We are going to see new high-tech crimes
Tags: COMPUTER crimes
- Hackers Struggling To Get Ahead. Adams, John // Bank Technology News;Mar2003, Vol. 16 Issue 3, p20
Reports developments related to computer hacking in the U.S. Infiltration of the electronic system of security consultancy firm Defensive Thinking; Business plans of the firm; Testimony of billionaire Michael Bloomberg against computer hacker Alex Zezov.
- No place to hide from the hackers. L.G. // Alberta Report / Newsmagazine;8/9/93, Vol. 20 Issue 34, p39
Claims that hackers, professional and amateur computer operators who have made a sport of deciphering the security codes that surround electronic data bases filled with personal files, can get into the records of the most powerful people. Example of Jeremy Rothfeder, author of `Privacy for...
- Rapid spread of virus confirms fears about... Nordwall, B.D. // Aviation Week & Space Technology;11/14/88, Vol. 129 Issue 20, p44
Discusses the virus that recently infected several thousand US computers and the security concerns it raised. At issue is how to increase protection without slowing the flow of information. No classified systems were involved. Robert T. Morris, Jr., 23, is the suspected virus creator.
- Cracking down on computer crime. Markus, Erik // Boys' Life;Mar1993, Vol. 83 Issue 3, p30
Discusses the growing wave of computer crime taking place in the United States. Type of high-tech crimes; The challenge that faces law enforcers; The Secret Service's `Operation Sundevil' launched in 1990. INSET: Hacking is illegal..
- Hackers plead guilty in contest fraud. Viles, Peter // Broadcasting & Cable;5/3/93, Vol. 123 Issue 18, p42
Reports on the details of the case involving hackers allegedly rigging radio station giveaway contests. Use of computers to take control of radio stations' incoming phone lines during contest giveaways; Sponsored contests by KIIS-FM, KPWR-FM and KRTH-FM in Los Angeles; Hackers winning of two...
- Cyber crooks. Falconer, Tim // CA Magazine;Dec95, Vol. 128 Issue 10, p12
Focuses on computer crimes. Background history; Types; Impact on companies; Statistics; Security measures; Criminal opportunities.
- Safe surfing on the Net. Kowalski, Kathiann M. // Current Health 2;Nov97, Vol. 24 Issue 3, p28
Provides information on the National Center for Missing and Exploited Children, who have details in approximately 50 crimes involving adult offenders who uses the Internet to commit crimes against teenagers. Identification of a number of these cases; Comments from Carolyn Caywood, a teen...
- Computer crime categories. Carter, David L. // FBI Law Enforcement Bulletin;Jul95, Vol. 64 Issue 7, p21
Examines the categories of computer crime techno-criminals operate. Offenses with computer as the target including intellectual property; Computer as the instrumentality of the crime; Incidental to the crime; Computer-associated crimes; Perspective on legal issues; Special problems with...
- Overcoming obstacles. Groover, Richard S. // FBI Law Enforcement Bulletin;Aug96, Vol. 65 Issue 8, p8
Opinion. Discusses the steps law enforcement agencies in the United States can take to prepare for computer-related crime. Difficulty in getting funds for the job; Role of the National White Collar Crime Center; Need to provide laptops and computer training to policemen.