to get information from indviduals such as their bank account numbers or other personal information. This can be done through email or phone calls.
Online Intrusion
Identity theft
A crime where people steal your personal information such as bank account information and use them for their own personal use.
Online Piracy
Illegal downloading, sharing, intellectual property. Probably the most common because some of us do it without even realizing that we are committing a crime. Copyright laws are broken every day by using websites and software such as Limewire.
Article used to identifty the types of crimes: Henson, B. Reyns, B., & Fisher, B., (2011).