StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The history of computer crimes - Term Paper Example

Cite this document
Summary
Since the dawn of the computer and technological age, computer crimes have evolved just as intricately and as surely as the advancements and upgrades in computer technology. With each upgrade and improvement in computers, crimes involving computers are also being upgraded…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
The history of computer crimes
Read Text Preview

Extract of sample "The history of computer crimes"

Download file to see previous pages

In 1969, a student riot in Canadian school building resulted to damages totaling around $2 million. The students were protesting against a racist professor when their riots resulted to a fire breaking out and destroying computers and other university property. 97 students were arrested in the incident (Concordia University, 2008). In 1970, several computer crimes were reported. A bomb at the University of Wisconsin resulted to $16 million worth of computer damage; a Molotov cocktail bomb caused $1 million damage to the Fresno State College; and students at the New York University wanting to free a jailed Black Panther damaged computers by placing fire-bombs on top of the Atomic Energy Commission (Kabay, 2008).

Computers were often damaged during the 1970s in order to make a statement; antiwar protests in Australia resulted to the shooting of an American firm’s computers; terrorists poured gasoline on a university’s computers and burned them; and a peace activist destroyed a computer at the Vanderburg Air Base in California as a sign of protest against American military policies (Kabay, 2008). From 1970 to 1972, Albert the Saboteur created problems for the National Farmers Union Service Corporation of Denver.

Albert enjoyed having the repair crews over every time the computer crashed. As a result, he deliberately caused the computers to crash about 50 times in the span of 2 years. He lived an isolated life as a night shift operator. He finally got company and human interaction because of the computer crashes, and he could not help but cause one crash after another just to have company (Kabay, 1996). In 1970, Jerry Schneider posed as a PT&T employee and ordered $30,000 worth of equipment from PT&T.

He retrieved PT&T computer printouts from dumpsters. He was later able to collect detailed information on various procedures in the company and as a result was able to successfully steal $1 million worth of equipment from

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The history of computer crimes Term Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
The history of computer crimes Term Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1555419-the-history-of-computer-crimes
(The History of Computer Crimes Term Paper Example | Topics and Well Written Essays - 1250 Words)
The History of Computer Crimes Term Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1555419-the-history-of-computer-crimes.
“The History of Computer Crimes Term Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1555419-the-history-of-computer-crimes.
  • Cited: 0 times

CHECK THESE SAMPLES OF The history of computer crimes

Operation Ghost Click

hellip; By making use of computer forensics, authorities such as the Unite States Federal Bureau of Investigations (FBI) have in some cases managed to trap and convict the cyber criminals.... The crime also demonstrated the increased usage of computer forensics in dealing with crimes.... several organizations and individuals have become victims of crimes committed by cyber criminals located within and outside U.... and was investigated by United States Federal Bureau of Investigation (FBI) in conjunction with Egyptian authorities and Los Angeles Electronic crimes Task Force....
3 Pages (750 words) Essay

Computer Fraud and Abuse Act

In the paper “computer Fraud and Abuse Act,” the author discusses computer fraud, which entails committing fraud through using unauthorized access to information technology, and such acts are prohibited by the United States computer Fraud and Abuse Act.... With examples, this paper will question the legitimate effect of the CFAA: Has it been a success or failure in preventing computer fraud and abuse?... The covered computers are referred to as protected computers, and in this sense, theoretically, a protected computer is defined as one meant for exclusive use by the government of the United States or by a financial institution....
3 Pages (750 words) Essay

Description of Cyber Crimes

Cyber crimes Introduction In business laws, cyber crimes refer to a set of criminal activities committed on individuals or groups aimed at causing intentional harm to their reputation either physically or emotionally using chat rooms, short messages from phones and the internet in general.... hellip; According to studies, cyber crimes have the potential of harming a nation's security system and its financial well-being if these criminal levels escalate....
10 Pages (2500 words) Research Paper

Computer Security Information Risk Assessment & Security Management

In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc.... hellip; This data is considered confidential because access to the computer and its data is supposed to be restricted to a limited number of users....
4 Pages (1000 words) Essay

Computer Crime and Cyber-Terrorism

hellip; According to an expert in online risk management, the world of computer security is increasingly under threat.... According to an expert in online risk management, the world of computer security is increasingly under threat because users leave large online footprints.... Banks are most often the targets of online crimes.... The paper “computer Crime and Cyber-Terrorism” seeks to evaluate online crime, which has now become a multi-billion dollar business....
8 Pages (2000 words) Essay

Law: Computer Misuse

scam, forgery, money laundering, acts of terrorism), computer-mediated spying, infringement of privacy in the attainment of personal data theft or damage of computer hardware or software (Sofaer & Goodman, 2001).... They would like you to research on the following area: The Internet has… Countless individual Internet users and companies become subjected to ever increasing e-crimes because Government has failed to provide The cost of the crime in many cases is immense....
7 Pages (1750 words) Essay

Computer Impacts on Human Life

The paper "computer Impacts on Human Life" discusses that computers have revolutionized every aspect of human and societal lifestyles.... computer as technology has transformed the behaviors of its users to a greater extent in this age of the computer.... When computer devices are interconnected within a network structure that is not appropriately protected, hackers are likely to get access to the networking protocol and access any data that is either stored on the computers or being transmitted via the network links....
8 Pages (2000 words) Research Proposal

State-based Computer Abuse Law

hellip; This essay discusses that a person is guilty of unauthorised use of computer when he/ she uses, causes to be used, or accesses a computer, computer network or service knowingly without authority intends to cause computer malfunction; permanently or temporarily remove, disable, or stop computer software, computer data, or computer network.... Computer services: this simply stands for allservices provided through or by facilities in the computer system that allow input, output, examination, or transfer, of computer data or computer programs from a computer to another5....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us