Home
Introduction
Abstract
Definition
Nature of Crimes
Fighting Crime
Policy
Prevention
Effectiveness
Detection
Measuring
Crimes of the Future
Information Theft
Cyber-Terrorism
Pop Culture
Links
References
About
|
|
This section gives some background information on computer crime, such
as what types of computer crime seem to occur most often, and how it
has been prevented so far. In truth, computer crime is varied,
perhaps even more than our original definition suggests.
Correspondingly, attempts to curb it have varied as well.
It seems fairly clear, based on anecdotal evidence, that fraud, child
pornography, unauthorized access, and related crimes make up the majority
of computer crime. We already saw that the FBI National Computer Crime
Squad concerns itself primarily with unauthorized access. In addition,
the most common reports or complaints to InterGOV of computer crime were:
1 | Child pornography | 35% |
2 | Fraud (scams) | 33% |
3 | e-mail abuse | 12% |
4 | Missing Children | 9% |
5 - 10 | Stalking,
Copyright Violations,
Harassment/Threats,
Children (Abused),
Hacking/Viruses,
Other"
| (remaining 11%) |
["Latest Web" 3]
Meanwhile, the most common reports to Internet Fraud Watch between January
and June 1998 were:
- "Web Auctions - items bid for but never delivered by the
sellers, value of items inflated, shills suspected of driving up
bids;
- General Merchandise - sales of everything from T-shirts to
toys, calendars and collectibles, goods never delivered or not as
advertised;
- Internet Services - charges for services that were supposedly
free, payment for online and Internet services that were never
provided or falsely represented;
- Hardware/Software - sales of computer products that were never
delivered or misrepresented;
- Pyramids/MLM's - schemes in which any profits were made from
recruiting others, not from sales of goods or services to
end-users;
- Business Opportunities/Franchises - empty promises of big
profits with little or no work by investing in pre-packaged
businesses or franchise opportunities;
- Work-At-Home Plans - materials and equipment sold with false
promise of payment for piece work performed at home;
- Advance Fee Loans - promises of loans contingent on the
consumer paying a large fee in advance. Once the fee is paid, the
loans are never disbursed;
- Credit Repair - fraudulent promises to remove accurate negative
information from a consumers credit report;
- Credit Card Issuing - false promises of credit cards to people
with bad credit histories on payment of up-front fees."
[McKee 2-3]
To many, it is surprising that breaking into computer system composes
substantially less than ten percent of all computer crimes reported.
For most of the commonly reported crimes (child pornography, e-mail
abuse, etc.), it is clear how they are carried out. But, systems are
"cracked" (broken into) using many different techniques. Some of these
offensive techniques include: packet sniffers, password crackers,
worms, Trojan horses, spoofing mechanisms, ping, and diagnostic tools
like traceroute, to name a few.
|