You are on page 1of 3

Do-ot, Jayrhan R.

BSCRIM 2F LAB ACITIVTY 2 09-25-23

ROBBERY VS PHISHING
Robbery and phishing represent two distinct types of crimes with vastly
different methods and consequences. This paper aims to provide an in-depth
analysis of both crimes, including their nature, methods, motives, legal
consequences, and the impact on victims.

Nature of Robbery:
Robbery is a violent crime that involves the use of force, intimidation, or the
threat of violence to take property, money, or valuables from a victim. It is
typically a physical act that occurs in a real-world setting, such as a street,
store, or home invasion.

Robbers employ various methods, including:


1. Armed Robbery: Offenders use weapons like firearms, knives, or blunt
objects to threaten or harm victims.
2. Strong-arm Robbery: Physical force or violence is used to overpower victims
without weapons.
3. Bank Robbery: Criminals target banks, often with disguises and weapons,
demanding money from tellers.

The motives behind robbery vary but often include:


1. Financial Gain: Many robbers commit the crime to obtain cash, jewelry, or
other valuables.
2. Drug Addiction: Some robbers are motivated by substance addiction and
need money for drugs.
3. Desperation: Economic hardship or desperation may lead individuals to
resort to robbery as a last resort.

Legal Consequences-Robbery is a serious criminal offense in most jurisdictions,


resulting in severe legal consequences. Penalties may include long prison
sentences, fines, or both, with the severity determined by factors like the use
of weapons and the extent of violence.

The impact on robbery victims can be traumatic, leading to physical injuries,


emotional distress, and long-term psychological effects. Victims often require
support for recovery, and some may suffer from post-traumatic stress disorder
(PTSD).
Nature of phishing:
Phishing is a cybercrime that involves the use of deceptive emails, messages,
or websites to trick individuals into revealing sensitive information, such as
login credentials, financial details, or personal data.

Phishing attacks encompass various methods, including:


1. Email Phishing: Attackers send fraudulent emails posing as legitimate
entities to extract information.
2. Spear Phishing: Highly targeted emails are crafted, often impersonating
trusted individuals or organizations.
3. Phishing Websites: Criminals create fake websites mimicking legitimate sites
to collect user data.

Phishers are primarily motivated by financial gain and may use stolen
information for various purposes, including:
1. Identity Theft: Obtaining personal information to commit identity fraud or
financial theft.
2. Credential Theft: Capturing login credentials for unauthorized account
access.
3. Ransom: Some phishers demand ransom payments in exchange for stolen
data or threatened exposure.

Phishing is illegal in most countries and can lead to substantial legal


consequences, including imprisonment, fines, and civil liability if victims suffer
financial losses.

Phishing victims often experience financial losses, identity theft, and potential
damage to their reputation. Recovering stolen assets and mitigating the
consequences can be challenging, requiring legal and financial assistance.

Case studies:
1.Robbery Case: The "Pizza Delivery Robbery" In a real-life case, a pizza
delivery driver was robbed at gunpoint while making a delivery. The offender
fled with the driver's cash and the pizza. The robber was apprehended,
convicted of armed robbery, and sentenced to prison.

2.Phishing Case: The "Business Email Compromise (BEC)" In a BEC phishing


attack, cybercriminals targeted a corporation's financial department,
sending emails posing as the CEO requesting a substantial wire transfer. The
company fell victim to the scam, losing millions of dollars. The perpetrators,
operating from overseas, remain at large.
Robbery and phishing are fundamentally different crimes in terms of their
nature and execution. While robbery involves physical violence and
intimidation, phishing leverages deception in the digital realm. Both crimes
have severe legal consequences and significant impacts on victims,
emphasizing the importance of prevention, awareness, and law enforcement
efforts.
REFERENCES:
Bureau of Justice Statistics. (2021). Robbery. https://www.bjs.gov/

Cybersecurity & Infrastructure Security Agency (CISA). (2021). Phishing.


https://www.cisa.gov/phishing

The New York Times. (2018). Business Email Compromise: The $3.1 Billion
Scam. https://www.nytimes.com/2018/05/19/business/business-email-
compromise-scams.html

You might also like