Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
The internet offers new capabilities for users on a global scale. Although easily accessible, some of these capabilities are deemed offensive and violate real-world laws.
Sharing personal information of another person or Doxxing is a serious offense as it opens the door for identity theft. It is a deliberate action to weaken a person’s ability to protect themselves and their private information. Likewise, collecting information on underage users violates the Children’s Online Protection Act and can be considered an act of endangering a child.
Committing an act of Cyberbullying, stalking, harassment or direct offensive behavior online violates 18 U.S. Code § 875 Interstate Communications law detailing the consequences of transmitting threats to kidnap or threaten the life of another person (justice.gov, 2020). Threatening the life of another person should be treated the same as an in-person case. I would also include the use of offensive cyber operations including committing a denial of service attack. Not only could it be considered stealing but it could lead to damages beyond the scope of what financial compensation could fix. This is most notable for critical infrastructures that run their business with reliance on internet connectivity.
The author describes that making illegal internet searches is offensive as well. While I agree that seeking knowledge into committing an illegal act or finding where to access illegal material should be investigated; I would like to include the creation of illegal material on the internet as a serious offense. Trolling online by posting fake links is a common practice, but the creation of questionable material can put an innocent user at risk of exposure. Questionable online material should be monitored, even when under the guise of educating the public. While this can fall into the debate of censorship, I believe the objective of the material should determine the legality of it and whether it should be removed entirely.
Using another person’s internet can be considered theft; however, what makes this a bigger concern is the dangers an unknown system on a network can pose. To access a network unknowingly, a password must have been breached whether on the access point or remote accessing a user’s system. This would be similar to making a copy of someone’s house or car key and using it without the owner’s knowledge. Accessing a network without permission could also be considered trespassing on private property with the capability to put the owners in danger.
1069. overview of pertinent provisions-interstate and foreign extortion. Justice Manual | 1069. Overview of Pertinent Provisions-Interstate and Foreign Extortion | United States Department of Justice. (2020, January 21). https://www.justice.gov/archives/jm/criminal-resource-manual-1069-overview-pertinent-provisions-interstate-and-foreign-extortion#:~:text=Section%20875%20of%20Title%2018,a%20threat%20to%20injure%20the