StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Categories and Types of Computer Crimes - Essay Example

Summary
This paper "The Categories and Types of Computer Crimes" focuses on the fact that the definition of computer crime is varied, diverse, ever-changing with the expansion of computer applications. The former definitions were made when the “computer world” was small and covered the computer system. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
The Categories and Types of Computer Crimes
Read Text Preview

Extract of sample "The Categories and Types of Computer Crimes"

Introduction The definition of computer crime is some what varied and diverse and always ever changing with the expansion of computer applications. The former definitions were made when the “computer world” was small and only covered the computer system; this is inadequate in describing the current mammoth systems. However, one definition that is appropriate today defines computer crime as any illegal act for which knowledge of computer technology is used to commit the offence (McEwen et al, 1989, p. 1). This definition covers both active and passive computer involvement in the crime. Active computer involvement include such attacks as changing data in databases and destroying files while passive attacks are those in which computers are used in the crimes such as keeping databases of illegal activities or network of members. McEwen et al (1989) categorize computer crimes into five main groups. These are: internal computer crimes, telecommunication and telephone crimes, computer manipulation crimes, computer in support of crimes and theft of hardware and software. Internal computer crimes involve the use of or alteration of computer programs which results in the computer system performing an unauthorized functions. This attack is often perpetrated by computer programmers and requires some level of knowledge to correct. Examples of this type of crime include use of computer viruses, trojan horses, logic bombs and trap doors. Telecommunication crimes involve illegal access and use of computer systems over telephone lines. In this method a hacking program continually dials the system with random codes, when a code is realized to be open, then the system is accessed and the cost is automatically reverted to the innocent customer. Another aspect is the misuse of telephone systems. Some examples of this type of crime are phreaking and hacking. Changing of computer data with an aim of advancing a crime by using the new data fall under computer crime category commonly called computer manipulation crimes. This is listed as the most common type of crime and is always responsible for loss of huge amounts of money. It includes embezzlement in financial institutions, by falsifying documents, and fraud. Another category of computer crime is when computers are used by criminals to support their activities. These support activities may include controlling of criminal networks, data storage in databases as well as communication with the members of the criminal network. The last category of computer crime which falls under thefts involves authorized copying of computer software (software piracy) and hardware. All these categories of computer crimes have differing levels of harm they may cause to an organization. These harms may include denial of service, data loss or system inconsistencies. While most of the changes in the computer and technology fields have been realized in the past twenty or so years, computer crime is not a new phenomenon. Throughout the sixties to date there have been a number of computer crimes which have been extensively covered and with the increasing level of sophistication in both hardware and software industries, there will continue to be even more spectacular cases of computer crimes. However, one case of computer crime worth discussing is that involving Adrian Lamo. Adrian Lamo Adrian Lamo was born in Boston, Massachusetts in February of 1981 to Mary Lamo-Atwood and Mario Lamo both of Columbian descent. He had formerly dropped out of Lowell High School (San Francisco) in 1999. In his time as a hacker he went by the name the homeless hacker due to his tendencies of roaming cyber cafes, abandoned buildings and lounge surfing. He is reputed to have gained access to a dozen of high-security networks sometimes to explore the weakness of the system while sometimes for research. He pled guilty to federal charges of unauthorized access to a computer network on 8th January 2004 and was sentenced to home detention and sixty five thousand dollars in restitution. After his conviction, he enrolled in American River College where he pursues a degree in writing, photography, and editorial work. He also married on September 6th, 2007 to Lauren Lamo. Major attacks Lamo is attributed to a dozen attacks on private and public networks which included schools but he is most famous for his access to the New York Times, Microsoft, Fortune 500 networks. He has also confessed to have gained access into Yahoo and SBC (a telephone company), Cingular, Ameritech among other networks. Hacking, the term used to refer to un authorized access to a secure computer network has its roots in the invention of the telephone. Hacking can only work in networked environments hence the first ever recorded ‘hacking’ was done by John Draper (captain Crunch) when he discovered that a toy whistle from a cereal box could produce the precise tone of 2600Hz which could consequently allow him to make free long distance calls (Kizza, 2002, p. 243). This came to be known as “phreaking”. Over time there were other attacks but the first notable system penetration started in mid-80 with a group of hackers who were based in San Francisco called 414-club. Their attacks were via Stanford University computers. But with time, there have arisen two types of hackers; those whose main aim is to detect weaknesses in system so that they can help the owners to correct the loop holes and those who scan for such loopholes so as to initiate attacks. the former are called white hat hackers/ robin hood hackers while the later are called black hat hackers/crackers. Adrian Lamo falls into the later category (Robin hood hackers). New York Times Attack Mitnick & Simon (2005) record in their book The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers that Adrian’s main motivation for hacking into New York Times systems was because he felt it could offer him some level of challenge due to their upped security after a previous hacking attack by HFC (Hacking for Girlies) ( Mitnick & Simon, 2005, p. 100). In the attack, Adrian went online and after exploring, discovered that the host for the times was outsourced which would mean that his access to the corporate site is limited. So he checked for New York Times from ARIN (American Registry for Internet Numbers), an organization that manages the internet numbering resources for North America. From this he got the IP addresses for New York Times which he scanned but without success, he then checked the list of Domain Name Server (DNS) and was not successful again, finally he went back to the website and got an email link from which he extracted the internal IP address of the Times he scanned for an open address and got in finally. When inside, he created five separate accounts including one in which he added his own name and cell phone number. After browsing for a about three months (conducting well over 3000 searches), he contacted a well known internet journalist and explained the vulnerability of Times’ system which he had exploited. He however asked the journalist not to publish the story until when Times will have corrected the flaw. However the Times, embarrassed by the former attack did not want to hear what he had to say. It is at this point that he informed the journalist to publish the story. After the publishing, the flaws were corrected within 24 hours. (Mitnick, & Simon, 2005) MCI WorldCom In gaining access to this system, Adrian used a computer program called proxyHunter to locate open proxy servers at WorldCom. After scanning he identified five open proxies. He identified one which was used for internal private network and configured his laptop browser to use the proxy. Two months later, he had gained access to the human resource network and extracted names of the company’s 86,000 employees. With these information he could reset the password for each employee and access the payroll for the company as well as other private information about each employee. At that instance he could even have diverted the payment for many employees to his account but he did not. Court case In September 8th, 2003, the then United States Attorney for the Southern District of New York, James B. Comey prosecuted Adrian Lamo before a Manhattan Federal Court for hacking into the internal computer network of New York times, creating a fictitious user identities conducting searches that run up to $300,000 in database charges for a period of over three months. However in the investigations that were led by Pasquale D’amuro, the then Assistant Director of FBI in Charge of the New York other charges of hacking were not included. Adrian pleaded guilty to these charges and was sentenced to six months of home confinement, a two year probation period and was also ordered to pay $64,900 in restitution. (U.S. Department of Justice, 2003) Bibliography Kizza, J. M. (2002). Ethical and social issues in the information age. New York: Springer. McEwen, J.T. et al (1989). Dedicated Computer Crime Units. New York: DIANE Publishing. U.S. Department of Justice. (2004). Hacker Pleads Guilty in Manhattan Federal Court to Illegally Accessing New York Times Computer Network. Retrieved June 7, 2009, from United States Attorney, Southern District of New York website: http://www.usdoj.gov/criminal/cybercrime/lamoPlea.htm U.S. Department of Justice. (2003). U.S. Charges Hacker with Illegally Accessing New York Times Computer Network. Retrieved June 7, 2009, from United States Attorney, Southern District of New York website: http://www.usdoj.gov/criminal/cybercrime/lamoCharge.htm Parker, T., et al. (2004). Cyber adversary characterization: auditing the hacker mind. New York: Syngress. Milhorn, T. H. (2004). Crime: Computer Viruses to Twin Towers. New York: Universal-Publishers. Gissel, R. (2005). Digital Underworld. Massachusetts: MacroTech Press. Mitnick, D. K. & Simon W. L. (2005). The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers. San Franscisco: John Wiley and Sons. Solomon, M. G et al. (2004). Computer forensics jumpstart. San Franscisco: John Wiley and Sons. Milhorn, T. (2007). Cybercrime: How to Avoid Becoming a Victim. New York: Universal-Publishers. Schell, H. B. (2007). The Internet and society: a reference handbook. Las Vegas: ABC-CLIO. Weiser, B. (2003). Hacker Accused of Running Up $300,000 Charge at The Times. Retrieved June 7, 2009, from The New York Times. Website: http://www.nytimes.com/2003/09/10/nyregion/10HACK.html Read More

CHECK THESE SAMPLES OF The Categories and Types of Computer Crimes

Cyber-crime: Its History, Types, Methods and the Effects on Networks and Users

This category includes the stealing of computer processor time as well as that of computerized services.... [2] The goal of this paper is to raise awareness of the threats we all face when using computing devices with online access, the types of cybercrimes and some ideas to protect ourselves so we can all continue to enjoy the many benefits of the digital age.... Moreover, it has been estimated that the cost of the aggregate damage caused by cyber-crimes to companies have amounted up to $36....
13 Pages (3250 words) Research Paper

Computer Crimes

These two types of computer crimes have many types and all of them will be elaborated in the paper.... Computer Crime that Target Networks or other Computers These types of computer crimes are most important because they are directly related to the invention of computer itself.... Other type of computer crimes only use computer and they were being carried out long before computer technology was developed so they have only been increased through computers....
6 Pages (1500 words) Literature review

The World of Information Technology and Communication

Considered as the initial computer crimes, a chief teller at the New York's Union Dime Savings Bank located at Park Avenue embezzled more than $1.... Since it was considered as the first of its kind crime, the teller managed to amaze the people that such computer crimes can be done using computers.... The concept of computer-related crime is usually most difficult to understand.... In 1993, mere ten cases were reported worldwide of computer crime which grew to hundreds during the 21st century (Walden, 2007)....
14 Pages (3500 words) Essay

Types and Fighting of Cyber Crimes

Broadhust and Grabosky (2005) in their book defined cybercrime as a 'specific category of computer crime, which refers to the use of computers as a tool for crime commission' (p.... The author of the "Types and Fighting of Cyber crimes" paper focuses on cyber crime which is illegal activities such as credit card fraud, and software piracy, among others that are carried out over the internet to offend people's senses or even evade privacy.... There are a few countries that have tried to enforce laws regarding cyber crimes....
2 Pages (500 words) Research Paper

Criminology: Uniform Crime Reports and the National Incident-Based Reporting System

UCR is a countrywide program that integrates more than 17, 000 cities, universities and colleges, states, federal agencies, and counties that report any information on crimes brought to their attention.... The United States Government is responsible for offering information on crimes to its citizens.... Rather, it relies on the other law enforcement agencies to report the crimes that are brought to their attention.... The National Incident-Based Reporting System is an event-oriented coverage structure employed by the law enforcement agencies in the United States to collect information on crimes....
15 Pages (3750 words) Essay

Computer Crimes Categories

here does exist at least four classifications of computer crimes.... The paper "computer crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments.... Primarily, cybercrime does utilize the computer to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft.... On the other hand, the prevalence of computers can be associated with crimes....
6 Pages (1500 words) Essay

The Issue and Nature of Computer Crimes

This paper presents a comprehensive study of the Computer crimes, types of computer crimes such as unauthorized access, how to alter websites, malicious program codes including Viruses, Trojan horses, Logical Bomb, Sniffers, Software piracy, Antipiracy, Hacking, aggravation and nuisance, and Cybercrimes.... This paper under the headline "The Issue and Nature of computer crimes" presents a comprehensive study of the main computer crimes problems faced all over the world....
8 Pages (2000 words) Essay

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The other thing that the definition of computer crimes may not be able to highlight is the application that is used in committing an offense or the type of computer hat as used.... Different individuals, organization, and nations define computer crimes differently, hence making it definition to be flexible.... Given these factors then will have to define computer crimes through the meanings of hacking, software piracy, and phreaking.... The essay "Computer Crime and the Measures That Can Curb the crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us