Skip to content

Unveiling Technologically Advanced Transgressions: A Look Beyond Traditional Hacking

Individuals envisioning advanced criminal activity often imagine figures huddled behind multiple computer screens in a dimly lit space, frantically typing away.

Unanticipated Technology-driven Misdeeds Exempting Digital Intrusions
Unanticipated Technology-driven Misdeeds Exempting Digital Intrusions

Unveiling Technologically Advanced Transgressions: A Look Beyond Traditional Hacking

In the modern world, technology has become an integral part of our lives, and with this integration comes the rise of high-tech crimes. These crimes, however, are not always limited to hacking. In fact, a significant number of high-tech crimes do not require breaking into computer systems via hacking techniques.

A recent example of such a crime is the case of Michael Smith, a U.S. musician, who is accused of using AI to create thousands of songs and repeatedly streaming them on various music platforms. The alleged aim was to make more than $10 million in royalty payments.

Another instance is the conviction of Nikita Uvarov, a 16-year-old Russian, who was sentenced to five years in prison in 2022 for training for terrorist activities. His alleged training involved the use of the video game Minecraft.

High-tech crimes without hacking can be broadly categorized as cyber-enabled crimes such as cyberstalking, fraud, identity theft, online harassment, and insider threats involving unauthorized misuse of access or information.

Cyberstalking, for instance, involves using online platforms to threaten, monitor, or send repeated unwanted messages to harass or frighten a person. Financial fraud through online manipulation includes fake online stores that steal credit card details without delivering products or social engineering scams to trick victims into revealing financial information.

Identity theft involves using stolen personal information to impersonate someone for financial gain, such as applying for loans or credit cards fraudulently. Online harassment and hate crimes use the internet to discriminate or harass individuals based on race, gender, or religion, such as targeted cyberbullying campaigns.

Intellectual property theft involves illegally using a competitor’s software code or trade secrets without authorization. This can be done by insider employees without directly hacking systems. Insider crimes without traditional hacking also include employees misusing their access or stealing sensitive information physically or by abusing their authorized access.

Trade secrets theft by employees involves an insider persuading others for access and siphoning off sensitive corporate files without unauthorized hacking, such as the case where an employee tampered with industrial control systems by using valid credentials.

In a different realm, Steve Kramer, a political consultant, was ordered to pay a six million dollar fine and faced 26 criminal charges for using AI to recreate the voice of U.S. President Joe Biden and using it in phone calls to try and influence voters, breaking caller ID laws.

Blake Ellison-Crate, serving 12 years for firearms offenses, directed a 3D-printed gun operation from his cell using a smuggled cell phone in Winnipeg, Canada. The operation was discovered when associates approached metal fabricators about producing the parts they could not print, and some fabricators warned the police.

Navinder Sarao, a London-based trader, made around $40 million in five years by manipulating financial markets using special software to place thousands of fake orders on the Chicago Mercantile Exchange, causing a global financial crash in 2010 that wiped $1 trillion off the value of U.S. stocks in less than an hour.

In a more unusual case, 81-year-old Arthur "Jack" Schubarth was sentenced to six months in federal prison for illegally importing a Marco Polo sheep to clone it and create a larger hybrid breed for sale.

Lastly, Christopher Naples, an IT supervisor, was charged with public corruption, grand larceny, computer trespass, and official misconduct in 2021 for mining crypto coins at his workplace, Suffolk County Clerk's Office, using 46 hidden devices that raised the temperature in some rooms by up to 20 degrees and cost an estimated $4,200 per month in electricity bills.

These examples underscore the importance of understanding and addressing the various forms of high-tech crimes, both those involving hacking and those that do not. As technology continues to evolve, so too will the methods used by criminals, making it crucial for law enforcement and the public to stay vigilant and informed.

Mohamad Al-Bared, a mechanical engineering graduate, was found guilty of preparing for terrorism in 2023. British police found a 3D-printed drone in his home, capable of carrying explosives or chemicals, marking another instance of the intertwining of technology and crime.

[1] Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). Common Cyber Threats. Retrieved March 25, 2023, from https://www.cisa.gov/publication/common-cyber-threats

[2] Federal Bureau of Investigation (FBI). (n.d.). Insider Threats. Retrieved March 25, 2023, from https://www.fbi.gov/investigate/cyber/insider-threats

  1. High-tech crimes extend beyond hacking and cyberattacks; they can involve using AI for creative acts like generating music for profit or impersonating voices for deception.
  2. Cyberstalking, financial fraud, identity theft, online harassment, and intellectual property theft are common cyber-enabled crimes in the digital age, often exploiting technology in subtle ways.
  3. Insider crimes can occur when employees misuse access or steal information, such as creating a 3D-printed gun operation from a cell phone in prison or mining crypto coins at work.
  4. The intertwining of technology and crime is not limited to the digital realm; cases like cloning animals or using drones for terrorist activities demonstrate this interconnection. Understanding and addressing these varied forms of high-tech crimes is crucial for maintaining security in an evolving technological landscape.

Read also:

    Latest