StudyBoss » Computer » Computer Crime Report

Computer Crime Report

A young man sits illuminated only by the light of a computer screen. His
fingers dance across the keyboard. While it appears that he is only word
processing or playing a game, he may be committing a felony.

Penalties for committing computer crime range from a class B misdemeanor to a class B felony. The severity of the penalty is determined based on the monetary value of the damages inflicted. (2) The law has not always had much success stopping computer crime. In 1990 there was a nationwide crackdown on illicit computer hackers, with arrests, criminal charges, one dramatic show-trial, several guilty pleas, and huge confiscations of data and equipment all over the USA. The Hacker Crackdown of 1990 was larger, better organized, more deliberate, and more resolute than any previous efforts.

The U. S. Secret Service, private telephone security, and state and local law enforcement groups across the country all joined forces in a determined attempt to break the back of America’s electronic underground. It was a fascinating effort, with very mixed results. In 1982, William Gibson coined the term “Cyberspace”. Cyberspace is defined as “the “place” where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk… The place between the phones. The indefinite place out there. ” (1, p. 1) The words “community” and “communication” share the same root.

Wherever one allows many people to communicate, one creates a community. “Cyberspace” is as much of a community as any neighborhood or special interest group. People will fight more to defend the communities that they have built then they would fight to protect themselves. This two-sided fight truly began when the AT&T telephone network crashed on January 15, 1990. The crash occurred due to a small bug in AT&T’s own software. It began with a single switching station in Manhattan, New York, but within ten minutes the domino effect had brought down over half of AT&T’s network.

The rest was verloaded, trying to compensate for the overflow. This crash represented a major corporate embarrassment. Sixty thousand people lost their telephone service completely. During the nine hours of effort that it took to restore service, some seventy million telephone calls went uncompleted. Because of the date of the crash, Martin Luther King Day (the most politically touchy holiday), and the absence of a physical cause of the destruction, AT&T did not find it difficult to rouse suspicion that the network had not crashed by itself- that it had been crashed, intentionally.

By people the media has alled hackers. Hackers define themselves as people who explore technology. If that technology takes them outside of the boundaries of the law, they will do very little about it. True hackers follow a “hacker’s ethic”, and never damage systems or leave electronic “footprints” where they have been. Crackers are hackers who use their skills to damage other people’s systems or for personal gain. These people, mistakenly referred to as hackers by the media, have been sensationalized in recent years.

Software pirates, or warez dealers, are people who traffic in pirated software software that is illegally copied and distributed). These people are usually looked down on by the more technically sophisticated hackers and crackers. Another group of law-breakers that merit mentioning are the phreakers.

Telephone phreaks are people that experiment with the telephone network. Their main goal is usually to receive free telephone service, through the use of such devices as homemade telephone boxes. They are often much more extroverted than their computer equivalents. Phreaks have been known to create world-wide conference calls that run for hours (on someone else’s bill, of course).

When someone has to drop out, they call up another phreak to join in. Hackers come from a wide variety of odd subcultures, with a variety of languages, motives and values. The most sensationalized of these is the ” cyberpunk” group. The cyberpunk FAQ (Frequently Asked Questions list) states: 2. What is cyberpunk, the subculture? Spurred on by cyberpunk literature, in the mid-1980’s certain groups of people started referring to themselves as cyberpunk, because they correctly noticed the seeds of the fictional “techno-system” in Western society today, and because hey identified with the marginalized characters in cyberpunk stories.

Within the last few years, the mass media has caught on to this, spontaneously dubbing certain people and groups “cyberpunk”. Specific subgroups which are identified with cyberpunk are: Hackers, Crackers, and Phreaks: “Hackers” are the “wizards” of the computer community; people with a deep understanding of how their computers work, and can do things with them that seem “magical”. “Crackers” are the real-world analogues of the “console cowboys” of cyberpunk fiction; they break in to other people’s omputer systems, without their permission, for illicit gain or simply for the pleasure of exercising their skill.

“Phreaks” are those who do a similar thing with the telephone system, coming up with ways to circumvent phone companies’ calling charges and doing clever things with the phone network. All three groups are using emerging computer and telecommunications technology to satisfy their individualist goals. Cypherpunks: These people think a good way to bollix “The System” is through cryptography and cryptosystems. They believe widespread use of extremely hard- o-break coding schemes will create “regions of privacy” that “The System” cannot invade. (3)

This simply serves to show that computer hackers are not only teenage boys with social problems who sit at home with their computers; they can be anyone. The crash of AT&T’s network and their desire to blame it on people other than themselves brought the political impetus for a new attack on the electronic underground. This attack took the form of Operation Sundevil. “Operation Sundevil” was a crackdown on those traditional scourges of the digital underground: credit card heft and telephone code abuse. The targets of these raids were computer bulletin board systems.

Boards can be powerful aids to organized fraud. Underground boards carry lively, extensive, detailed, and often quite flagrant discussions of lawbreaking techniques and illegal activities. Discussing crime in the abstract, or discussing the particulars of criminal cases, is not illegal, but there are stern state and federal laws against conspiring in groups in order to commit crimes. It was these laws that were used to seize 25 of the “worst” offenders, chosen from a ist of over 215 underground BBSs that the Secret Service had fingered for “carding” traffic.

The Secret Service was not interested in arresting criminals. They sought to seize computer equipment, not computer criminals. Only four people were arrested during the course of Operation Sundevil; one man in Chicago, one man in New York, a nineteen-year-old female phreak in Pennsylvania, and a minor in California. This was a politically motivated attack designed to show the public that the government was capable of stopping this fraud, and to show the denizens of the lectronic underground that the government could penetrate into the very heart of their society and destroy routes of communication, as well as bring down the legendary BBS operators.

This is not an uncommon message for law-enforcement officials to send to criminals. Only the territory was new. Another message of Sundevil was to the employees of the Secret Service themselves; proof that such a large-scale operation could be planned and accomplished successfully. The final purpose of Sundevil was as a message from the Secret Service to their long-time rivals the Federal Bureau of Investigation.

Congress had not clearly stated which agency was responsible for computer crime. Later, they gave the Secret Service jurisdiction over any computers belonging to the government or responsible for the transfer of money. Although the secret service can’t directly involve themselves in anything outside of this jurisdiction, they are often called on by local police for advice. Hackers are unlike any other group of criminals, in that they are constantly in contact with one another. There are two national conventions per year, and monthly meetings within each state.

This has forced people to pose the uestion of whether hacking is really a crime at all. After seeing such movies at “The Net” or “Hackers”, people have begun to wonder how vulnerable they individually are to technological crime. Cellular phone conversations can be easily overheard with modified scanners, as can conversations on cordless phones. Any valuable media involving numbers is particularly vulnerable. A common practice among hackers is “trashing”. Not, as one might think, damaging public property, but actually going through a public area and methodically searching the trash for any useful information. Public areas that are especially ulnerable are ATM chambers and areas where people posses credit cards printouts or telephone bills.

This leads to another part of hacking that has very little to do with the technical details of computers or telephone systems. It is referred to by those who practice it as “social engineering”. With the information found on someone’s phone bill (account or phonecard number), an enterprising phreak can call up and impersonate an employee of the telephone company- obtaining useable codes without any knowledge of the system whatsoever. Similar stunts are often performed with ATM cards and pin numbers.

The resulting codes are either kept or used by whomever obtained them, traded or sold over Bulletin Board Systems or the Internet, or posted for anyone interested to find. With the increasing movement of money from the physical to the electronic, stricter measures are being taken against electronic fraud, although this can backfire. In several instances, banks have covered up intrusions to prevent their customers from losing their trust in the security of the system. The truth has only come out long after the danger was passed. Electronic security is becoming a way of life for many people.

As with the irst cellular telephone movements, this one has begun with the legitimately wealthy and the criminals. The most common security package is PGP, or Pretty Good Privacy. PGP uses RSA public-key encryption algorithms to provide military-level encryption to anyone who seeks to download the package from the Internet. The availability of this free package on the Internet caused an uproar and brought about the arrest of the author, Phil Zimmerman. The United States government lists RSA encryption along with weapons of which the exportation is illegal. The Zimmerman case has not yet been resolved.

The United States government has begun to take a large interest in the Internet and private Bulletin Board Systems. They have recently passed the Communications Decency Act, which made it illegal to transmit through the Internet or phone lines in electronic form any “obscene or inappropriate” pictures or information. This Act effectively restricted the information on the Internet to that appropriate in PG-13 movies. As of June 12, 1996, the censorship section of the Communications Decency Act was overturned by a three-judge panel of the federal court of appeals, who tated that it violates Internet user’s first amendment rights, and that it is the responsibility of the parents to censor their children’s access to information, not the government’s.

The court of appeals, in effect, granted the Internet the protections previously granted to newspapers, one of the highest standards of freedom insured by our Constitution. The Clinton administration has vowed to appeal this decision through the Supreme Court. Technological crime is harder to prosecute than any other, because the police are rarely as technologically advanced as the people they are attempting to catch.

This situation was illustrated by the recent capture of Kevin Mitnick. Mitnick had eluded police for years. After he broke into security expert Tsumona’s computer, Tsumona took over the investigation and captured Mitnick in a matter of months. It will be fascinating to see, as technology continues to transform society, the way that technological criminals, usually highly intelligent and dangerous, will transform the boundaries of crime. As interesting to see will be how the government will fight on this new battle ground against the new types of crime, while preserving the rights and freedom of the American people.

Cite This Work

To export a reference to this article please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Leave a Comment

StudyBoss » Computer » Computer Crime Report

Computer Crime Report

A report discussing the proposition that computer crime has increased dramatically over the last 10 years. Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their contents are damaged, for example when vandals attack the computer itself, or when a “computer virus” (a program capable of altering or rasing computer memory) is introduced into a computer system.

As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators’ accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts. Examples of these types of crimes are complex embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal or alter valuable information from an employer.

Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, burglary, sabotage, espionage, murder, and forgery. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses i. e. persons with the requisite skills, knowledge, access, and resources. Much of known computer crime has consisted of entering false data into computers. This method of computer crime is simpler and safer than the complex process of writing a program to change data already in the computer.

Now that personal computers with the ability to communicate by telephone are prevalent in our society, increasing numbers of crimes have been perpetrated by computer hobbyists, known as “hackers,” who display a high level of technical expertise. These “hackers” are able to manipulate various communications systems so that their interference with other computer systems is hidden and their real identity is difficult to trace. The crimes committed by most “hackers” consist mainly of simple but costly electronic trespassing, copyrighted-information piracy, and vandalism.

There is also vidence that organised professional criminals have been attacking and using computer systems as they find their old activities and environments being Another area of grave concern to both the operators and users of computer systems is the increasing prevalence of computer viruses. A computer virus is generally defined as any sort of destructive computer program, though the term is usually reserved for the most dangerous ones. The ethos of a computer virus is an intent to cause damage, “akin to vandalism on a small scale, or terrorism on a grand scale. ” There are many ways in which viruses can be spread.

A virus can be introduced to networked computers thereby infecting every computer on the network or by sharing disks between computers. As more home users now have access to modems, bulletin board systems where users may download software have increasingly become the target of viruses. Viruses cause damage by either attacking another file or by simply filling up the computer’s memory or by using up the computer’s processor power. There are a number of different types of viruses, but one of the factors common to most of them is that they all copy themselves (or parts of themselves).

Viruses are, in essence, self-replicating. We will now consider a “pseudo-virus,” called a worm. People in the computer industry do not agree on the distinctions between worms and viruses. Regardless, a worm is a program specifically designed to move through networks. A worm may have constructive purposes, such as to find machines with free resources that could be more efficiently used, but usually a worm is used to disable or slow down computers. More specifically, worms are defined as, “computer virus programs … [which] propagate on a computer network without the aid of an nwitting human accomplice.

These programs move of their own volition based upon stored knowledge of the network structure. ” Another type of virus is the “Trojan Horse. ” These viruses hide inside another seemingly harmless program and once the Trojan Horse program is used on the computer system, the virus spreads. One of the most famous virus types of recent years is the Time Bomb, which is a delayed action virus of some type. This type of virus has gained notoriety as a result of the Michelangelo virus. This virus was designed to erase the hard drives of people using IBM compatible omputers on the artist’s birthday.

Michelangelo was so prevalent that it was even distributed accidentally by some software publishers when the software developers’ computers became infected. SYSOPs must also worry about being liable to their users as a result of viruses which cause a disruption in service. Viruses can cause a disruption in service or service can be suspended to prevent the spread of a virus. If the SYSOP has guaranteed to provide continuous service then any disruption in service could result in a breach of contract and litigation could ensue.

However, contract rovisions could provide for excuse or deferral of obligation in the event of The first federal computer crime law, entitled the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, was passed in October of 1984. The Act made it a felony to knowingly access a computer without authorisation, or in excess of authorisation, in order to obtain classified United States defence or foreign relations information with the intent or reason to believe that such information would be used to harm the United States or to advantage a foreign The act also attempted to protect financial data.

Attempted access to obtain information from financial records of a financial institution or in a consumer file of a credit reporting agency was also outlawed. Access to use, destroy, modify or disclose information found in a computer system, (as well as to prevent authorised use of any computer used for government business) was also made illegal. The 1984 Act had several shortcomings, and was revised in The Computer Fraud and Abuse Act of 1986.

Three new crimes were added to the 1986 Act. These were a computer fraud offence, modelled after federal mail and wire fraud statutes, an offence for the lteration, damage or destruction of information contained in a “federal interest computer”, an offence for trafficking in computer passwords under some Even the knowing and intentional possession of a sufficient amount of counterfeit or unauthorised “access devices” is illegal.

This statute has been interpreted to cover computer passwords “which may be used to access computers to wrongfully obtain things of value, such as telephone and credit card Business crimes of all types are probably decreasing as a direct result of increasing automation. When a business activity is carried out with computer nd communications systems, data are better protected against modification, destruction, disclosure, misappropriation, misrepresentation, and contamination.

Computers impose a discipline on information workers and facilitate use of almost perfect automated controls that were never possible when these had to be applied by the workers themselves under management edict. Computer hardware and software manufacturers are also designing computer systems and programs that are Recent U. S. legislation, including laws concerning privacy, credit card fraud and racketeering, provide criminal-justice agencies with tools to fight business crime.

As of 1988, all but two states had specific computer-crime laws, and a federal computer-crime law (1986) deals with certain crimes involving computers in different states and in government activities. There are no valid statistics about the extent of computer crime. Victims often resist reporting suspected cases, because they can lose more from embarrassment, lost reputation, litigation, and other consequential losses than from the acts themselves. Limited evidence indicates that the number of cases is rising each year because of the increasing number of computers in business applications where crime has traditionally occurred.

Cite This Work

To export a reference to this article please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Leave a Comment