Preview

Computer Crimes: The Cuckoo's Egg By Cliff Stoll

Better Essays
Open Document
Open Document
938 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crimes: The Cuckoo's Egg By Cliff Stoll
CATEGORIES OF COMPUTER CRIMES:
 Targeting the computer:
When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.
Computer as an instrument:
Using computers as an instrument, many criminals started making crimes by falsified use of ATM cards for stealing money through online.
Crime where computer is not
…show more content…

This is considered to be against the law.
Real incidents which clearly explains the above laws and how the investigation process has been done:
Incident1:
 Highly known incident of corporate surveillance, which took place in the early era among the branded –goods companies Procter & Gamble and Unilever. These companies are known for their fierce competition (Crane, 2005).
Motive for gathering intelligence:
The main purpose was to know the formulas and strategies of Shampoo brand –named as Clairol hair care and also to know their future products. Procter & Gamble have hired outsiders to spy on Unilever with the help of contractors to know the essential information about the Unilever through trash bins.
How the espionage has been done:
Dumpster diving: The staff who investigated had succeeded by finding lot of documents related to Unilever’s Company. The most essential information like their future plans, strategic ideas of marketing and formulas of making Shampoo. This is the most famous industrial –espionage incident happened using trash can as a tool because it is perfectly legal in most of the countries. It is legal because trash cans are not private property, so one can trespass. Procter & Gamble won the competition, when both companies involved in auctioning the Clairol


You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Criminal Justice Final

    • 1252 Words
    • 6 Pages

    * cyber theft: the use of computer networks for criminal profits. Copyright infringement, identity theft, and internet securities fraud are examples of cyber theft…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    There are several different theories that could be used to describe those who commit computer crimes. I am going to summarize Choice Theory and why I think it is most relevant to computer crimes. The Choice Theory basically in a nut shell says that a person will choose to commit a crime even after weighing the positive and negative outcomes of doing so. To this person they see a quick opportunity to make money or cause a disruption and no matter what the consequence will still choose to offend. There are other types of crimes that could be related to this theory as well such as theft, burglary and robbery. When…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Better Essays

    WiseGeek.com defines cybercrime as “any type of illegal activity that makes use of the Internet, a private or public network, or an in-house computer system.” Examples involving this crime are: software that are designed in order to steal…

    • 794 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer Crime is an area of the law in which the government is constantly adding new offenses to keep up with the growth in new technologies. Federal and California Penal Codes include provisions covering computer crime such as contaminant into a computer system and using computers as part of a scheme to defraud.…

    • 448 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Industrial Espionage

    • 460 Words
    • 2 Pages

    Industrial espionage is acquisition of industrial trading secrets from business competitors. Industrial spying is a reaction to the efforts made by many of the businesses to keep secret their designs, methods, formulas, manufacturing processes, research, and future plans. All these trade secrets may enter into the open market through disloyal employees or through various other means. Penalties should be imposed against those found guilty employees so that it restricts further use of the knowledge to substantial damages. (Encyclopedia, 2009)…

    • 460 Words
    • 2 Pages
    Satisfactory Essays

Related Topics