There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is increasing rapidly. Estimates are that computer crime costs victims in the USA at least US$ 5×108/year, and the true value of such crime might be substantially higher. Experts in computer security, who are not attorneys, speak of "information warfare". While such "information warfare" is just another name for computer crime, the word "warfare" does fairly denote the amount of damage inflicted on society.
I have posted a separate document, Tips for avoiding computer crime, which includes suggestions for increasing the security and reliability of personal computers, as well as links to websites on computer viruses, computer crime, and anti-virus and firewall software.
Two comments on word usage in this essay:
I have posted a separate document, Tips for avoiding computer crime, which includes suggestions for increasing the security and reliability of personal computers, as well as links to websites on computer viruses, computer crime, and anti-virus and firewall software.
Two comments on word usage in this essay:
- I normally write in a gender neutral way, but here I use the masculine pronoun for computer criminals, because (a) female computer criminals are rare and (b) I can't imagine a feminist attacking me because I deny equal recognition to women criminals.
- To some professional computer programmers, the word "hacker" refers to a skilled programmer and is neither pejorative nor does it refer to criminal activity. However, to most users of English, the word "hacker" refers to computer criminals, and that is the usage that I have adopted in this essay.
I originally wrote this essay in May 1999. I do not have the spare time that would be required for a thorough search and analysis of reported cases and statutes on computer crime, as well as newspaper accounts (most criminal proceedings are resolved without generating any judicial decision that is reported in legal databases or books), so my revisions are mostly generalizations.
NEW CRIMES IN CYBERSPACE
There are three major classes of criminal activity with computers:
- unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victim's computer via the Internet through a backdoor operated by a Trojan Horse program.
- creating or releasing a malicious computer program (e.g., computer virus, worm, Trojan Horse).
- harassment and stalking in cyberspace.
OLD CRIMES
When lay people hear the words "computer crime", they often think of obscene pictures available on the Internet or solicitation of children for sex by pedophiles via chat rooms on the Internet. The legal problem of obscenity on the Internet is mostly the same as the legal problem of obscenity in books and magazines, except for some technical issues of personal jurisdiction on the Internet. I have discussed obscenity on the Internet in my May 1997 essay on law and technology and I have nothing further to say about obscenity in this essay on computer crime.
Similarly, many crimes involving computers are no different from crimes without computers: the computer is only a tool that a criminal uses to commit a crime. For example,
Similarly, many crimes involving computers are no different from crimes without computers: the computer is only a tool that a criminal uses to commit a crime. For example,
- Using a computer, a scanner, graphics software, and a high-quality color laser or ink jet printer for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.
- Stealing a laptop computer with proprietary information stored on the hard disk inside the computer is the same crime as stealing a briefcase that contains papers with proprietary information.
- Using the Internet or online services to solicit sex is similar to other forms of solicitation of sex, and so is not a new crime.
- Using computers can be another way to commit either larceny or fraud.
Helpful Links
=============================================
=============================================
“Related Topics”
==================================================
What do You Need with a Wireless Router?
Why Does My Router lose My Laptop?
How to Extend a Wireless Repeater
How to Extend a Laptop’s Wireless Pickup Distance?
My Wireless Adapter keeps Disabling
Why Do I keep Losing My Connection on a Wireless Adapter?
How to Determine the Location of a Wireless Client
How to Network two Computers Via Wireless Router
What Kind of Wireless Router Do I need for Desktop Computers?
How to Make Windows XP Download Files Faster
How to Reconfigure Windows XP to Download Faster
How to Delete Your Browser’s History
How to Increase Download Speed
How to Choose a Laptop or Notebook Computer
How to Calculate Laptop Depreciation
How long should a Laptop Last?
How to Preserve Notebook Battery Life
How Long should Laptop Computer Batteries Last
How to Recover Laptop Battery Life
How to Increase a Laptop Battery’s Life Span
How to Set up a Belkin Wireless G MIMO Router
Why Do I Need a Router & Adapter for Wireless
How to Connect a Desktop Computer to a Wireless System
How to Connect a Desktop to Wireless Internet
How to Connect a PC Via Wireless to the Internet
How to Convert Desktop to Accept Wireless Internet
How to Get Wireless Internet for Desktop PC
How to Boost the Download Speed for Windows XP
How to Clean Notebook Battery Contacts
How to Clean Print Cartridge Contacts
How to Clean Electronic PC Board Contacts
How to Keep My PC Clean
How to Take Care your Computer
How to Remove Potting Material from a PC Board
How to Clean a Circuits Board
How to Clean PC Boards
Computer Crime
Computer Crime Cases
Types of Computer Crimes
History of Computer
What is a Computer
Where to Buy Cheapest Modem
Where to Buy Cheapest Internet Connection
Where to Find Internet Signal
How to Install Internet in Desktop
What is the Best Brand of Keyboard
What is the Best Brand of Mouse
What is the Best Brand of Laptop
How to Install Cable Internet
How to Install Network Interface Card in Desktop Computer
What is Computer Hardware
Which is Better Wireless or Wired Internet
Wide Area Network Software
WAN Versus LAN
How to Network Computer in Home
How to Install Internet in Desktop
Where to Find Internet Signal
How to Install Wireless Internet on a Desktop
How to Surf the Web on Your TV
Which is Better Yahoo Messenger or MSN Messenger
What is the Best Brand of RJ-45
How to Surf the Internet Using Cellphone
What Do I need to Connect Wireless Internet?
How to Install Microsoft Office
How to Install Microsoft Word
How to Install Windows 95
How to Install Windows Vista
How to Uninstall Windows XP
Which is Better Laptop or Desktop
Best Laptop Brand
How to Surf the Internet Using Broadband
How to Install Internet in Laptop
What is the Best Brand of Modem
Wide Area Network Installation
How to Remove Undeleted Files
How to use RJ-45
How to Surf the Internet Worldwide
How to Uninstall Internet Explorer
How to Install Anti-Virus
How to Install Internet Explorer
How to Surf the Internet
How to Install Windows XP
How to Select Best Computers
The Best Brand of Computer
How to Install Firefox
Which is Good Operating System
How To Install Windows ME
How to Reformat Hard disk
How to Install Windows 98
How to Install Linux
How to Format a Computer
==================================================
No comments:
Post a Comment