This essay Computers and Crime has a total of 1875 words and 9 pages.
Computers and Crime
Computers are used to track reservations for the airline industry,
process billions of dollars for banks, manufacture products for industry, and
conduct major transactions for businesses because more and more people now have
computers at home and at the office.
People commit computer crimes because of society\'s declining ethical
standards more than any economic need. According to experts, gender is the only
bias. The profile of today\'s non-professional thieves crosses all races, age
groups and economic strata. Computer criminals tend to be relatively honest and
in a position of trust: few would do anything to harm another human, and most
do not consider their crime to be truly dishonest. Most are males: women have
tended to be accomplices, though of late they are becoming more aggressive.
Computer Criminals tend to usually be "between the ages of 14-30, they are
usually bright, eager, highly motivated, adventuresome, and willing to accept
technical challenges."(Shannon, 16:2) "It is tempting to liken computer
criminals to other criminals, ascribing characteristics somehow different from
\'normal\' individuals, but that is not the case."(Sharp, 18:3) It is believed
that the computer criminal "often marches to the same drum as the potential
victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual
profile of a computer criminal because they range from young teens to elders,
from black to white, from short to tall.
Definitions of computer crime has changed over the years as the users
and misusers of computers have expanded into new areas. "When computers were
first introduced into businesses, computer crime was defined simply as a form of
white-collar crime committed inside a computer system."(2600:Summer 92,p.13)
Some new terms have been added to the computer criminal vocabulary.
"Trojan Horse is a hidden code put into a computer program. Logic bombs are
implanted so that the perpetrator doesn\'t have to physically present himself or
herself." (Phrack 12,p.43) Another form of a hidden code is "salamis." It
came from the big salami loaves sold in delis years ago. Often people would
take small portions of bites that were taken out of them and then they were
secretly returned to the shelves in the hopes that no one would notice them
Congress has been reacting to the outbreak of computer crimes. "The U.S.
House of Judiciary Committee approved a bipartisan computer crime bill that was
expanded to make it a federal crime to hack into credit and other data bases
protected by federal privacy statutes."(Markoff, B 13:1) This bill is
generally creating several categories of federal misdemeanor felonies for
unauthorized access to computers to obtain money, goods or services or
classified information. This also applies to computers used by the federal
government or used in interstate of foreign commerce which would cover any
system accessed by interstate telecommunication systems.
"Computer crime often requires more sophistications than people realize
it."(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court
unaware that they have been victimized by disgruntled employees. American
businesses wishes that the computer security nightmare would vanish like a fairy
tale. Information processing has grown into a gigantic industry. "It accounted
for $33 billion in services in 1983, and in 1988 it was accounted to be $88
billion." (Blumenthal, B 1:2)
All this information is vulnerable to greedy employees, nosy-teenagers
and general carelessness, yet no one knows whether the sea of computer crimes is
"only as big as the Gulf of Mexico or as huge as the North Atlantic."
(Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by
the turn of the century, "nearly all of the software to run computers will be
bought from vendors rather than developed in houses, standardized software will
make theft easier." (Carley, A 1:1)
A two-year secret service investigation code-named Operation Sun-Devil,
targeted companies all over the United States and led to numerous seizures.
Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which
have almost a similar operation, have conducted unreasonable search and seizures,
they disrupted the lives and livelihoods of many people, and generally conducted
themselves in an unconstitutional manner. "My whole life changed because of
that operation. They charged me and I had to take them to court. I have to
thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the
fellow hackers and fellow hackers and the Electronic Frontier Foundation for
coming up with the blunt of the legal fees so we could fight for our rights."
(Interview with Steve Jackson, fellow hacker, who was charged in operation Sun
Devil) The case of Steve Jackson Games vs. Secret Service has yet to
Computer CrimeComputer Crime Computer crimes need to be prevented and halted thought increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace: Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and a phone line. Increasing instances of white-collar crime involve computers as more businesses automate and information becomes an important asset
Computer Crime In The 1990'sComputer Crime In The 1990\'s We\'re being ushered into the digital frontier. It\'s a cyberland with incredible promise and untold dangers. Are we prepared ? It\'s a battle between modern day computer cops and digital hackers. Essentially just think what is controlled by computer systems, virtually everything. By programming a telephone voice mail to repeat the word yes over and over again a hacker has beaten the system. The hacker of the 1990\'s is increasingly becoming more organized very clea
Hacking to PeacesHacking to Peaces The Information Superhighway possesses common traits with a regular highway. People travel on it daily and attempt to get to a predetermined destination. There are evil criminals who want to violate citizens in any way possible. A reckless driver who runs another off the road is like a good hacker. Hacking is the way to torment people on the Internet. Most of the mainstream hacking community feel that it is their right to confuse others for their entertainment. Simply stated,
Laurie Fournier Laurie Fournier Professor Caitlin Murphy Effective communication 8 March 2017 The worst side of human nature October 2012, 15-year-old Amanda Todd committed suicide at her home in Port Coquitlam, after she had posted a video on YouTube in which she used a series of flash cards to tell her experience of being blackmailed into exposing her breasts via webcam. She was attacked anonymously by hundreds of people through messages like Go kill yourself, and, Why are you still alive? Maybe we nee
Computer CrimeComputer Crime Computer crime is a very broad term. It could mean anything from a total invasion by a hacker into the federal government or just the simple fact of one person letting another borrow a copy of his favorite flying game. Computers are defined in the dictionary as a machine that computes (WBD vol. 23). But to most people it is a machine that\'s helps us do a task easier. As we move into the 21th century though one thing is for sure, the computer will help crime become more prevalent.