+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computer crimes

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Computer Crimes, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Computer Crimes


It's the weekend, you have nothing to do so you decide to play around on
your computer. You turn it on and then start up, you start calling people with
your modem, connecting to another world, with people just like you at a button
press away. This is all fine but what happens when you start getting into other
peoples computer files. Then it becomes a crime, but what is a computer crime
really, obviously it involves the use of a computer but what are these crimes.
Well they are: Hacking, Phreaking, & Software Piracy.

To begin I will start with Hacking, what is hacking. Hacking is basically
using your computer to "Hack" your way into another. They use programs called
scanners which randomly dials numbers any generating tones or carriers are
recorded. These numbers are looked at by hackers and then used again, when the
hacker calls up the number and gets on he's presented with a logon prompt, this
is where the hacking really begins, the hacker tries to bypass this anyway he
knows how to and tries to gain access to the system. Why do they do it, well
lets go to a book and see "Avid young computer hackers in their preteens and
teens are frequently involved in computer crimes that take the form of
trespassing, invasion of privacy, or vandalism. Quite often they are mearly out
for a fun and games evening, and they get entangled in the illegal use of their
machines without realizing the full import of what they are doing", I have a
hard time believing that so lets see what a "hacker" has to say about what he
does "Just as they were enthraled with their pursuit of information, so are we.
The thrill of the hack is not in breaking the law, it's in the pursuit and
capture of knowledge.", as you can see the "hacker" doesn't go out to do destroy
things although some do. It's in the pursuit of knowledge. Of course this is
still against the law. But where did all of this start, MIT is where hacking
started the people there would learn and explore computer systems all around the
world. In the views of professional hacking is like drugs or any other addictive
substance, it's an addiction for the mind and once started it's difficult to
stop. This could be true, as hackers know what they are doing is wrong and they
know odds are they will be caught. But as I mentioned some hackers are just
above average criminals, using there skills to break in banks and other places
where they can get money, or where they can destroy information. What a hacker
does at a bank is take a few cents or even a few fractions of a cents from many
different accounts this may seem like nothing but when all compiled can be alot.
A stick up robber averages about $8,000 each "job", and he has to put his life
and personal freedom on the line to do it while the computer hacker in the
comfort of his own living room averages $500,000 a "job". As for people
destroying information, this is for taking some one down, destruction of data
could end a business which for some is very attractive. It can cost a company
thousands of dollars to restore the damage done.

Now that you have an understanding of what a "hacker" is, it time to move
on to someone closely associates with a hacker. This is a Phreak, but what is
that. For the answer we turn to the what is known as the "Official" Phreakers
Manual "Phreak [fr'eek] 1. The action of using mischievous and mostly illegal
ways in order to not pay for some sort of telecommunications bill, order,
transfer, or other service. It often involves usage of highly illegal boxes and
machines in order to defeat the security that is set up to avoid this sort of
happening. [fr'eaking] v. 2. A person who uses the above methods of destruction
and chaos in order to make a better life for all. A true phreaker will not go
against his fellows or narc on people who have ragged on him or do anything
termed to be dishonourable to phreaks. [fr'eek] n. 3. A certain code or dialup
useful in the action of being a phreak. (Example: "I hacked a new metro phreak
last night.")" The latter 2 ideas of what a phreak is, is rather weird. A
Phreak like the hacker likes to explore and experiment, however his choice of
exploring is not other computer but the phone system as a whole. Phreaks explore
the phone system finding many different ways to do things, most often make free
calls. Why do they do this, " A hacker and phreaker will have need to use
telephone systems much more than an average individual, therefore, methods which
can be used to avoid toll charges are in order. ". A phreak has two basic ways
of making free calls, he can call up codes or PBXs on his phone and then enter a
code and make his call or he can use Electronic Toll Fraud Devices. Codes are
rather easy to get the phreak will scan for them, but unlike a hacker will only
save the tone(s) number instead of the carrier(s). Then he will attempt to hack
the code to use it, these codes range from numbers 0 - 9 and can be any length,
although most are not more than 10. Electronic Toll Fraud Devices are known as
Boxes in the underground. Most are the size of a pack of smokes, or than can be
smaller or bigger. I will not go too deep. They are electronic devices than do
various things, such as make outgoing calls free, make incoming calls free,
simulate coins dropping in a phone, etc. People who "Phreak" are caught alot
these days thanks to the new technology.

Software Piracy is the most common computer crime, it is the illegal coping
of software. "People wouldn't think of shoplifting software from a retail store,
but don't think twice about going home and making several illegal copies of the
same software." and this is true because I myself am guilty of this. The major
problem is not people going out and buying the software then making copies for
everyone, it's the Bulletin Boards that cater to pirating software, that really
cause the problem. On anyone one of these boards one can find an upwards of 300
- 1000+ of pirated software open for anyone to take. This is a problem and
nothing can really be done about it. Few arrests are made in this area of
computer crime.

I will now devote a brief section to the above mentioned BBS' , most are
legal and do nothing wrong. However there are many more that do accept pirated
software, pornographic pictures, animations , and texts. As well as a trading
area for phone codes, other BBS', Credit Card numbers, etc. This is where a
majority of Hackers and Phreaks come, as well as those who continue to pirate
software come to meet and share stories. In this is a new world, where you can
do anything, there are groups that get, crack, and courier software all over the
world some of them are called: INC: International Network Of Crackers, THG: The
Humble Guys, TDT: The Dream Team. As well a number of other groups have
followed suit such as Phalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and
YAM (Youngsters Against McAfee) these are virus groups who write and courier
their work anywhere they can, they just send it somewhere, where anyone can take
it and use it in any manner they wish, such as getting even with someone. All of
these activities are illegal but nothing can be done, the people running these
boards know what they are doing. As it stands right now, the BBS world is in
two parts Pirating and the Underground, which consists of
Hackers/Phreaks/Anarchists/Carders(Credit Card Fraud)/Virus programmers. All
have different boards and offer a variety of information on virtually any
subject.

Well from all of this reading you just did you should have a fairly good
idea of what computer crime is. I didn't mention it in the sections but the
police, phone companies are arresting and stopping alot of things every day.
With the new technology today it is easier to catch these criminals then it was
before. With the exception of the BBS' the police have made some major blows
busting a few BBS', arresting hackers and phreaks. All of which were very looked
up to for knowledge in their areas of specialty. If I had more time I could go
into these arrests but I must finish by saying that these are real crimes and
the sentences are getting harsher, with alot of the older people getting out the
newer people are getting arrested and being made examples of. This will deter
alot of would-be computer criminal away.


 

Other sample model essays:

Information Technology / Computer Crime
Computer Crime by: Manik Saini Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, sa...
Information Technology / Computer Crime Is Increasing
Computer Crime Is Increasing A report discussing the proposition that computer crime has increased dramatically over the last 10 years. Introduction Computer crime is generally defined...
Computers, I Don't Like Computers. So Why Can't I Get A Job? Today most jobs use computers. Employees are probably going to use one on the job. A lot of people are being refused jobs because...
Information Technology / Computer Crime In The 1990's
Computer Crime In The 1990's We're being ushered into the digital frontier. It's a cyberland with incredible promise and untold dangers. Are we prepared ? It's a battle between modern...
Computers Related To Turf Grass Industries Computer Science Term paper Turfgrass Science Dennis Zedrick October 23, 1996 The field of turfgrass science, and golf course management has ...
Information Technology / Coputers In Modern Society
Coputers In Modern Society Looking around at daily life, I noticed a pattern of computer oriented devices that make life easier and allow us to be lazier. These devices are in most daily...
Information Technology / Computers And The Disabled
Computers and The Disabled The computer age has changed many things for many people, but for the disabled the computer has ultimately changed their entire life. Not only has it made l...
Information Technology / Computers And Society
Computers and Society The decade of the 1980's saw an explosion in computer technology and computer usage that deeply changed society. Today computers are a part of everyday life, they ar...
Information Technology / Computers And Marketing
Computers And Marketing Marketing is the process by which goods are sold and purchased. The aim of marketing is to acquire, retain, and satisfy customers. Modern marketing has evolve...
Information Technology / Computer Viruses
Computer Viruses (anonymous) WHAT IS A COMPUTER VIRUS: The term usually used to define a computer virus is: ' A computer virus is ...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD