TITLE

Making Computer Crime Count

AUTHOR(S)
Goodman, Marc
PUB. DATE
August 2001
SOURCE
FBI Law Enforcement Bulletin;Aug2001, Vol. 70 Issue 8, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Provides information on computer crimes in the United States. Legislation governing computer crimes in the country; Statistics of computer crimes; Information on computer hacking; Problems posed by unreported computer crimes; Details of computer security and confidentiality.
ACCESSION #
5094323

 

Related Articles

  • Who's been looking at your data? Butler, Declan // Nature;8/8/2002, Vol. 418 Issue 6898, p580 

    Reports on the breach of academic computer security in the U.S. Web sites that were hit by distributed denial-of-service attacks launched from computers in schools; Threat posed by cyber-terrorists; Security measures used by researchers to protect the people and homes.

  • Paris school offers primer for cyberpirates. van der Laan, Nanette // Christian Science Monitor;12/3/2001, Vol. 94 Issue 7, p1 

    Discusses the Zi Hackademy school in Paris, France, which teaches computer hacking methods. Fear that the teaching of the information will lead to computer crimes; Monitoring of the school by the police; Idea that the information is provided for self defense of Web sites and computers.

  • GLOBAL NOTE.  // Time International (Atlantic Edition);6/4/2007, Vol. 169 Issue 23, p11 

    This article explains that the country of Estonia experienced 100 separate attacks on its computers systems during April, 2007. They have accused Russia of organizing the strikes, because Estonian authorities decided to take down a Soviet war memorial. Russia has denied any involvement in the...

  • Cyberattacks Have Lasting Effects. GERENA, CHARLES // Econ Focus;Second Quarter 2013, Vol. 17 Issue 2, p2 

    The article discusses aspects on the financial losses caused by additional security measures and preventive intervention expenses against cyberattacks.

  • Threat Report.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2006, p10 

    The article offers news briefs on hacker activity and security across the globe as of January 2006. Phishing attacks against smaller banks was launched by cybercriminals in the U.S. The Information Security Breach and Notification Act of New York went into effect in December 2005. As part of...

  • China's Cyber-Militia. Stokes, Bruce; Harris, Shane // National Journal;5/31/2008, Vol. 40 Issue 21, p32 

    The article discusses concerns and controversies surrounding computer hackers in China working on behalf of the Chinese government and military. U.S. government officials and computer-security experts accused Chinese computer hackers of stealing proprietary information from American executives...

  • CRIME ONLINE. Foroohar, Rana // Newsweek (Pacific Edition);9/16/2002-9/23/2002 (Pacific Edition), Vol. 140 Issue 12/13, p60 

    Describes the online crime that affects businesses, schools, and government. Concern that hackers will be able to take control of mechanical devices; Use of computers to break down physical barriers; Financial loss due to cybercrime.

  • Protecting Against Viruses. Duvall, Mel // Inter@ctive Week;02/28/2000, Vol. 7 Issue 9, p40 

    Deals with the attack made by computer hackers on several Web sites in the United States. Success of the hackers; Failure of the people to install anti-virus software on their computers; Background of companies that offer anti-virus products.

  • CRIME ONLINE. Foroohar, Rana // Newsweek (Atlantic Edition);9/16/2002-9/23/2002 (Atlantic Edition), Vol. 140 Issue 12/13, p6 

    Describes the online crime that affects businesses, schools, and government. Concern that hackers will be able to take control of mechanical devices; Use of computers to break down physical barriers; Financial loss due to cybercrime.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics