Computer Crime 13829 Essay Example
Computer Crime 13829 Essay Example

Computer Crime 13829 Essay Example

Available Only on StudyHippo
  • Pages: 7 (1670 words)
  • Published: November 20, 2018
  • Type: Paper
View Entire Sample
Text preview

The increase in computer crimes, which have grown in both quantity and variety, necessitates the implementation of laws. Over the past two decades, computers have become an essential part of society. They are extensively used in sectors such as airlines, banking, industry, and businesses. This widespread adoption is primarily due to people using computers at home and work.

The motivation behind computer crimes is often attributed to a decline in ethical standards rather than economic necessity. Experts suggest that these crimes only display bias based on gender. Non-professional thieves engaging in computer crimes come from diverse backgrounds including all races, age groups, and economic levels. These criminals typically possess a certain level of honesty as they are usually in positions of trust; very few are willing to harm others. Most do not consider their actions truly dishonest.

While most perpetrators are males,

...

historically women have played accomplice roles but are now becoming more aggressive themselves. Computer criminals generally fall between the ages of 14-30 and are described as bright, eager, highly motivated individuals who enjoy taking on technical challenges (Shannon 16:2). However, it is important not to separate them too much from "normal" individuals (Sharp 18:3). Consequently, it is believed that computer criminals and potential victims share certain characteristics but take different paths (Blumenthal 1:2).The range of computer criminals is vast, including individuals of any age, race, and physical attributes (Blumenthal, 1:2). As the use and misuse of computers has expanded into new areas, the definition of computer crime has changed (2600:Summer 92, p.13). Initially, when computers were introduced to businesses, computer crime was primarily seen as white-collar crime within a computer system (2600:Summer 92, p.13). Ove

View entire sample
Join StudyHippo to see entire essay

time, new terms have been introduced for computer criminals. A "Trojan Horse" refers to hidden code in a program and "logic bombs" are used to avoid being physically present during an act (Phrack 12, p.43). Another example is "salamis," named after loaves sold in delis where people would take small bites and secretly return them to shelves unnoticed (Phrack 12,p.44). Congress responded by passing a bipartisan bill that makes hacking into federally protected databases a federal crime (Markoff,B 13:1). This bill establishes different categories of misdemeanors and felonies for unauthorized access to acquire money,goods,services or classified information on a federal level.The text discusses computer crimes and the risks associated with them, particularly in relation to computers used by the federal government or involved in interstate or foreign commerce. It highlights that computer crimes often require more expertise than people realize. Many American businesses have unknowingly become victims of disgruntled employees, leading to bankruptcy court. However, there is hope that the computer security nightmare will eventually fade away like a fairy tale. The field of information processing has grown into a massive industry, generating $33 billion in services in 1983 and reaching $88 billion by 1988 (Blumenthal, B 1:2). Information is at risk from various sources such as greedy employees, nosy teenagers, and general carelessness. The magnitude of computer crimes remains uncertain, with some suggesting it is as small as the Gulf of Mexico or as vast as the North Atlantic. Vulnerability is expected to increase in the future. Furthermore, it is predicted that most computer software will be purchased from vendors instead of being developed internally by the turn of the century, making theft easier

due to standardized software. Operation Sun-Devil was a two-year-long secret service investigation targeting companies nationwide and resulting in numerous seizures. Critics argue that similar to FBI operations, Operation Sun-Devil conducted unreasonable searches and seizures and violated individuals' constitutional rights while disrupting their lives and livelihoods.
An individual affected by the operation, known as operation Sun Devil, talks about how it completely transformed their life. They had to face charges and go through a court trial. However, they express gratitude towards 2600 magazine and Emmanuel Goldstein for publishing their story. In an interview with Steve Jackson, another hacker involved in the operation, he acknowledges the support received from fellow hackers and the Electronic Frontier Foundation who helped cover most of the legal fees. This enabled them to fight for their rights. The case of Steve Jackson Games vs.Secret Service is still pending a verdict but is expected to be reached soon. As part of this case, all computer materials belonging to Steve Jackson were confiscated by the Secret Service. These materials were crucial for his livelihood. He was accused of operating an underground hacking system and faced allegations that his games contained instructions on how to commit computer crimes. Reflecting on this situation, he mentions that he always emphasized that his game was just a game and served as an outlet for expressing anger through storytelling. He never anticipated that Hacker (Steve Jackson's game) would lead to such a problem. The biggest challenge he encountered was when the Bulletin Board System (BBS) was seized, forcing him to make significant cuts in staff which resulted in laying off eight out of eighteen employees.
"If the Secret Service had issued

a subpoena, we could have easily provided access to or duplicated all files within the building for them," stated Steve Jackson in an interview. Computer professionals not only grapple with concerns regarding freedom of speech and civil liberties but also bear the responsibility of educating the public and media on how to differentiate between online computer experimenters. They emphasize that although computer networks and their consequences constitute a new form of crime, they are still safeguarded by existing laws and freedoms applicable to any other real-world domain.

An instance involves a 14-year-old boy who connects his home computer to a television line and gains unauthorized entry into his neighborhood bank's system, transferring funds into his personal account. This act is gaining popularity, giving rise to a new mythology portraying computer criminals as modern-day "Butch Cassidys." These stories draw inspiration from actual cases involving computer capers. Computer crimes encompass more than just offenses against the computer itself; they also result in theft of money, information, software, benefits, welfare, among other valuable assets. The average cost incurred due to a computer crime amounts to approximately $0.5 million, demonstrating how sophisticated computer crimes can severely disrupt entire industries. Swindling or monetary theft represents one prevalent manifestation of such crimes which can assume various forms.The Wells Fargo Bank discovered that one of its employees had used the bank's computer to embezzle $21.3 million, which became the largest electronic bank fraud in U.S. history. This incident exemplifies computer crime and instills fear in many people. Another form of computer crime is credit card scams, which a well-known hacker named Raven engages in by accessing credit databases using his computer. During our

conversation, Raven attempted to explain his actions and methods. A highly intelligent individual illegally gained access to a credit database and obtained the credit history of local residents. Using their names and credit information, this individual applied for 24 Mastercards and Visa cards, subsequently withdrawing at least $40,000 in cash from various ATMs. Although caught for a minor larceny of $200 before, they were unable to prove involvement in other incidents resulting in probationary sentence only. In an interview, this person admitted being taught by the underground community at 17 when needing money but expressed no remorse for their actions as they acknowledged the importance of evading capture as the leader of HTH (High Tech Hoods) group actively seeking new methods for making money through their exceptional computer skills that shaped their current life journey.One form of computer theft is the theft of computer time, which Congress considers a crime. However, this type of theft is often overlooked by individuals. Excessive or inappropriate usage of computers can occur even though people are encouraged to use them daily. For instance, university students and faculty may use computer time for legitimate purposes like computerizing mailing lists for their church or fraternity organizations. This can be seen as good public relations. On the other hand, using university computers for personal consulting projects without payment is clearly improper.

Similar situations arise in the business world regarding employee behavior. Management tends to ignore activities like playing computer games or creating personal calendars. However, if these actions become excessive, employees are essentially wasting work time and stealing from the company.

Moreover, computers have limitations in terms of multitasking abilities. While these activities may

not be as severe compared to other computer crimes, they can still lead to significant financial loss for businesses.

Currently, there is a strong focus on criminal aspects related to computer abuses. Nevertheless, it's essential to acknowledge that civil action will also greatly impact long-term security issues (Alexander V119).The discussion of computer crimes emphasizes the importance of addressing the civil or liability aspects in computing environments. It is expected that there will be a rise in both individual and class action lawsuits related to such crimes. However, legal measures to combat these offenses have been slower to develop compared to the rapid evolution of technology. While some states have implemented legislation targeting computer crime, it remains a national issue that requires a nationwide solution.

To prevent these types of crimes, industries should establish controls such as hardware identification and access control software. Additionally, critical bank applications should be disconnected when not in use. It is crucial to acknowledge that computers themselves do not commit crimes; rather, it is individuals who are accountable for their actions. Therefore, those responsible for protecting the system are at a disadvantage if they are unaware of potential threats. Implementing proper internal controls can help minimize opportunities for fraud.


, . "Crackdown on Computer Capers,"

, "Hackers Indicted

on Spy Charges"., Dec.8, 1992, B, 13:1.

, and ."Don't Rely on the Law to Stop Computer Crime," , Dec.19, 1984, .

issues 1-46.Compiled by and .

, "The Happy Hacker"., Mar.21, 1993, 7, 16:2.

, "The Hacker Crackdown"., Dec.20, 1992, 7, 18:3.

, "U.S. Charges Young Hackers"., Nov.15, 1992, 1,
40:4.

<2600: The Hacker Quarterly>.Issues Summer
92-Spring
93.Compiled by Emmanuel Goldstein.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New