GEN 110-10: Freshman Seminar: Computers and Society

Dr. R. M. Siegfried

Computer Crime

What is Computer Crime?

Generally, it is defined as a crime requiring the help of a computer.

The United States Department of Justice defines computer crime as "any illegal act for which knowledge of computer technology is essential for its penetration, investigation or prosecution." This includes:

The National Institute of Justice's report on "Dedicated Computer Crime Units" defines computer crime, as "any illegal act for which knowledge of computer technology is used to commit the offense."

According to Hugh Cornwall, most computer crime is ordinary crime that at one point involves a computer. Very few require a lot of technical expertise.

Examples of Computer Crime

J. Thomas McEwen classifies computer crime into five categories:

Stacey Edgar adds cyberterrorism.

Extent of Computer Crime

It is very difficult to say the extent of computer crime:

Crimes Against Computers

Usually involves damage to computer or computer data:

Terrorist attacks on computer systems have happened, although the usual target is the data, not the machines. These have included:

Software theft and industrial espionage is "big business"; in the early 1980s, the FBI and IBM caught Hitachi in a "sting" " Hitachi was trying to steal designs of IBM's 308X computer.

Computers themselves are frequently stolen:

Crimes Using Computers

The computer is less often the target and more often a tool in committing crime. This can take many forms:

Embezzlement By Computer

Theft of Services

People have stolen telephone calling cards and credit card numbers, tapped into telephone lines, used computers to break into switching systems and PBXs (private branch exchanges). Large companies have lost hundreds of thousands of dollars from these calls.

Theft of Information

Sometimes the lost of information is more devastating than loss of material assets.

  • A former law enforcement officer used data from 3 different agencies to track down a former girlfriend and kill her.
  • Computer disks with telemetry data for the America's Cup race were stolen andheld for ransom; they were recovered without payment.
  • Fifteen auto salesmen in Newark were charged with using 450 fake credit records to steal millions of dollars.
  • Phony "credit doctors" used credit data taken from the Credit Bureau of Greater Houston to clients use other people's credit histories.
  • Fraud

    Although fraud doesn't require a computer, a computer makes it much easier:

  • Three men working at a travel agency created fictitious "frequent flyer" accounts and credited them with miles belonging to clients who were not members of the frequent-flyer programs. They sold or gave away the airline tickets obtained from the frequent-flyer miles, defrauding American Airlines of $1.3 million.
  • Four college students bought $100,000 worth of merchandise using stolen credit card numbers.
  • A computer program called Credit Master was available online. Credit Master can create potentially valid credit card numbers.
  • A dairy and produce store removed $17.1 million in sales to avoid paying taxes on them.
  • Are stores cheating or merely careless when they have an inaccurate price stored in the computer associated with a UPC (Universal Product Code)?
  • Can elections be won fraudulently? Ask Al Gore! (Gore v. Bush, 2000)
  • Doctored Documents

    Computers have made the doctoring of photographs and moving pictures relatively easy. Have does this affect their use as evidence? How does it our ability to rely on them as proof of what someone says?

    Phishing and Identity Theft

    Identity theft occurs when someone takes information about you and uses it to pass themselves as you. They can be done by filing false Change of Address Forms or through getting access to copies of your personal data (e.g., your wallet, you bank passbook, etc.). Their goal is to get their hands on available information about you.

    Phishing is another methods to acquire information about potential victim. Phishing involves conning a potential; victim to reveal information about themselves under false pretense. This can involve an e-mail designed to make the user believe that it came from a reliable source (e.g., American Express, your local bank, PayPal). Most tell you that you need to confirm basic personal information such as account numbers, passwords, PINs, etc. Once they have this information, they withdraw funds from your account or charge purchases to your account.

    Real businesses will never actively ask for this kind of information over the phone or by e-mail.

    The Nigerian Bank Scam is a basic variation on phishing. There are many forms of the Nigerian Bank scam (e.g., Mr. John Doe died leaving his widow and children a large fortune that they need to have smuggled out of the country and they want to wire it to you; you are promised a commission for helping in this regard. All they need is your bank information1.

    Cyberstalking

    Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications1.

    Cyberstalking is a relatively new phenomenon. With the decreasing expense and thereby increased availability of computers and online services, more individuals are purchasing computers and "logging onto" the Internet, making another form of communication vulnerable to abuse by stalkers.

    Cyberstalkers target their victims through chat rooms, message boards, discussion forums, and e-mail. Cyberstalking takes many forms such as: threatening or obscene e-mail; spamming (in which a stalker sends a victim a multitude of junk e-mail); live chat harassment or flaming (online verbal abuse); leaving improper messages on message boards or in guest books; sending electronic viruses; sending unsolicited e-mail; tracing another person's computer and Internet activity, and electronic identity theft.

    Similar to stalking off-line, online stalking can be a terrifying experience for victims, placing them at risk of psychological trauma, and possible physical harm. Many cyberstalking situations do evolve into off-line stalking, and a victim may experience abusive and excessive phone calls, vandalism, threatening or obscene mail, trespassing, and physical assault.

    With personal information becoming readily available to an increasing number of people through the Internet and other advanced technology, state legislators are addressing the problem of stalkers who harass and threaten their victims over the World Wide Web. Stalking laws and other statutes criminalizing harassment behavior currently in effect in many states may already address this issue by making it a crime to communicate by any means with the intent to harass or alarm the victim.

    States have begun to address the use of computer equipment for stalking purposes by including provisions prohibiting such activity in both harassment and anti-stalking legislation.

    Organized Computer Crime

    Organized computer crime takes several different forms:

    Counterfeiting

    Counterfeiting no longer requires great skill and special equipment; anyone with a scanner, a computer and a laser printer (or a high-quality copier) can do high-quality forgery. This forgery can include:

    Many governmental agencies and privates businesses are taking measures to prevent their documents from being forged:

    Profile of a Typical Computer Criminal

    The typical computer criminal is a young, talented employee working in a position of trust within the company. Most regard themselves as modern-day "Robin Hoods." The median age is 25. Most work alone unless it become crucial to gain the assistance of another.

    Only 3% of computer breaches are by outsiders, according to R. J. Milford Associates. 13% are by dishonest employees, 6% by disgruntled employees and 65% are by mistake.

    Types of computer criminal

    1 http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458

    [Back to the Notes Index]