Computer Crimes Essay, Research Paper
The computer has evolved a great deal since its creation over a third of a century ago. The uses of the computer now seem endless. Unfortunately some of those uses include computer crimes. This paper will explore some recent crimes that have occurred and the laws that apply to them.
The first such incident took place in Russia between June and October 1994. Six people were arrested in the scheme, in which $10 million was allegedly shifted from Citibank to accounts in Finland, Russia, Germany, the Netherlands, the United States, Israel, and Switzerland. Of the $10 million stolen, $400,000 has not been recovered. The clients who lost money have been reimbursed. The Citibank system allows customers to transfer their money to accounts at other banks. The hackers found a way to crack the system and made about 40 transfers of money totaling more than $10 million. The bank?s control system provided the tip to the fraudulent transactions. At least one of the hackers, who was arrested about a year ago while in San Francisco opening accounts to receive the money, is helping investigators. Another person arrested is a Russian computer expert who worked at a Russian software company. Vladimir Levin, head systems operator for AO Saturn, figured out how to get around Citibank?s security system and transfer money out of their accounts. Levin, of St. Petersburg, claims he should not be turned over to American authorities because there is no evidence that any computers in the United States were used in the scheme. The U. S. government says the funds were all routed through Citibank?s wire transfer department on Wall Street. The Justice Department wants to charge Levin with conspiracy and fraud. (Source: Delaware County Daily Times, 8/21/95)
If turned over to American authorities, Levin is subject to ordinary tort law governing fraud. The feeding of false information to a computer and then using the printouts to deceive the victim comes under tort law. The Electronic Funds Transfer Act could also be applicable in this situation. The EFTA makes it a crime to use any counterfeit, stolen, or fraudulently obtained card, code, or other device to obtain money or goods in excess of a specified amount through an electronic fund transfer system. The EFTA also makes it a crime to ship such devices of goods that were obtained in interstate commerce, or knowingly to receive goods that have been obtained by means of the fraudulent use of the transfer system. (Source: Text book)
The next two examples involve software piracy, or unauthorized use, copying or sale of computer programs. John Wolfe, an investigator for the Business Software Alliance last June recently uncovered a small business engaged in the unlawful installation of computer programs onto personal computers, and the sale of those computers. TES Computer, of Fairfax VA. was reported to the BSA by several consumers complaining about problems with preinstalled programs on their computers. TES offered very little help with the problems. Wolfe posed as an interested buyer at a local computer show that TES had a stand at. He noticed that TES was offering a standard desktop computer with 63 preinstalled programs worth up to $10,000 for a mere $1,395. Also the computer programs came with no manuals or extra disks, which is a sign that the programs were unregistered. Wolfe later bought a computer from them and examined it closely, gaining evidence against TES. When confronted by the BSA with a lawsuit, TES abruptly emptied its office. (Source: The Philadelphia Inquirer, 8/26/95)
The following example involves the popular new software program Windows 95. The long awaited program hit stores on Aug. 24 but it has been selling in street markets and shops in Europe and Asia for months. Robin Burton, European spokesman for the anti-piracy group Business Software Alliance said, ?We found thousands of copies of pre-release versions around?. Burton added that Windows 95 ?was on almost every CD-ROM we saw in Europe and the Far East.? Christine Santucci, a Microsoft spokeswoman in Redmond Wash., said the packages sell very cheap in Hong Kong. ?You?re basically buying about $20,000 worth of software for $40,? she said. (Source: Delaware County Daily Times, 8/23/95)
These two incidences involve theft of software. When a thief takes software, whether in the form of of a program written on paper or a program on a disk or tape, a situation arises that does not fit into the common law definition of larceny. This is because larceny at common law was confined to the taking of tangible property. However virtually every state has amended its definition of larceny or theft so that the stealing software is a crime. (Source: Textbook)
325
Другие работы по теме:
550 Mhz Of Power Versus A 486
Loser Essay, Research Paper “550 MHz of Power VS A 486 Loser” Having a Pentium III 550 computer is very convenient for your everyday life. Compared to a 486 computer that has about 100 MHz of power, the most, a Pentium III
Descriptive Essay About A Comp Essay Research
Paper The Computer A computer is a very unique machine. It has many different parts and a lot of different noises. Some parts are hot, and some are cold. Computers have many different sounds that they make. Depending on the sound it makes, it could have a problem. When your computer beeps at you. It normally means that an error has occurred and that it needs to be fixed.
Computer Education Essay Research Paper Back to
Computer Education Essay, Research Paper Back to the 1940s, the modern electronic computer was developed at U.S. universities; however, in the year, there was no computer education yet. It needed more 10 years to have computer education. The period of the computer revolution was 1950 in the U.S.. Computer education began in the middle of the 1950s with an organized body of knowledge.
What Would You Like A Computer To
Do For You Essay, Research Paper The first computer was invented almost 25 years ago. Since then, various improvements have been made to the computer. Recently, the internet was invented. This made a vast impact on our lives. As you can see, computers are an important part of our lives. We rely heavily on computers to do many everyday tasks for us and we cannot do without them.
Computers Essay Research Paper Computers make our
Computers Essay, Research Paper Computers make our lives much easier in a variety of ways. They save time and if used properly, money. Because of this, computer skills are now a necessity, not a convenience. This is a fact because the computer is a great reference source, a productive tool, and provides the invaluable use of the Internet.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
Computer Literacy Essay Research Paper Everywhere you
Computer Literacy Essay, Research Paper Everywhere you look you see some sort of computer. There everywhere from schools, to the grocery store checkout line, movie theatres and even in the shirt pockets of some businessmen. Back about ten years ago it was a chore to find someone with a computer, and the Internet please what good is that.
Criminal Justice Essay Research Paper Jason C
Criminal Justice Essay, Research Paper Jason C. Clifton Clifton 1 Criminology CRJ 470 Nevelle Jones Assignment 20 July 17, 2000 High Tech Offenders What different kinds of high-tech offenders can you
John Vincent Atanasoff Essay Research Paper John
John Vincent Atanasoff Essay, Research Paper John Vincent Atanasoff inventor of the electronic computer In any scienctific field, there needs to be a person with the vision to define the future. John Vincent Atanasoff was a genius with such a vision. He developed the first electronic digital computer that has dramatically changed our lives.
Computer Engineering Essay Research Paper Since birds
Computer Engineering Essay, Research Paper Since birds could fly and fish could swim there has always been questions, problems, and answers. This it what I am interested in. The questions and more importantly the answers. I have been seeking answers all my life. The one question I have always had is How do things work.
Being A Smart Consumers Essay Research Paper
Being a Smart Consumers Ryan Romme When deciding to buy a computer it is a very important decision. First decide that range of money you are willing to spend. Then research the many different companies and the product they have to offer. Then after deciding the company to purchase the computer the next step is to price watch.
Untitled Essay Research Paper A hacker is
Untitled Essay, Research Paper A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a
Another Computer Essay Essay Research Paper The
Another Computer Essay Essay, Research Paper The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence
What Should And Shouldn
’t Computer Be Allowed To Run Essay, Research Paper What Should and Shouldn’t Computer Be Allowed To Run Computers have always scared people. Not just because they can be
Printer Technology Essay Research Paper Since the
Printer Technology Essay, Research Paper Since the introduction of computers into our society, there have been countless advancements in this technology. One of the most frequently used output devices in the computer system is the printer. Like all other components of the computer, this piece of equipment has been developed and improved over time.
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Computer Scientist Essay Research Paper The title
Computer Scientist Essay, Research Paper The title computer scientist can be applied to a wide range of computer professionals who usually design computers and the software that runs them, develop information technologies, and develop and adapt principles for applying computers to new uses. Computer scientists perform many of the same duties as other computer professionals, but their jobs are distinguished by the higher level of theoretical expertise and innovation they apply to complex problems and the creation or application of new technology.
Landscaping Essay Research Paper Computer Hacking BasicsComputer
Landscaping Essay, Research Paper Computer Hacking Basics Computer hacking is very popular. With every thing on the Internet having to cost something. Someone will try to hack that database and retrieve free information. As every on knows but doesn?t take very seriously is that hacking is illegal. Hacking is anywhere from hacking in to the school data base and change your grades to make a stop light change with a special clicker.
Computer Gave Technology A Bo Essay
, Research Paper The computer has come a long way since it was first invented, which put the power of technology in the spotlight. Through the years there have been many advances with the help of computers. Advances in which have been of great help.
Windows 30 Essay Research Paper Windows 30
Windows 3.0 Essay, Research Paper Windows 3.0 With window’s 3.0, you can unleash the power of your 286 or 386 computer’s protected mode. Unlike earlier releases that made you purchase separate versions
Computer Crime 3 Essay Research Paper Ever
Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?
The Computer Mouse Essay Research Paper The
The Computer Mouse Essay, Research Paper The Computer Mouse The computer mouse is a common pointing device, popularized by its inclusion as standard equipment with the Apple Macintosh. With the rise in
Computer Security Essay Research Paper First we
Computer Security Essay, Research Paper First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives.
Computer Programmers Essay Research Paper Computer programmers
Computer Programmers Essay, Research Paper Computer programmers are the writers of computer programs. They do this by coding sets of instructions into machine-readable form. Programmers analyze data processing problems and plan, organize, and develop logical sequences of operations to be used by computers in processing information to solve business, scientific, engineering, and other complex or time-consuming problems.
Computer Violence Essay Research Paper Violent Computer
Computer Violence Essay, Research Paper Violent Computer Games A lot of adults say violent computer games make you violent. I disagree. When you are mad you can take out your anger while playing that game. Lots of kids I know have violent computer games and none of them are violent. Pretty much everything in this world has violence in it.