Computer-Related Crime
by Richard Mi
With the advent of computers, and now the booming
of the Internet, the access of information has become freely available
and nearly limitless as to the amount of knowledge that is out there. However,
there is a price to pay for such a vast amount of information made so easily
available. There will be someone out there that will take advantage of
this situation, and because of him or her, the rest of the world will suffer
the implications of such actions.
Annotated Bibliography:
Burkstrand, Beth. "Credit Union Accounts Hit by Cyber-Thieves." Washington
Post
14 Aug. 1998, sec. A: 1+.
If organizations are not careful about how
they manage their finances electronically,
it is quite feasible that they would be victimized
like the credit union described in
this article. Several experienced hackers
using sophisticated software managed to
break into the database and stole, in piecemeal,
approximately $1 million.
Gillen, Marilyn A. "Cyberspies Track I-way Bootleggers." Billboard
Jun. 1994: 1+.
With the advances in technology today, access
to (and the ability to create) illegal
files/products are fast becoming a major problem
to the original creators/inventors. In
order to combat the thieves in an entirely
new environ, independent agencies have been
created with the goal of stopping such illegal
activities. The author's inclusion of several
small quotes from the head of one such agency
further defines the extent of the damage
these thefts of intellectual properties have
incurred.
Information
War and Cyberspace Secruity. Rand Research Review. Fall 1995.
A collection of several journal articles reporting
incidents of computer-related crime and
explores possible ways of deterring such actions.
These articles are published by a
highly-regarded research organization. It
also includes some statistics relating to
demographics of criminals.
<http://www.rand.org/publications/RRR/RRR.fall95.cyber/>
Levi, Carol. "Trading Cards." PC Magazine Apr. 1998: 28+.
Another major type of computer-related crime
is the cause of recent fears in online
shopping: credit card number theft. If a credit
card number is somehow publicized,
it will be fed to several different "users",
and can be abused without a second thought.
With the fast-paced communication standards
of the Internet, the effects can be exponential.
Mi, Richard. Interview.
With Mike West. 4 Oct. 1998.
A brief interview with a Computer Science
student who has had some contact with
computer-related crime before. It briefly
covers all types computer-related crime.
<http://www.cyberramp.net/~paladin2/fortune/e306-2.txt>
Parker, Donn B. Crime by Computer. New York: Charles Scribner's
Sons, 1976.
HV6773 P37 UGL COP.4
A comprehensive book written by a veteran
in dealing with computer-related crimes, this
book reviews past cases and how each was solved.
It also warns what the future might
bring with rapid advances in technology. Every
chapter covers a true incidence in which
the author was involved, and presented how
the crime was committed and the reason
behind it. A very compelling work since it
was published over twenty years ago, when
computer crimes were not as sophisticated
as today.
Sussman, Vic. "Policing Cyberspace." U.S. News & World Report
23 Jan. 1995: 54+.
Even with the advent of independent research
agencies whose sole purpose is to root out
illegal activities, actual arrests are still
performed by law enforcement agencies. But
in order to make sure no laws are broken and
no rights are ignored, even law enforcers
need to be updated on the new level of battlefield
they will be fighting on. Which leads to the
current need to train new officers to be equally
efficient with a handgun and surfing
the web.
United States. Department of Justice. Computer
Crime and Intellectual Property Section.
Washington: Computer Crime and Intellectual
Property Section. 15 Jun. 1998.
An U.S. government agency dedicated to stopping
all computer-related crimes. It also
contains several documents related to previous
cases and different types of
computer crimes. It has several links to various
sites pertaining to the stopping of
international-scale computer criminals.
<http://www.usdoj.gov/criminal/cybercrime/index.html>
Vranesevich, John. "Anti-Online".
1996.
A web site dedicated to publicizing the hacking
communities. This site is known
for commenting on many hacking incidences
and have prided itself in its ability to
interview the perpetrators. In a sense, it
acts like a bull horn for those who are
hidden in the shadows.
<http://www.AntiOnline.com/>
Blue Group's
Webpage
Return
to Mysterious Tomes
Return to Barracks
Entrance
Comments, critiques, thoughts.
. .
Copyright 1998
All works presented here are properties of Richard Paladin Mi