Over the years computer technology has advanced rapidly to the point where someone or something could be in your computer without you even knowing this does affect how cybercriminals operate when trying to hack into someone’s computer to steal their information or to gain other personal details about their life so that they can improve their own. The first example of how cyber technology has been able to impact the interactions between the offenders and the victims is that one offender can attack multiple victims in a very short amount of time and in most cases can attack multiple victims simultaneously. This means that there are more opportunities for the offender to damage people’s lives and to steal their information oftentimes without that individual even realizing that they are being taken advantage of or being compromised. another way that cybertechnology has impacted interactions between offenders and victims is in the case of a ransom cybertechnology can be used 2 alter the natural voice of the offender so that they cannot be traced or recognized. Cybertechnology also gives the offenders in advantage because if the offender knows enough about cyber technology they can find ways to cloak their location and or to elude authorities for an extended period of time this allows them to then continue their rampage damaging countless lives and compromising data and information that is viewed as sensitive in nature. Another way cybertechnology impacts the victims and offenders could be by way of an inside job if the offender is a trusted member of an organization that has recently turned disgruntled or is a mole that was planted there by an enemy of the organization the consequences can be devastating. in most cases of corporate espionage the offender goes unnoticed compromising loads of sensitive data and information for their own personal gain or for the gain of an opposing entity for a very long period of time. This breach is the hardest to detect just by the nature of cyber security itself. Cyber technology however has made it easier to detect when someone is engaging in inappropriate activities using company computers . This is why cyber security engineers have created ways for protocol to follow a hierarchy of who is allowed to see what this cuts back on potential for security breaches from within.