You must have javascript enabled to view this website. Please change your browser preferences to enable javascript, and reload this page.
Selection 14: High-Tech Crime(criminology)
There are three main categories of computer crimes. First, the computer can be used as a storage or communication device. In this instance, the computer is not required for the crime itself, but is used in some way in a criminal activity. An example is financial records kept on a drug dealer's computer. Second, the computer can be used as a tool of crime. In this case, the computer is used to commit traditional offenses, such as creating counterfeit money or fraudulent documents, or newer computer crimes, such as the distribution of child pornography and illegal Internet gambling. Finally, a computer can be used to commit attacks on information, including theft of information, theft of services, and damage to computer systems. This type of computer crime involves the widespread problem of viruses and other forms of siege attacks. The "cyber vandal's" purpose is to attack or prevent the normal operation of a digital system. Who commits these high-tech crimes? Virtually anyone is capable of high-tech crime, but most high-tech offenders, especially computer hackers, fit a unique profile. These individuals are usually 14-to-19 year old white males from middle-class backgrounds. They often possess superior levels of intelligence (IQ over 120), but on a social level they tend to be withdrawn and to associate mainly with peers who share their fascination for electronic gadgets and computer-related activities.
Computer Network Break-Ins
Industrial Espionage
Software Piracy
Pornography Online
Mail Bombings
Password Sniffers
Credit Card
Source: Freda Adler, Gerhard Mueller, and William Laufer, Criminology and the Criminal Justice System, 4th ed., New York: The McGraw-Hill Companies, Inc., 2001, pp. 352-55.
Writing Prompts
Directions: Type your responses to the items below.
To the Web
Consult one or more of the following websites that pertain to the topic of the reading selection. Then answer the questions based on information obtained from the websites.
http://www.fraud.org/internet/inttip/inttip.htm
This is the website for the National Consumers League's Internet Fraud Watch.
http://www.fraud.org/2002instats.htm
This page provides statistics that pertain to Internet fraud for the year 2002. Based on information at this website, answer these questions:
http://www.fraud.org/internet/intalert.htm
This webpage tells about consumer losses related to Internet auctions.