Monday, August 1, 2011

Computer Crime


There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is increasing rapidly. Estimates are that computer crime costs victims in the USA at least US$ 5×108/year, and the true value of such crime might be substantially higher. Experts in computer security, who are not attorneys, speak of "information warfare". While such "information warfare" is just another name for computer crime, the word "warfare" does fairly denote the amount of damage inflicted on society.

I have posted a separate document, Tips for avoiding computer crime, which includes suggestions for increasing the security and reliability of personal computers, as well as links to websites on computer viruses, computer crime, and anti-virus and firewall software.

Two comments on word usage in this essay:
  1. I normally write in a gender neutral way, but here I use the masculine pronoun for computer criminals, because (a) female computer criminals are rare and (b) I can't imagine a feminist attacking me because I deny equal recognition to women criminals.
  2. To some professional computer programmers, the word "hacker" refers to a skilled programmer and is neither pejorative nor does it refer to criminal activity. However, to most users of English, the word "hacker" refers to computer criminals, and that is the usage that I have adopted in this essay.

I originally wrote this essay in May 1999. I do not have the spare time that would be required for a thorough search and analysis of reported cases and statutes on computer crime, as well as newspaper accounts (most criminal proceedings are resolved without generating any judicial decision that is reported in legal databases or books), so my revisions are mostly generalizations.

NEW CRIMES IN CYBERSPACE

There are three major classes of criminal activity with computers:
  1. unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victim's computer via the Internet through a backdoor operated by a Trojan Horse program.
  2. creating or releasing a malicious computer program (e.g., computer virus, worm, Trojan Horse).
  3. harassment and stalking in cyberspace.

OLD CRIMES

When lay people hear the words "computer crime", they often think of obscene pictures available on the Internet or solicitation of children for sex by pedophiles via chat rooms on the Internet. The legal problem of obscenity on the Internet is mostly the same as the legal problem of obscenity in books and magazines, except for some technical issues of personal jurisdiction on the Internet. I have discussed obscenity on the Internet in my May 1997 essay on law and technology and I have nothing further to say about obscenity in this essay on computer crime.

Similarly, many crimes involving computers are no different from crimes without computers: the computer is only a tool that a criminal uses to commit a crime. For example,
  • Using a computer, a scanner, graphics software, and a high-quality color laser or ink jet printer for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.
  • Stealing a laptop computer with proprietary information stored on the hard disk inside the computer is the same crime as stealing a briefcase that contains papers with proprietary information.
  • Using the Internet or online services to solicit sex is similar to other forms of solicitation of sex, and so is not a new crime.
  • Using computers can be another way to commit either larceny or fraud. 



Helpful Links
 =============================================
 Cheapest Hosting Plan at Hostbig          
 Latest Movie Preview                                     
 =============================================




“Related Topics”

==================================================

What do You Need with a Wireless Router?

Why Does My Router lose My Laptop?

How to Extend a Wireless Repeater

How to Extend a Laptop’s Wireless Pickup Distance?

My Wireless Adapter keeps Disabling

Why Do I keep Losing My Connection on a Wireless Adapter?

How to Determine the Location of a Wireless Client

How to Network two Computers Via Wireless Router

What Kind of Wireless Router Do I need for Desktop Computers?

How to Make Windows XP Download Files Faster

How to Reconfigure Windows XP to Download Faster

How to Delete Your Browser’s History

How to Increase Download Speed

How to Choose a Laptop or Notebook Computer

How to Calculate Laptop Depreciation

How long should a Laptop Last?

How to Preserve Notebook Battery Life

How Long should Laptop Computer Batteries Last

How to Recover Laptop Battery Life

How to Increase a Laptop Battery’s Life Span

How to Set up a Belkin Wireless G MIMO Router

Why Do I Need a Router & Adapter for Wireless

How to Connect a Desktop Computer to a Wireless System

How to Connect a Desktop to Wireless Internet

How to Connect a PC Via Wireless to the Internet

How to Convert Desktop to Accept Wireless Internet

How to Get Wireless Internet for Desktop PC

How to Boost the Download Speed for Windows XP

How to Clean Notebook Battery Contacts

How to Clean Print Cartridge Contacts

How to Clean Electronic PC Board Contacts

How to Keep My PC Clean

How to Take Care your Computer

How to Remove Potting Material from a PC Board

How to Clean a Circuits Board

How to Clean PC Boards

Computer Crime

Computer Crime Cases

Types of Computer Crimes

History of Computer

What is a Computer

Where to Buy Cheapest Modem

Where to Buy Cheapest Internet Connection

Where to Find Internet Signal

How to Install Internet in Desktop

What is the Best Brand of Keyboard

What is the Best Brand of Mouse

What is the Best Brand of Laptop

How to Install Cable Internet

How to Install Network Interface Card in Desktop Computer

What is Computer Hardware

Which is Better Wireless or Wired Internet

Wide Area Network Software

WAN Versus LAN

How to Network Computer in Home

How to Install Internet in Desktop

Where to Find Internet Signal

How to Install Wireless Internet on a Desktop

How to Surf the Web on Your TV

Which is Better Yahoo Messenger or MSN Messenger

What is the Best Brand of RJ-45

How to Surf the Internet Using Cellphone

What Do I need to Connect Wireless Internet?

How to Install Microsoft Office

How to Install Microsoft Word

How to Install Windows 95

How to Install Windows Vista

How to Uninstall Windows XP

Which is Better Laptop or Desktop

Best Laptop Brand

How to Surf the Internet Using Broadband

How to Install Internet in Laptop

What is the Best Brand of Modem

Wide Area Network Installation

How to Remove Undeleted Files

How to use RJ-45

How to Surf the Internet Worldwide

How to Uninstall Internet Explorer

How to Install Anti-Virus

How to Install Internet Explorer

How to Surf the Internet

How to Install Windows XP

How to Select Best Computers

The Best Brand of Computer

How to Install Firefox

Which is Good Operating System

How To Install Windows ME

How to Reformat Hard disk

How to Install Windows 98

How to Install Linux

How to Format a Computer


==================================================



No comments:

Post a Comment