You must have javascript enabled to view this website. Please change your browser preferences to enable javascript, and reload this page.
There are three main categories of computer crimes. First, the computer can be used as a storage or communication device. In this instance, the computer is not required for the crime itself, but is used in some way in a criminal activity. An example is financial records kept on a drug dealer's computer. Second, the computer can be used as a tool of crime. In this case, the computer is used to commit traditional offenses, such as creating counterfeit money or official documents, or newer computer crime offenses, such as the distribution of child pornogra-phy and illegal Internet gambling. Finally, a computer can be used to commit attacks on informa-tion, including theft of information, theft of services, and damage to computer systems. This type of computer crime involves the widespread problem of viruses and other forms of siege at-tacks. The "cyber vandal’s" purpose is to attack or prevent the normal operation of a digi-tal system.
Who commits these high-tech crimes? Virtually anyone is capable of high-tech crime, but most high-tech offenders, especially computer hackers, fit a unique profile. These individuals are usually 14-to-19 year old white males from mid-dle-class backgrounds. They often possess superior levels of intelligence (IQ over 120), but on a social level they tend to be withdrawn and to associate mainly with peers who share their fascination for electronic gadgets and computer-related activities.
Computer Network Break-Ins
Industrial Espionage
Software Piracy
Pornography Online
Mail Bombings
Password Sniffers
Credit Card
The Criminal Justice Problem
Source: Freda Adler, Gerhard Mueller, and William Laufer. Criminology and the Criminal Justice System, 4th ed. New York: The McGraw-Hill Companies, Inc., 2001, pp. 352-55.
Comprehension Questions
Directions: Questions 1-5 are objective questions that are based on the information in the selection. Answer them by clicking on the correct answer. You may refer to the selection as you answer the questions.
Vocabulary Questions
Directions: Questions 6-10 give you the opportunity to use context clues to deduce the meaning of certain words from the selection. The first sentence for each item comes from the se-lection and contains a vocabulary word, which appears in italics. The second sentence is not from the selection, but it uses the vocabulary word in the same sense as in the first sentence, and it contains additional context clues. Answer each question by clicking on the answer choice that makes sense in both sentences.
"Hacking can be likened to an individual's stealthily gaining entry into another person's house, going through a few personal belongings, and carefully leaving without taking anything."
I was furious when I discovered my younger sister hiding in the closet, stealthily reading my diary.
stealthily
"Industrial Espionage In an age where information can create power, it should not be surprising that competing industries are very curious to know what the others are doing. 'Cyber spies' can be hired to break into a competitor's computer system and gather secret information, often leaving no trace of the intrusion."
The government convicted the foreign agent of espionage and sent him to prison for stealing classified documents and selling them to the enemy.
espionage
"Once again, these spies have such powerful technology at their disposal that they are able to target computers and information that may be thousands of miles away, making detection even more difficult."
Sensitive X-ray and screening equipment at airports now makes the detection of il-legal items faster and more accurate.
"Software piracy ranges from friends sharing and occasionally copying software, to inter-national fraudulent schemes whereby software is replicated and passed on as the original prod-uct, sometimes at a lower price."
The piracy of music by college students who downloaded music through Napster and other file-sharing programs has resulted in charges being filed against some of those students.
piracy
"Second, while a few organizations have mobilized to attack high-tech crime, most law enforcement agencies are not equipped to deal with the phenomenon: 'Technology changes at an astounding rate while law enforcement techniques, which traditionally are reactionary, do not.'"
Major U.S. cities have mobilized their police department, fire department, disaster management agencies, medical facilities, and even their local National Guard to deal with possible terrorist attacks.
mobilized
Applied Reading Skills Questions
Directions: Questions 11-15 test your ability to apply certain reading skills. Answer each question by clicking on the correct answer. You may refer to the selection as you answer the ques-tions.