These criminals are traced through the computer system, and they are got through computer IP addresses and Mac addresses which are unique with the log files they generate. These are among the various and popular problems of lack of confidentiality and privacy in the computer users. Below is a discussion of various examples of computer crimes.
Some of the contents circulated in computers in various non-specific ways. These may include obscenities, inflammatory and derogatory contents of speech form people focusing on a specific target group in the society e.g. gander, race or religion among other social groups. This can also be used to propel hate speech in political volatile regions and political arrest situation where ethnicity prevails among the leaders.
Fraud is a criminal act that involves false acquisition of money through the use of computer and network system. This includes hacking of bank accounts, vandalism of ATM and the use of fishers to hack password for false transfer of online money. This is an illegal practice and harms the unsuspecting victims.
It is evident that information and technology and government officials have well documented numerous incidents on the breakdown of servers and network infrastructures due to sabotage (Parker, 1983). These criminals pulls down the servers, and stop the normal operation causing loss of data, and siphoning information from the servers and hence causing many institution suffer from computer terrorism