Preview

Computer Crimes: The Cuckoo's Egg By Cliff Stoll

Better Essays
Open Document
Open Document
938 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crimes: The Cuckoo's Egg By Cliff Stoll
CATEGORIES OF COMPUTER CRIMES:
 Targeting the computer:
When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.
Computer as an instrument:
Using computers as an instrument, many criminals started making crimes by falsified use of ATM cards for stealing money through online.
Crime where computer is not
…show more content…
This is considered to be against the law.
Real incidents which clearly explains the above laws and how the investigation process has been done:
Incident1:
 Highly known incident of corporate surveillance, which took place in the early era among the branded –goods companies Procter & Gamble and Unilever. These companies are known for their fierce competition (Crane, 2005).
Motive for gathering intelligence:
The main purpose was to know the formulas and strategies of Shampoo brand –named as Clairol hair care and also to know their future products. Procter & Gamble have hired outsiders to spy on Unilever with the help of contractors to know the essential information about the Unilever through trash bins.
How the espionage has been done:
Dumpster diving: The staff who investigated had succeeded by finding lot of documents related to Unilever’s Company. The most essential information like their future plans, strategic ideas of marketing and formulas of making Shampoo. This is the most famous industrial –espionage incident happened using trash can as a tool because it is perfectly legal in most of the countries. It is legal because trash cans are not private property, so one can trespass. Procter & Gamble won the competition, when both companies involved in auctioning the Clairol

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Criminal Justice Final

    • 1252 Words
    • 6 Pages

    * cyber theft: the use of computer networks for criminal profits. Copyright infringement, identity theft, and internet securities fraud are examples of cyber theft…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “A simple definition of cyber-crime would be unlawful acts wherein the computer is either a tool or a target or both.”1…

    • 819 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Cyber crime, also referred to as computer crime comprises of all crimes that are committed using a computer or with the help of a computer. Cyber crime is not a single activity but instead there are various activities that may be categorized as cyber crimes. However, the major activities involved include illegal or unauthorized access of information or data, interception of data from the computer illegally, unauthorized damaging or deletion of data from the computer, misuse of devices and committing fraud by electronic means (Broadhurst, 2005).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Crime is an area of the law in which the government is constantly adding new offenses to keep up with the growth in new technologies. Federal and California Penal Codes include provisions covering computer crime such as contaminant into a computer system and using computers as part of a scheme to defraud.…

    • 448 Words
    • 2 Pages
    Good Essays
  • Better Essays

    WiseGeek.com defines cybercrime as “any type of illegal activity that makes use of the Internet, a private or public network, or an in-house computer system.” Examples involving this crime are: software that are designed in order to steal…

    • 794 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cyber crime paper

    • 1066 Words
    • 3 Pages

    The difference between cybercrime and traditional crime are: Cybercrime is a type of crime that not only destroys the security system of the county but also the financial system of individuals or businesses. Cybercrime is done by hackers that crack into computers and steal software, credit card information or bank account information. When cybercrime is involved, the ultimate goal for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for illegally accessing a computer system ranges from 6 months to 5 years or a fine. The penalty for computer hacking depends on many factors the age of the hacker, the system they hack into and the motivation for hacking into the system. Traditional crime on the other hand is a crime against public law. It is a physical hands on crime such as; rape, property crime; or committed with a weapon.…

    • 1066 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Industrial Espionage

    • 460 Words
    • 2 Pages

    Industrial espionage is acquisition of industrial trading secrets from business competitors. Industrial spying is a reaction to the efforts made by many of the businesses to keep secret their designs, methods, formulas, manufacturing processes, research, and future plans. All these trade secrets may enter into the open market through disloyal employees or through various other means. Penalties should be imposed against those found guilty employees so that it restricts further use of the knowledge to substantial damages. (Encyclopedia, 2009)…

    • 460 Words
    • 2 Pages
    Satisfactory Essays

Related Topics