Computer Crime
Join now to read essay Computer Crime
According to term computer crime means Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.
There are many ways to commit computer crime. Some examples of computer crime are:
Accessing a computer, system, or network.
Modifying, damaging, using, disclosing, copying, or taking programs or data.
Introducing a virus or other contaminant into a computer system.
Using a computer in a scheme to defraud.
Interfering with someone elseЎ¦s computer access or use.
Using encryption in aid of a crime.
Falsifying e-mail source information.
Stealing an information service from a provider.
Over the last twenty years, a technological revolution has occurred, as computers are now an essential element of todayЎ¦s society. In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. A definition of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. When computer were first introduced into businesses, computer crime was defined simply as a form of while-collar crimes committed inside a computer system. Computer crimes are hard to define, because the term is not subject to a precise definition, and it requires vast amounts of computer knowledge to understand how and why it happened.
If we defined the term “computer”, it means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device. Computer crime laws in many states prohibit a person from performing certain acts without authorization, including others listed above.
To prevent computer fraud and computer crime the government had to take a few steps. In 1974, they passed a simple Federal Privacy Act of 1974. A decade later, the computer crime was increasing rapidly, the government amended the acts and made it a federal crime. In the summary of the Acts, they are as follows:
Federal Privacy Act of 1974: Goes further that the Freedom of Information Act in that it requires that individuals be able to correct federal information about themselves, by requiring that agency information not be used for alternate purposes without the individuals consent. Under this act an individual may ask a federal judge to order the correction of errors if the federal agency does not do so.
Small Business Computer Security and Education Act of 1984: The act created an educational council that meets annually to advise the Small Business Administration on a variety of computer crime and security issues affecting small business.
Computer Fraud and Abuse Act of 1986: Makes it a federal crime to intentionally access a computer for such purposes as 1) obtaining top-secret military information, personal financial or credit information; 2) committing a fraud; 3) altering or destroying federal information.
Computer Security Act of 1987: Requires more than 550 federal agencies to develop computer security plans for each computer system that processes sensitive information. The plans are reviewed by the National Institute of Standards and Technology (NIST).
Even after passing these acts, computer crime and computer fraud are at the same speed. We will look three case which had have happed in last twenty years.
U.S. v. Ivanov
On July 25, 2003, United States District Judge Alvin W. Thompson sentenced Alexey V. Ivanov, formerly from Chelyabinsk, Russia, at the federal courthouse in Hartford, Connecticut. Ivanov was sentenced to a term of imprisonment of forty-eight months, to be followed by three (3) years of supervised release.
He was charged under the Computer Fraud and Abuse Act (CFAA, 18 U.S.C. Ў± 1030(a)(4)) because his actions effected and were intended to effect computers in Connecticut. Alexsey was thus found to have “obtained value” within the meaning of the CFAA