Addressing the Increase in the number and Types of Computer Crimes

THESIS: Laws must be passed to address the increase in the number and types of computer crimes.

 

Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today’s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

 

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

 

Some new terms have been added to the computer criminal vocabulary. “Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44)

Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B

13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information.

This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

 

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

 

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

 

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview)

 

Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

 

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93, p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

 

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46)

 

Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven)

“Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges’ computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper.

In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

 

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class actionsuits.

 

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be 
devised.

However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

 

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 
26,

1993, B, 1:2.

 

Carley, W. “As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm”. Wall

Street Journal, Aug. 27, 1992, A, 1:1.

 

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job”.

Wall Street Journal, Aug 27, 1992, A, 7:5.

 

Markoff, J. “Hackers Indicted on Spy Charges”. New York Times, Dec. 8, 1992, B, 
13:1.

 

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer 
World,

Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik.

Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, 1993, 7, 16:2.

Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20, 1992, 7, 18:3.

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, Nov. 15, 1992, 1, 40:4. 
2600: The Hacker Quarterly. Issues summer 92-Spring 93. Compiled by Emmanuel G

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers

Criminal offender who committed crimes due to a biological reason

Choose a criminal offender who committed crimes due to a biological reason.

Write a 1,400- to 2,100-word paper discussing the genetic or physiological evidence that supports the notion that biology played a key role in explaining the offender’s criminality.

Research the behaviors that constitute psychopathy. Discuss in detail the specific behaviors demonstrated by the offender that align with behaviors indicative of a psychopathic individual. Case examples include the following:

  • Andrea Yates and the documented evidence of psychiatric issues, including post-partum depression, prior to the murders of her five children
  • Charles Whitman, known as the Texas Tower Sniper, and the presence of a tumor discovered post-mortem alleged to have played a role in his overt acts of aggression
  • John Hinckley, Jr. and the documented evidence of psychiatric issues leading to his controversial insanity defense in the shooting of President Ronald Reagan

Include at least two academic references.

Format your paper consistent with APA guidelines.

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers

Analyze the psychological history or path that took the criminal to commit his or her crime(s).

Analyze the psychological history or path that took the criminal to commit his or her crime(s)..

Explore, in depth, one well-known criminal case. You may select your own case, or select from one of the following on the attached list. Your case study should focus on the following:

Summarize the case, including a description of the offense(s), the investigation, and the outcome (such as the trial and sentencing).
Analyze the psychological history or path that took the criminal to commit his or her crime(s). Describe the psychological, behavioral, environmental, and cognitive factors that you believe led to the offender’s criminality. Consider the various theories we have discussed in class including the psychoanalytic/psychodynamic theory, the behaviorist/social learning theory, the cognitive/social cognitive theory, and the humanist and interactionist theories, and provide examples. The goal here is to provide an analysis of the psychological history or path that took the criminal to commit his or her crime(s). Explain the impact of social, psychological, and biological theories of aggression on your chosen criminal’s behavior.
Describe the crime typology. Did the offender have a personality disorder that might have played a role in the criminal behavior? If so, explain and provide examples and supporting references. Discuss the laws that are in place for protecting individuals with mental disorders.
Describe whether your case study was a homicide offender or sexual offender. Discuss the typology (i.e., single murderer, serial murderer, spree murderer, mass murderer, child molester, or rapist).
If applicable, discuss whether your offender was given a competence to stand trial evaluation, or was found to be not guilty by reason of insanity. Examine the ethical issues concerning evaluation and treatment of competence to stand trial and not guilty by reason of insanity cases.
Discuss the ethical issues surrounding the case.
Support the outcome of the case with your analysis or provide support of the alternative.

Analyze the psychological history or path that took the criminal to commit his or her crime(s).

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers

Evaluate the ethical responsibilities of intervening to deter crimes involving genetic or neurochemical disorders.

Evaluate the ethical responsibilities of intervening to deter crimes involving genetic or neurochemical disorders..

Evaluate the ethical responsibilities of intervening to deter crimes involving genetic or neurochemical disorders.

In 1,000-1,250 words, do the following:

  1. Analyze if biological or environmental factors drive criminal behavior. Consider research on twins.
  2. Describe social influences that may lead to individuals who engage in criminal behaviors.
  3. Evaluate the ethical responsibilities of intervening to deter crimes involving genetic or neurochemical disorders.
  4. Assess if individuals, who display predisposed criminal behavior, should be treated differently by the legal system.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Evaluate the ethical responsibilities of intervening to deter crimes involving genetic or neurochemical disorders.

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers

Between June 2014 and October of 2016, 9 members of the Baltimore Gun Trace Task Force committed a number of crimes in one of the largest abuse of power scandals in U.S. history.

Between June 2014 and October of 2016, 9 members of the Baltimore Gun Trace Task Force committed a number of crimes in one of the largest abuse of power scandals in U.S. history..

Baltimore Gun Trace Task Force

Introduction

Between June of 2014 and October of 2016, 9 members of Baltimore’s Gun Trace Task Force(GTTF) unleashed terror on the people of Baltimore. Armed robberies, grand theft, and even the sale of confiscated drugs were their tools. Through one of the single largest abuses of power, the nine officers involved were able to extort hundreds of thousands in cash.

Analysis

1. Between June 2014 and October of 2016, 9 members of the Baltimore Gun Trace Task Force committed a number of crimes in one of the largest abuse of power scandals in U.S. history.

2. Involved in the scandal were Det. Daniel Hersl, Det. Marcus Taylor, Sgt. Thomas Allers, Sgt. Wayne Jenkins, Det. Momodu Bondeva Kenton Gondo, Det. Evodio Hendrix, Det. Jemell Raym, Det. Maurice Ward, and Officer Eric Snell. Seven of the nine officers plead guilty to a number of federal charges and two were charged and convicted. There were a number of charges filed against each officer.

3. The conduct of these officers destroyed an already strained relationship between the police and their community. The conduct forced the citizens of the city of Baltimore to live in fear of rogue cops.

4. Overall, the lack of discretion is truly astounding. A complete lack of oversite, combined with poor values lead to these actions. Once the leader of the unit signed off or allowed these actions to take place, the mob mentality prevailed. It was a clear failure of integrity and morals at every level.

5. Stricter oversight has been implemented. A greater system of checks and balances now exists within the department. It is clear that just like in the Stanford Prison Experiment, when given unchecked power, it will be abused.

Conclusion

The actions that took place over the course of two years represented a failure on all levels. Yes, the leader of the unit is to blame, but so is his leadership. Also, the subordinate officers are equally responsible. Their lack of morals allowed the scandal to continue.

Between June 2014 and October of 2016, 9 members of the Baltimore Gun Trace Task Force committed a number of crimes in one of the largest abuse of power scandals in U.S. history.

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers

crimes committed by teens. The proposed

crimes committed by teens. The proposed.

“Candidate Florent is obviously the better man for the job. No one can match his education and experience.”

This quote shows that the reporter


Question 8 (Multiple Choice Worth 3 points)

(Policy and Elections 3.05 MC)<object:standard:ss.912.c.2.13>

“When our vital interests are challenged, or the will and conscience of the international community defied, we will act with peaceful diplomacy whenever possible, with force when necessary.”—President Clinton, 1993 Inaugural Address

In this quote, President Clinton


Question 9 (Multiple Choice Worth 3 points)

(Policy and Elections 3.04 LC)<object:standard:ss.912.c.2.15>

Interest groups consist of


Question 10 (Multiple Choice Worth 3 points)

(Policy and Elections 3.06 LC)<object:standard:ss.912.c.2.16>

Since the 2000 election, youth voter turnout in presidential elections has generally


Question 11 (Multiple Choice Worth 3 points)

(Policy and Elections 3.01 LC)<object:standard:ss.912.c.3.3>

The legislative branch has the power to


Question 12 (Multiple Choice Worth 3 points)

(Policy and Elections 3.03 MC)<object:standard:ss.912.c.3.5>

A law that limits the content of popup advertisements on the Internet would be enforced by the


Question 13 (Multiple Choice Worth 3 points)

Map of the United States titled National Population Change by State: 2000-2010. States showing a loss: MI. States with 0-5 percent population increase: ND, IA, IL, MS, LA, OH, WV, PA NY, ME, VT, MA, RI,CT NJ. States with 5-15 percent population increase: CA, OR, WA, MT, WY, NM, SD, NE, KS, OK, MN, MO, AR, IN, KY, TN, AL, NH, DE MD, DC, AK, HI. States with 15-25 percent population increase: ID, UT, AZ, CO, TX, FL, GA, SC, NC. States with 25 percent and above population increase: NV.

(Policy and Elections 3.06 MC)<object:standard:ss.912.g.4.1>


Public Domain

Which of the following states had the greatest gain in population between the years 2000 and 2010?


Question 14 (Multiple Choice Worth 3 points)

Map of the United States titled National Population Change by State: 2000-2010. States showing a loss: MI. States with 0-5 percent population increase: ND, IA, IL, MS, LA, OH, WV, PA NY, ME, VT, MA, RI,CT NJ. States with 5-15 percent population increase: CA, OR, WA, MT, WY, NM, SD, NE, KS, OK, MN, MO, AR, IN, KY, TN, AL, NH, DE MD, DC, AK, HI. States with 15-25 percent population increase: ID, UT, AZ, CO, TX, FL, GA, SC, NC. States with 25 percent and above population increase: NV.

(Policy and Elections 3.06 MC)<object:standard:ss.912.g.4.1>


Public Domain

Which of the following southern states had the least gain in population between the years 2000 and 2010?


Question 15 (Multiple Choice Worth 3 points)

(Policy and Elections 3.05 MC)<object:standard:ss.912.c.2.12>

Which of the following is an example of the President using new technology of the time period to connect with the American people?


Question 16 (Multiple Choice Worth 3 points)

(Policy and Elections 3.05 MC)<object:standard:ss.912.c.2.12>

It “is no gimmick, and nobody will ever be elected to major office again without presenting themselves well on it.”—Nixon campaign consultant Roger Ailes, 1968

The quote is in reference to the


Question 17 (Multiple Choice Worth 3 points)

(Policy and Elections 3.04 MC)<object:standard:ss.912.c.2.15>

Which of the following is an example of the positive effect media has on the American system of government?


Question 18 (Multiple Choice Worth 3 points)

(Policy and Elections 3.04 MC)<object:standard:ss.912.c.2.15>

Political parties influence public policy because they


Question 19 (Multiple Choice Worth 3 points)

(Policy and Elections 3.03 MC)<object:standard:ss.912.c.3.4>

Section 2 of Article II of the Constitution gives the president the ability to pardon offenses made against the United States except in cases of


Question 20 (Multiple Choice Worth 3 points)

(Policy and Elections 3.03 MC)<object:standard:ss.912.c.3.4>

Which of the following is not a constitutional role of the president?


Question 21 (Multiple Choice Worth 3 points)

(Policy and Elections 3.03 MC)<object:standard:ss.912.c.3.4>

According to the U.S. Constitution, which of the following people would be eligible to run for U.S. president?


Question 22 (Multiple Choice Worth 3 points)

Line graph titled Percent of Voter Turnout and Registration Rates (Ages 18-29) in Presidential Elections, 1972-2004. The data is represented by three lines on the graph. The green line indicates the Voter Turnout Rate (Registered Voter) and shows the following data points: 1972-88 percent, 1976-84 percent, 1980-82 percent, 1984-80 percent, 1988-79 percent, 1992-88 percent, 1996-70 percent, 2000-73 percent, 2004-80 percent. The purple line indicates the Registration Rates and shows the following data points: 1972-63 percent, 1976-58 percent, 1980-58 percent, 1984-60 percent, 1988-57 percent, 1992-62 percent, 1996-62 percent, 2000-63 percent, 2004-70 percent. The orange line indicates the Voter Turnout Rate (all citizens) and shows the following data points: 1972-55 percent, 1976-50 percent, 1980-50 percent, 1984-51 percent, 1988-42 percent, 1992-54 percent, 1996-40 percent, 2000-40 percent, 2004-51 percent.

(Policy and Elections 3.06 MC)<object:standard:ss.912.c.2.16>


© 2012 FLVS

Between the years 1996 and 2004,


Question 23 (Multiple Choice Worth 3 points)

Bar graph titled Percentage of First-Time in Presidential Elections Among 18-29 Year-Old Voters. The green bar indicates the percentage of first time voters in 2000. The purple bar indicates the percentage of first time voters in 2004. The green bar indicates a percentage of approximately 42 percent. The purple bar indicates a percentage of approximately 33 percent.

(Policy and Elections 3.06 MC)<object:standard:ss.912.c.2.16>


© 2012 FLVS

Based on this graph of the 2000 and 2004 presidential elections, 18- to 29-year-olds were


Question 24 (Multiple Choice Worth 4 points)

Cartoon that shows hands of a white male reaching down to grab the hands of a black male. The arms are of the white male are covered by a judges robe, with the left arm labeled Supreme Court. A caption below the cartoon reads "A Hand Up-".

(Policy and Elections 3.05 HC)<object:standard:ss.912.c.2.13>


© 2012 AP Images

This image was published in the late 1960s during the Civil Rights Movement. Which of the following reflects true statements about the image?


Question 25 (Multiple Choice Worth 3 points)

(Policy and Elections 3.01 MC)<object:standard:ss.912.c.3.3>

Where do the House and Senate differ in the lawmaking process?


Question 26 (Multiple Choice Worth 3 points)

(Policy and Elections 3.01 MC)<object:standard:ss.912.c.3.3>

According to Article I of the U.S. Constitution, who has the power to “To establish an uniform Rule of Naturalization”?


Question 27 (Multiple Choice Worth 3 points)

(Policy and Elections 3.01 MC)<object:standard:ss.912.c.3.3>

According to Article I of the Constitution, who has the ability to approve foreign treaties?


Question 28 (Essay Worth 9 points)

(Policy and Elections 3.01 HC)<object:standard:ss.912.c.2.11>

Imagine your local city council is considering a city-wide curfew in response to a recent increase in crimes committed by teens. The proposed curfew would prohibit unsupervised children under 17 from being out after 9:00 p.m. on weekdays, and after 10:00 p.m. on weekends.  Some believe the curfews is a good prevention tool, keeping at-risk kids from becoming victims or criminals. Opponents argue confining innocent youth to their homes does not make young people more responsible. In a well-written paragraph, analyze whether the benefits of creating this curfew are worth the costs. Use examples from personal experience or the module to support your answer.


Question 29 (Essay Worth 9 points)

(Policy and Elections 3.04 HC) 
<object:standard:ss.912.c.2.15>

Answer the following question in one to two well-written paragraphs. Which of the following have the greatest impact in determining and shaping public policy – political parties or interest groups? Be sure to explain your reasoning and support your answer with at least one example.

crimes committed by teens. The proposed

Place this order or similar order and get an amazing discount.

Simple Steps to get your Paper Done
For Quality Papers