Crimes With Computers Essay Research Paper Computer

Crimes With Computers Essay, Research Paper

Hire a custom writer who has experience.
It's time for you to submit amazing papers!


order now

Computer Crime

Technology experienced a break-through with the innovation of computing machines. With this break-through came a new pursuit for cognition and power. Society relies more and more on computing machines each twenty-four hours and people have found that a pursuit for cognition or power on a computing machine could give them more than they bargained for.

In the media, the term hacker is frequently defined as a felon, armed with a computing machine, set out to perpetrate malicious Acts of the Apostless. The US Department of Defense estimated that their computing machine systems were attacked 250,000 by hackers in 1995 entirely. That s an onslaught every 30 seconds ( Knittel and Soto 6 ) . This would take most people to believe that hackers were in fact malicious felons. However, a hacker is merely a talented computing machine user with a huge cognition of how computing machines work.

Not all hackers commit malicious Acts of the Apostless. But what acts committed by hackers are considered malicious? The legal definition of a computing machine offense is pending. Lawgivers and computing machine experts have characterized it diversely as utilizing a computing machine to steal money, services, or belongings, or to perpetrate an invasion of privateness or an act of extortion or terrorist act ( Caplan 218 ) . Early hacking was simple and non needfully harmful.

In the early 1970 s, John Draper, a hacker subsequently known as Captain Crunch, discovers that he can do free long distance phone calls by blowing an exact tone into the telephone with a toy whistling from a box of cereal. Draper was arrested several times during the 1970 s for computing machine and phone related offenses. In the late 70 s, two hackers from the Homebrew Computer Club develop devices called blue boxes which tap into the phone system. These two hackers, named Steve Jobs and Steve Wozniak, subsequently went on to establish Apple Computers ( Triguax [ Online ] ) . But it would be in the undermentioned decennaries that hackers would detect merely how far they could force the envelope.

Kevin Mitnick, possibly the most celebrated of all hackers, was arrested on February 14, 1995. Mitnick had been touching constabulary, the FBI, and several other authorities bureaus for over two old ages. During this clip period, Mitnick had stolen 1000000s of dollars worth of information from authorities, corporate, and university computing machine systems ( Shimomura 1 ) . Mitnick was so good respected in the hacking universe that even today, authorities bureaus are having terrorist menaces demanding Mitnick s release from prison.

Today, 1000000s of hackers like Mitnick are surfing the Internet waiting for a computing machine to assail. However, some hackers attack with no purpose of computing machine harm or general injury. These hackers are sometimes called hacktivists. Normally this type of hacker will disfigure authorities and corporate web pages for the intent of presenting a political, spiritual, or societal message. The harm left by these hackers is minimum and really easy to

correct ( Triguax [ Online ] ) .

Security on the Internet is invariably turning bigger and stronger. Law enforcement functionaries have been seeking to utilize this to halt as many hackers as possible. Encrypted watchwords, firewalls, and following devices are all used to postpone hacker activity ( Cozic 34 ) . But hackers are still calculating out ways to transgress security in any manner possible and do themselves bigger and stronger.

With this in head, Canadian psychologist, Marc Rogers, broke down the term hacker into several subgroups to assist constabularies develop condemnable profiles for hackers. Hackers can be profiled as newcomers, hackers, programmers, insiders, or cyber terrorists. Newcomers and hackers are by and large the type of hackers you hear about acquiring caught. These hackers have minimum computing machine cognition and drudge for bangs. With bangs comes boasting about achievements, and crow is the quickest manner to acquire caught. Programmers and insiders are the following groups. Programmers write the plans that hackers use. Insiders account for 70 to eighty per centum of all malicious computing machine offenses. Programmers and insiders are by and large computing machine company employees and have easy entree to computing machine systems. Finally, the most unsafe and ill-famed type of hacker is the cyber terrorist. Cyber terrorists are frequently hired by authoritiess and corporations to steal information or sabotage rival companies. These computing machine experts make big sums of money in this field. They use the most sophisticated equipment available and are seldom caught ( Knittel and Soto 23, 24 ) .

This profile gave an assistance to categorising computing machine offenses and felons and helped give a better apprehension of the degrees of computing machine offense. However, it did non halt or even decelerate the activity of choping. It leaves a individual to inquire if hacking would of all time be eradicated. New computing machine engineering is developed by hackers. So they will ever hold the film editing border on engineering. To extinguish hackers would extinguish all usage of computing machines ( Galley [ Online ] . Possibly things would hold been better that manner in the first topographic point.

Plants Cited

Caplan, David I. , and Diane Sank. Computer Crime. To

Be a Victim. New York: Plenum Press, 1991.

Cozic, Charles P. The Future of the Internet. At

Issue. San Diego: Greenhaven Press, Inc. , 1997.

Galley, Patrick. Computer Terrorism: What are the

Hazards? . [ Online ] Available hypertext transfer protocol: //homer.span.ch/

Spaw1165/infosec/sts_en/crime.html

Knittel, John, and Micheal Soto. The Dangers of

Computer Hacking. New York: Rosen Printing

Group, Inc. , 2000.

Shimomura, Tsutomu. Takedown. New York: Hyperion, 1996

Trigaux, Robert. A History of Hacking. [ Online ]

Available hypertext transfer protocol: //www.sptimes.com/Hackers/history.

hacking.html, February 14, 2001.

332

Categories