Crimes With Computers Essay, Research Paper
Computer Crime
Technology experienced a break-through with the invention of computers. With this break-through came a new quest for knowledge and power. Society relies more and more on computers each day and people have found that a quest for knowledge or power on a computer could give them more than they bargained for.
In the media, the term hacker is often defined as a criminal, armed with a computer, set out to commit malicious acts. The US Department of Defense estimated that their computer systems were attacked 250,000 by hackers in 1995 alone. That s an attack every thirty seconds (Knittel and Soto 6). This would lead most people to believe that hackers were in fact malicious criminals. However, a hacker is simply a talented computer user with a vast knowledge of how computers work.
Not all hackers commit malicious acts. But what acts committed by hackers are considered malicious? The legal definition of a computer crime is pending. Lawmakers and computer experts have characterized it variously as using a computer to steal money, services, or property, or to commit an invasion of privacy or an act of extortion or terrorism (Caplan 218). Early hacking was simple and not necessarily harmful.
In the early 1970 s, John Draper, a hacker later known as Captain Crunch , discovers that he can make free long distance phone calls by blowing an exact tone into the telephone with a toy whistle from a box of cereal. Draper was arrested several times during the 1970 s for computer and phone related crimes. In the late 70 s, two hackers from the Homebrew Computer Club develop devices called blue boxes which tap into the phone system. These two hackers, named Steve Jobs and Steve Wozniak, later went on to found Apple Computers (Triguax[Online]). But it would be in the following decades that hackers would discover just how far they could push the envelope.
Kevin Mitnick, perhaps the most famous of all hackers, was arrested on February 14, 1995. Mitnick had been alluding police, the FBI, and several other government agencies for over two years. During this time period, Mitnick had stolen millions of dollars worth of information from government, corporate, and university computer systems (Shimomura 1). Mitnick was so well respected in the hacking world that even today, government agencies are receiving terrorist threats demanding Mitnick s release from prison.
Today, millions of hackers like Mitnick are surfing the Internet waiting for a computer to attack. However, some hackers attack with no intent of computer damage or general harm. These hackers are sometimes called hacktivists . Usually this type of hacker will deface government and corporate web pages for the purpose of delivering a political, religious, or social message. The damage left by these hackers is minimal and very easy to correct (Triguax[Online]).
Security on the Internet is constantly growing bigger and stronger. Law enforcement officials have been trying to use this to stop as many hackers as possible. Encrypted passwords, firewalls, and tracing devices are all used to defer hacker activity (Cozic 34). But hackers are still figuring out ways to breach security in any way possible and make themselves bigger and stronger.
With this in mind, Canadian psychologist, Marc Rogers, broke down the term hacker into several subgroups to help police develop criminal profiles for hackers. Hackers can be profiled as newbies, cyberpunks, coders, insiders, or cyber terrorists. Newbies and cyberpunks are generally the type of hackers you hear about getting caught. These hackers have minimal computer knowledge and hack for thrills. With thrills comes bragging about accomplishments, and bragging is the quickest way to get caught. Coders and insiders are the next groups. Coders write the programs that hackers use. Insiders account for seventy to eighty percent of all malicious computer crimes. Coders and insiders are generally computer company employees and have easy access to computer systems. Finally, the most dangerous and notorious type of hacker is the cyber terrorist. Cyber terrorists are often hired by governments and corporations to steal information or sabotage rival companies. These computer experts make large amounts of money in this field. They use the most sophisticated equipment available and are rarely caught (Knittel and Soto 23, 24).
This profile gave an aid to categorizing computer crimes and criminals and helped give a better understanding of the levels of computer crime. However, it did not stop or even slow the activity of hacking. It leaves a person to wonder if hacking would ever be eradicated. New computer technology is developed by hackers. So they will always have the cutting edge on technology. To eliminate hackers would eliminate all use of computers (Galley[Online]. Perhaps things would have been better that way in the first place.
Works Cited
Caplan, David I., and Diane Sank. Computer Crime. To
Be a Victim. New York: Plenum Press, 1991.
Cozic, Charles P. The Future of the Internet. At
Issue. San Diego: Greenhaven Press, Inc., 1997.
Galley, Patrick. Computer Terrorism: What are the
Risks?. [Online] Available homer.span.ch/
Spaw1165/infosec/sts_en/crime.html
Knittel, John, and Micheal Soto. The Dangers of
Computer Hacking. New York: Rosen Publishing
Group, Inc., 2000.
Shimomura, Tsutomu. Takedown. New York: Hyperion, 1996
Trigaux, Robert. A History of Hacking. [Online]
Available sptimes/Hackers/history.
hacking.html, February 14, 2001.
332
Другие работы по теме:
Descriptive Essay About A Comp Essay Research
Paper The Computer A computer is a very unique machine. It has many different parts and a lot of different noises. Some parts are hot, and some are cold. Computers have many different sounds that they make. Depending on the sound it makes, it could have a problem. When your computer beeps at you. It normally means that an error has occurred and that it needs to be fixed.
College Admision Essay Research Paper Being accepted
College Admision Essay, Research Paper Being accepted into College would open up a lot of opportunities for my future. Ever since I was a child, I have been in awe about how computers operate. At the age of fifteen, I got a summer job at Fallon Clinic, doing computer repair and computer networking. Later I proceeded to build a computer out of spare parts, and from then on I have wanted to be a computer engineer.
Computers 2 Essay Research Paper People use
Computers 2 Essay, Research Paper People use computers everyday. Some people know how to use one some people don’t. But not too many people can understand how the computer works and its processing. I have been taught how it works and I understand it very well. The best way to explain it would be to compare it to the United States Postal Service and how it works.
Computer Education Essay Research Paper Back to
Computer Education Essay, Research Paper Back to the 1940s, the modern electronic computer was developed at U.S. universities; however, in the year, there was no computer education yet. It needed more 10 years to have computer education. The period of the computer revolution was 1950 in the U.S.. Computer education began in the middle of the 1950s with an organized body of knowledge.
What Would You Like A Computer To
Do For You Essay, Research Paper The first computer was invented almost 25 years ago. Since then, various improvements have been made to the computer. Recently, the internet was invented. This made a vast impact on our lives. As you can see, computers are an important part of our lives. We rely heavily on computers to do many everyday tasks for us and we cannot do without them.
Computers Essay Research Paper Computers make our
Computers Essay, Research Paper Computers make our lives much easier in a variety of ways. They save time and if used properly, money. Because of this, computer skills are now a necessity, not a convenience. This is a fact because the computer is a great reference source, a productive tool, and provides the invaluable use of the Internet.
Computer Literacy Essay Research Paper Everywhere you
Computer Literacy Essay, Research Paper Everywhere you look you see some sort of computer. There everywhere from schools, to the grocery store checkout line, movie theatres and even in the shirt pockets of some businessmen. Back about ten years ago it was a chore to find someone with a computer, and the Internet please what good is that.
Human Brain Essay Research Paper The human
Human Brain Essay, Research Paper The human brain and the computer in the past few decades we have seen how computers are becoming more and more advance, challenging the abilities of the human brain. We have seen computers doing complex assignments like launching a rocket or analysis from outer space. But the human brain is responsible for thought, feelings, creativity, and other qualities that make us humans.
Criminal Justice Essay Research Paper Jason C
Criminal Justice Essay, Research Paper Jason C. Clifton Clifton 1 Criminology CRJ 470 Nevelle Jones Assignment 20 July 17, 2000 High Tech Offenders What different kinds of high-tech offenders can you
John Vincent Atanasoff Essay Research Paper John
John Vincent Atanasoff Essay, Research Paper John Vincent Atanasoff inventor of the electronic computer In any scienctific field, there needs to be a person with the vision to define the future. John Vincent Atanasoff was a genius with such a vision. He developed the first electronic digital computer that has dramatically changed our lives.
Y2k Bug Essay Research Paper One of
Y2k Bug Essay, Research Paper One of my biggest concerns about the turning of the new millennium is one that s been getting a lot of press as of late. That is the Year 2000 (Y2k) Bug. The Y2k bug has to do with how a particular computer will deal with the year 2000. No Macintosh product will have any problems with the so called “bug” because when the Mac was developed, they used four digits to represent the year, allowing 2000 to be read as “2000″ and not just “00.” As a matter of fact, the Macintosh can read up to the year 29,948 (but don t worry, they re already hard at work on the Y30k problem.) The problem will occur, however, in non-Macintosh based computers (IBM, Compaq, Gateway, etc.) They will read 2000 as “00″ and will interpret that as 1900, making the computer think it just jumped back a century.
Personal Computers And Laptop Computers Essay Research
Paper The two types of computers that are the most common people use are the Personal computer, and the Laptop computer. Most people would say that there is not that much difference between the two, but they have no idea how wrong they are.
Computers Essay Research Paper Computers are found
Computers Essay, Research Paper Computers are found in practically every household today. Everywhere you look, people have access to a Personal Computer, someway or another. As computers get more advanced, the demand for a better computer gets greater.
Untitled Essay Research Paper A hacker is
Untitled Essay, Research Paper A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
What Should And Shouldn
’t Computer Be Allowed To Run Essay, Research Paper What Should and Shouldn’t Computer Be Allowed To Run Computers have always scared people. Not just because they can be
Computerized World Essay Research Paper A Computerized
Computerized World Essay, Research Paper A Computerized World Since the first computer was made in the late fifties, the technology has developed extremely. Computers which took the place of a living-room then, are now being made in credit card-formats. More and more areas are being taken over by the computer.
Printer Technology Essay Research Paper Since the
Printer Technology Essay, Research Paper Since the introduction of computers into our society, there have been countless advancements in this technology. One of the most frequently used output devices in the computer system is the printer. Like all other components of the computer, this piece of equipment has been developed and improved over time.
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Computer Scientist Essay Research Paper The title
Computer Scientist Essay, Research Paper The title computer scientist can be applied to a wide range of computer professionals who usually design computers and the software that runs them, develop information technologies, and develop and adapt principles for applying computers to new uses. Computer scientists perform many of the same duties as other computer professionals, but their jobs are distinguished by the higher level of theoretical expertise and innovation they apply to complex problems and the creation or application of new technology.
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Computers In Education Essay Research Paper Computers
Computers In Education Essay, Research Paper Computers in Education The typical school has 1 computer per 20 students, a ratio that computer educators feel is still not high enough to affect classroom learning as much as
Computer Gave Technology A Bo Essay
, Research Paper The computer has come a long way since it was first invented, which put the power of technology in the spotlight. Through the years there have been many advances with the help of computers. Advances in which have been of great help.
3D Animator Essay Research Paper The field
3D Animator Essay, Research Paper The field of computer animation can be one of the most interesting fields in art today. It is for sure the most rapidly changing fields in art. Many people starting back in the 1980’s began to make their Amiga computers draw flat 2d animations. It took a lot of time and a lot of programming skills.
Computer Crime 3 Essay Research Paper Ever
Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?
Computers Essay Research Paper Computers Today
Computers Essay, Research Paper Computers Today computers are a part of our everyday life; can you imagine a world without computers? There are many kinds of computers. For example, there are desktop computers, laptop computers, and palmtop computers. These are the most popular ones. However, there are many other types of computers.
The First Generation Of Computers Essay Research
Paper The First Generation of Computers The first generation of computers, beginning around the end of World War 2, and continuing until around the year 1957, included computers that used vacuum
Home Computer Network Essay Research Paper Have
Home Computer Network Essay, Research Paper Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don t know how? Do all of your computers need Internet access, but you don t want to have a phone line installed for each of them? Well, you can do all of this.