You must have javascript enabled to view this website. Please change your browser preferences to enable javascript, and reload this page.
Selection 14: High-Tech Crime(criminology)
There are three main categories of computer crimes. First, the computer can be used as a storage or communication device. In this instance, the computer is not required for the crime itself, but is used in some way in a criminal activity. An example is financial records kept on a drug dealer's computer. Second, the computer can be used as a tool of crime. In this case, the computer is used to commit traditional offenses, such as creating counterfeit money or fraudulent documents, or newer computer crimes, such as the distribution of child pornography and illegal Internet gambling. Finally, a computer can be used to commit attacks on information, including theft of information, theft of services, and damage to computer systems. This type of computer crime involves the widespread problem of viruses and other forms of siege attacks. The "cyber vandal's" purpose is to attack or prevent the normal operation of a digital system. Who commits these high-tech crimes? Virtually anyone is capable of high-tech crime, but most high-tech offenders, especially computer hackers, fit a unique profile. These individuals are usually 14-to-19 year old white males from middle-class backgrounds. They often possess superior levels of intelligence (IQ over 120), but on a social level they tend to be withdrawn and to associate mainly with peers who share their fascination for electronic gadgets and computer-related activities.
Computer Network Break-Ins
Industrial Espionage
Software Piracy
Pornography Online
Mail Bombings
Password Sniffers
Credit Card
Source: Freda Adler, Gerhard Mueller, and William Laufer, Criminology and the Criminal Justice System, 4th ed., New York: The McGraw-Hill Companies, Inc., 2001, pp. 352-55.
Directions: Questions 1-5 are objective questions that are based on the information in the selection. Answer them by clicking on the correct answer. You may refer to the selection as you answer the questions.
Vocabulary Questions
Directions: Questions 6-10 give you the opportunity to use context clues to deduce the meaning of certain words from the selection. The first sentence for each item comes from the selection and contains a vocabulary word, which appears in italics. The second sentence is not from the selection, but it uses the vocabulary word in the same sense as in the first sentence, and it contains additional context clues. Answer each question by clicking on the answer choice that makes sense in both sentences.
I was furious when I discovered my younger sister hiding in the closet, stealthily reading my diary.
stealthily
espionage
Sensitive X-ray and screening equipment at airports now makes the detection of illegal items faster and more accurate.
detection
The piracy of music by college students who downloaded music through illegal file-sharing programs has resulted in charges being filed against some of those students.
piracy
Major U.S. cities have mobilized their police department, fire department, disaster management agencies, medical facilities, and even their local National Guard to deal with possible terrorist attacks.
mobilized
Applied Reading Skills Questions
Directions: Questions 11-15 test your ability to apply certain reading skills. Answer each question by clicking on the correct answer. You may refer to the selection as you answer the questions.