- Read a few of our sample essays on your topic
- Develop your own ideas
- Your paper will practically write itself
Internet crimes, however, carry their own intricacies and innovations. These online crimes take advantage of the very same technologies that make the Internet possible. The Parkers noted that the most common crimes committed on the Internet are the same basic variations of the "four main time-tested, real-world crimes: Forgery (of E-mail), assault (on your Web site, E-mail box, or computer system), fraud (cyber scams), and robbery (theft of valuable information)" (Parker, Parker, 1998, pp. 178, 189). Various types of people commit computer crimes, the two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities, a person who programs enthusiastically, even obsessively. A cracker is one who breaks security on a system. Although hackers and crackers both break into computer systems, their motives are different. Hackers seem to break into computer systems for the int!
ellectual challenge. Crackers are considered malicious with the intention of harming or causing damage to a computer system. The motivations behind crackers' actions are profits, revenge, or a mixture of the two.
Other computer criminals include terrorists, company competitors, and aggravated employees. Aggravated employees are a company's worst nightmare since they have easy access to the companies system, and are usually fired or leave on bad terms. Competitors will often do whatever is necessary to get an edge on their industry leaders by riffling through their competitors' trash, bugging phone lines, and now breaking into their competitors' networks in an attempt to gather inside information. Terrorists are becoming more computer literate because they realize the amount of information regarding the government defense are stored and found on computers. Terrorists are also targeting technology and utility companies because they realize the damage caused would be widespread and devastating.
There are six common types of computer attacks noted by Sam Singh (1999): · Military/Intelligence Attacks · Business Attacks · Financial Attacks · Terrorist Attacks · Grudge Attacks · Reasonless Attacks. Computer criminals have broken into the military's system many times and learned such valuable information as: military exercises, satellite repositioning systems, FBI/CIA investigations, etc. Our national security is at jeopardy simply because the military system is susceptible to computer crime just as is any network system. The U.S. Air Force once hired a hacker to try to break into their systems. The hacker was successful at the break-in and reported it to military officials. Two weeks later, he was asked to try to break into the system again. This time it only took fifteen seconds to get back into the system. The government needs to find a way to protect their information, themselves, and us more securely.
Attacks on businesses are rapidly becoming more widespread. Almost 54% of U.S. companies reported losses related to computer crimes. Most of these crimes committed were intentional. This raises the issue of competitors' attempts to gain information on their closest competitor. For example, Boeing Aircraft accused Airbus of bugging Boeing employees' hotel rooms and airline seats and tapping the telephone lines in order to get information. People inside or close to the company most often commit financial Attacks. Obviously, people most familiar with a company's system and operations can commit a crime and easily cover their trails. An MCI assistant was arrested for selling thousands of credit card numbers obtained over telecommunication lines. The total cost of the incident was $50 million. When these criminals are placed in prison, more financial attacks can occur. Prisoners at Metro Jails (Tennessee) were able to illegally access long distance telephone accounts in!
order to sell calls to other prisoners (R. Clark, pers
Quotes talked about in this paper
- James George states that it is a story as old as humanity: "New times bring new crimes" ...
Terminology mentioned in this research paper
DES, RSA, software companies, Clipper Chip, technology companies, software industry, telephone lines, encryption software, Law enforcement agencies,
Technology referenced in this research paper
Names mentioned in this term paper
R. Clark, Parker, James George, Kevin Nelson, James, Sam Singh, James Robinson, Queen, James, G., Kevin A., Scott., pp, Johnson, Biometric, Scott Kieran, Sayers, Phillip Zimmerman,
Organizations mentioned in this term paper
U.S. government, U.S. Air Force, Department of Justice, The New York Times, Clipper,
Locations referenced in this paper
United States, **Bibliography**, Tennessee, Hartford,
Companies talked about in this research material
Acme Company, financial institutions, trapdoor, Boeing, Sons Corp,
Keywords referenced in this research material
computer, computer crime, crimes, software theft, computer literate, data encryption, computer fraud, telephone, computer use, criminals, World Wide Web, computer viruses, computer games, information, computer program, data encryption standard, credit card numbers, financial institution, public key, company, terrorist, e mail, Internet, encrypted e mail, systems, Clipper Chip, Internet crimes, Data theft, telephone number, Pretty Good, Acme Company, telephone fraud, key system, United States, a crime, security, encryption software, long distance telephone, communications, New York, Pretty Good Privacy, user, merger and acquisition, United States Government, Crime Scene, encryption algorithm, secret key, eavesdropping, key card, control system,