Targeting the computer:
When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.
Computer as an instrument:
Using computers as an instrument, many criminals started making crimes by falsified use of ATM cards for stealing money through online.
Crime where computer is not …show more content…
This is considered to be against the law.
Real incidents which clearly explains the above laws and how the investigation process has been done:
Incident1:
Highly known incident of corporate surveillance, which took place in the early era among the branded –goods companies Procter & Gamble and Unilever. These companies are known for their fierce competition (Crane, 2005).
Motive for gathering intelligence:
The main purpose was to know the formulas and strategies of Shampoo brand –named as Clairol hair care and also to know their future products. Procter & Gamble have hired outsiders to spy on Unilever with the help of contractors to know the essential information about the Unilever through trash bins.
How the espionage has been done:
Dumpster diving: The staff who investigated had succeeded by finding lot of documents related to Unilever’s Company. The most essential information like their future plans, strategic ideas of marketing and formulas of making Shampoo. This is the most famous industrial –espionage incident happened using trash can as a tool because it is perfectly legal in most of the countries. It is legal because trash cans are not private property, so one can trespass. Procter & Gamble won the competition, when both companies involved in auctioning the Clairol