Search icone
Search and publish your papers

Case of Vasiliy Gorshkov and Alexey Ivanov

Or download with : a doc exchange

About the author

General public

About the document

Published date
documents in English
case study
2 pages
General public
3 times
Validated by
0 Comment
Rate this document
  1. Overview
  2. Introduction
  3. Case study
  4. Analysis of case study
  5. Impact of case study on subsequent cybercrime investigation
  6. Conclusion

There have been reports of computer crimes of late in the news and the surprising realization is that children are becoming criminal masterminds online. There are readily available hacker tools that can be used by unskilled people to wreak havoc for financial gain or just for fun. The disturbing reality is that many people are not aware they are actually committing a crime until it is too late. This has been a serious problem for teachers, parents, governments and businesses trying to work hard to protect children and the general public from online threats. The best way to protect people from computer crime is by letting them understand what computer crime is all about. Computer crime can be viewed in three ways. The first one is attacking computers of other people by spreading malicious viruses. The second one is using a computer as a weapon to commit crime like illegal gambling or fraud. The third one is storing information in a computer illegally.

In this case study of Vasiliy Gorshkov and Alexey Ivanov we are going to examine whether the FBI investigative techniques went too far in apprehending the two Russian cyber criminals. In addition to this, we will also investigate how the FBI used the law to apprehend the cyber criminals and whether their actions should stand scrutiny under the current U.S. cyber law. Furthermore, more case studies will be examined and the impact of cybercrime investigations of non-U.S. citizens will be discussed and analyzed. The overview has looked at what computer crime is all about and the definition can summarize computer crime as attacking computers of other people by spreading malicious viruses, using a computer to commit crime, and storing illegal information on a computer.

Top sold for educational studies

The impact of the marketing environment: Greggs

 Social studies   |  Educational studies   |  Case study   |  07/06/2015   |   .doc   |   8 pages

Compare and contrast essay: Apocalypse Now and Full Metal Jacket, two views on the Vietnam war

 Social studies   |  Educational studies   |  Case study   |  09/05/2012   |   .doc   |   4 pages

Recent documents in educational studies category

Individual differences in second language learning

 Social studies   |  Educational studies   |  Presentation   |  04/16/2019   |   .doc   |   2 pages

Legacy preference in America

 Social studies   |  Educational studies   |  Presentation   |  06/08/2018   |   .doc   |   7 pages