Computer-Related Crime
by Richard Mi

     With the advent of computers, and now the booming of the Internet, the access of information has become freely available and nearly limitless as to the amount of knowledge that is out there. However, there is a price to pay for such a vast amount of information made so easily available. There will be someone out there that will take advantage of this situation, and because of him or her, the rest of the world will suffer the implications of such actions.
 

Annotated Bibliography:

Burkstrand, Beth. "Credit Union Accounts Hit by Cyber-Thieves." Washington Post
     14 Aug. 1998, sec. A: 1+.
     If organizations are not careful about how they manage their finances electronically,
     it is quite feasible that they would be victimized like the credit union described in
     this article. Several experienced hackers using sophisticated software managed to
     break into the database and stole, in piecemeal, approximately $1 million.
Gillen, Marilyn A. "Cyberspies Track I-way Bootleggers." Billboard Jun. 1994: 1+.
     With the advances in technology today, access to (and the ability to create) illegal
     files/products are fast becoming a major problem to the original creators/inventors. In
     order to combat the thieves in an entirely new environ, independent agencies have been
     created with the goal of stopping such illegal activities. The author's inclusion of several
     small quotes from the head of one such agency further defines the extent of the damage
     these thefts of intellectual properties have incurred.
Information War and Cyberspace Secruity. Rand Research Review. Fall 1995.
     A collection of several journal articles reporting incidents of computer-related crime and
     explores possible ways of deterring such actions. These articles are published by a
     highly-regarded research organization. It also includes some statistics relating to
     demographics of criminals.
     <http://www.rand.org/publications/RRR/RRR.fall95.cyber/>
Levi, Carol. "Trading Cards." PC Magazine Apr. 1998: 28+.
     Another major type of computer-related crime is the cause of recent fears in online
     shopping: credit card number theft. If a credit card number is somehow publicized,
     it will be fed to several different "users", and can be abused without a second thought.
     With the fast-paced communication standards of the Internet, the effects can be exponential.
Mi, Richard. Interview. With Mike West. 4 Oct. 1998.
     A brief interview with a Computer Science student who has had some contact with
     computer-related crime before. It briefly covers all types computer-related crime.
     <http://www.cyberramp.net/~paladin2/fortune/e306-2.txt>
Parker, Donn B. Crime by Computer. New York: Charles Scribner's Sons, 1976.
     HV6773 P37 UGL COP.4
     A comprehensive book written by a veteran in dealing with computer-related crimes, this
     book reviews past cases and how each was solved. It also warns what the future might
     bring with rapid advances in technology. Every chapter covers a true incidence in which
     the author was involved, and presented how the crime was committed and the reason
     behind it. A very compelling work since it was published over twenty years ago, when
     computer crimes were not as sophisticated as today.
Sussman, Vic. "Policing Cyberspace." U.S. News & World Report 23 Jan. 1995: 54+.
     Even with the advent of independent research agencies whose sole purpose is to root out
     illegal activities, actual arrests are still performed by law enforcement agencies. But
     in order to make sure no laws are broken and no rights are ignored, even law enforcers
     need to be updated on the new level of battlefield they will be fighting on. Which leads to the
     current need to train new officers to be equally efficient with a handgun and surfing
     the web.
United States. Department of Justice. Computer Crime and Intellectual Property Section.
     Washington: Computer Crime and Intellectual Property Section. 15 Jun. 1998.
     An U.S. government agency dedicated to stopping all computer-related crimes. It also
     contains several documents related to previous cases and different types of
     computer crimes. It has several links to various sites pertaining to the stopping of
     international-scale computer criminals.
     <http://www.usdoj.gov/criminal/cybercrime/index.html>
Vranesevich, John. "Anti-Online". 1996.
     A web site dedicated to publicizing the hacking communities. This site is known
     for commenting on many hacking incidences and have prided itself in its ability to
     interview the perpetrators. In a sense, it acts like a bull horn for those who are
     hidden in the shadows.
     <http://www.AntiOnline.com/>


Blue Group's Webpage
Return to Mysterious Tomes
Return to Barracks Entrance 
Comments, critiques, thoughts. . . 
Copyright 1998
All works presented here are properties of Richard Paladin Mi