Полнотекстовый поиск:
Где искать:
только в названии
только в тексте
слова в тексте
только заголовок

Рекомендуем ознакомиться

Остальные работы->Реферат
Huckleberry Finn, The Great Gatsby, and Ethan Frome were books written by three different authors and may have seemed completely different. The main c...полностью>>
Остальные работы->Реферат
Know thyself, advised an inscription on the ancient Temple of Apollo at Delphi. But what is it that you know when you know yourself? How do you gain t...полностью>>
Остальные работы->Реферат
In George Orwell?s 1984, the Party, the government of Oceania, has many slogans. One of the sayings is ?Big Brother Is Watching You?. Despite the fact...полностью>>
Остальные работы->Реферат
Ecuador, South America s second smallest country, is regarded as one of the most geographically and ethnically diverse countries on the continent. Thi...полностью>>

Главная > Реферат >Остальные работы

Сохрани ссылку в одной из сетей:

Computer Crime 4 Essay, Research Paper

It’s the weekend. You have nothing to do so you decide to play around on your computer. You turn it on, start it up, and start calling people with your modem, connecting to another world. People just like you are a button press away. This is all fine but what happens when you start getting into other peoples computer files. It becomes a crime. What is a computer crime really? Obviously it involves the use of a computer. These crimes are: Hacking, Phreaking, & Software Piracy.

To begin I will start with Hacking, what is hacking. Hacking is basically using your computer to “Hack” your way into another. Hackers use programs called scanners. Scanners randomly dial numbers. Numbers generating tones or carriers are recorded. These numbers are looked at by hackers and then reused. When the hacker calls up the number and gets on he’s presented with a logon prompt. This is where the hacking really begins. Hackers try to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it? Lets go to a book and see “Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are merely out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing . I have a hard time believing that so lets see what a “hacker” has to say about what he does “Just as they were enthralled with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it’s in the pursuit and capture of knowledge. as you can see the “hacker” doesn’t go out to do destroy things although some do.

It’s in the pursuit of knowledge. Of course, this is still against the law. This all started at a prestigious educational institute. MIT is where hacking started. The educated there would learn and explore computer systems all around the world. In the views of professional hacking, hacking is like a drug or any other addictive substance, it’s an addiction for the mind and once started it’s difficult to stop. This could be true, as hackers know what they are doing is wrong and they know odds are they will be caught.

As I mentioned some hackers are just above average criminals, using their skills to break in banks and other places where they can get money, or where they can destroy information. What a hacker does at a bank is take a few cents or even a few fractions of a cents from many different accounts this may seem like nothing but when all compiled can be a lot. A stick up robber averages about $8,000 each “job”, and he has to put his life and personal freedom on the line to do it while the computer hacker in the comfort of his own living room averages $500,000 a “job”. As for people destroying information, this is for taking some one down; destruction of data could end a business, which for some is very tempting. It can cost a company thousands of dollars to restore the damage done.

Now that you have an understanding of what a “hacker” is, it time to move on to someone who closely associates with a hacker. This is a Phreak, What s a phreak? For the answer we turn to what is known as the “Official Phreakers Manual ”

Phreak :


1. The action of using mischievous and mostly illegal ways in order to not pay for some sort of telecommunications bill, order, transfer, or other service. It often involves usage of highly illegal boxes and machines in order to defeat the security that is set up to avoid this sort of happening.


v. 2. A person who uses the above methods of destruction and chaos in order to make a better life for all. A true Phreakers will not go against his fellows or rat on people who have ragged on him or do anything termed to be dishonorable to Phreak.


n. 3. A certain code or dialup useful in the action of being a Phreak. (Example: “I hacked a new metro Phreak last night.”)”

The latter 2 ideas of what a Phreak is, is rather weird. A Phreak like the hacker likes to explore and experiment, however his choice of exploring is not other computer but the phone system as a whole. Phreaks explore the phone system finding many different ways to do things, most often make free calls. Why do they do this, A hacker and Phreakers will have need to use telephone systems much more than an average individual, therefore, methods which can be used to avoid toll charges are in order. A Phreak has two basic ways of making free calls, he can call up codes or PBXs on his phone and then enter a code and make his call or he can use Electronic Toll Fraud Devices. Codes are rather easy to get, the Phreak will scan for them, but unlike a hacker will only save the tone(s) number instead of the carrier(s). Then he will attempt to hack the code to use it, these codes range from numbers 0 – 9 and can be any length, although most are not more than 10. Electronic Toll Fraud Devices are known as Boxes in the underground. Most are the size of a Walkman, or they can be smaller or bigger. I will not go too deep. They are electronic devices than do various things, such as make outgoing calls free, receive incoming calls free, simulate coins dropping in a phone, etc. People who “Phreak” are caught often in this age of new technology.

Software Piracy is the most common computer crime, it is the illegal coping of software. “People wouldn’t think of shoplifting software from a retail store, but don’t think twice about going home and making several illegal copies of the same software.” And this is true because I myself am guilty of this, and most computer users are. The major problem is not people going out and buying the software then making copies for everyone, it’s the Bulletin Boards that cater to pirating software, that really cause the problem. On anyone one of these boards one can find an upwards of 300 – 1000+ of pirated software open for anyone to take. This is a problem and nothing can really be done about it. Few arrests are made in this area of computer crime.

I will now devote a brief section to the above-mentioned BBS (Bulletin Board System). Most are legal and do nothing wrong. However there are many more that do accept pirated software, pornographic pictures, animations, and texts as well as a trading area for phone codes, other BBS’, Credit Card numbers, etc. This is where a majority of Hackers and Phreak come, as well as those who continue to pirate software come to meet and share stories. In this is a new world, where you can do anything, there are groups that get, crack, and courier software all over the world some of them are called:

INC: International Network Of Crackers, THG: The Humble Guys, TDT: The

Dream Team. As well a number of other groups have followed suit such

as Phalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and YAM

(Youngsters Against McAfee)

These are virus groups who write and courier their work anywhere they can, they just send it somewhere, where anyone can take it and use it in any manner they wish, such as getting even with someone. All of these activities are illegal but nothing can be done, the people running these boards know what they are doing. As it stands right now, the BBS world is in two parts Pirating and the Underground, which consists of Hackers/Phreakers/Anarchists/Carders (Credit Card Fraud)/Virus programmers. All have different boards and offer a variety of information on virtually any subject.

Well from all of this reading you just did you should have a fairly good idea of what computer crime is. I didn’t mention it in the sections but the police; phone companies are arresting and stopping a lot of things every day. With the new technology today it is easier to catch these criminals then it was before. With the exception of the BBS’ the police have made some major blows busting a few BBS’, arresting hackers and Phreaks. All of which were very looked up to for knowledge in their areas of specialty. If I had more time I could go into these arrests but I must finish by saying that these are real crimes and the sentences are getting harsher, with a lot of the older people getting out the newer people are getting arrested and being made examples of. This will deter a lot of would-be computer criminal away.

Загрузить файл

Похожие страницы:

  1. Computer Crime 2 Essay Research Paper Billions

    Реферат >> Остальные работы
    Computer Crime 2 Essay, Research Paper Billions of ... computer. As virtual reality becomes increasingly sophisticated, it ... and motivation is high–it’s fun, exciting, challenging ... using a computer, come with their disadvantages, computer crime in it s worst ...
  2. Computer Crime 3 Essay Research Paper Ever

    Реферат >> Остальные работы
    Computer Crime 3 Essay, Research Paper Ever since I got my first computer. I have enjoyed working on them. I ... phone companies. In the book Computer Crime it states, most people commit ... is exploit systems not destroy it. It is purely intellectual. I know ...
  3. Computers Help Police Essay Research Paper Computers

    Реферат >> Остальные работы
    Computers Help Police Essay, Research Paper Computers help police officers that work in the field. Computers ... answers on who possibly did a crime. Police computers can compare a bullet casing ... a crime scene with its database and find what kind of bullet it ...
  4. Computer Hackers Essay Research Paper It seems

    Реферат >> Остальные работы
    Computer Hackers Essay, Research Paper It seems that the term ... world of high-tech crime is often too complex ... budgets to fight cyber crime and defend against infowar ... presidential commission. Jim Christie, a computer crime investigator for the Pentagon, whose ...
  5. Computer Decency Act Essay Research Paper Computer

    Реферат >> Остальные работы
    Computer Decency Act Essay, Research Paper Computer ScienceGovernment Intervention of the InternetDuring ... passing laws that will make it a crime punishable by jail to send ... Mellon’s Attempt to BanSex from it’s Campus Computer Network Sends A Chill Along ...

Хочу больше похожих работ...

Generated in 0.0018370151519775