U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Theft - You May Be the Last To Know

NCJ Number
79062
Journal
CANADIAN BUSINESS Dated: (May 1976) Pages: 63-64,66,68,71
Author(s)
J Parry
Date Published
1976
Length
5 pages
Annotation
Incidents that typify data theft and measures business can take to prevent this crime are discussed in this Canadian article.
Abstract
The problem of computer theft persists and appears to be growing annually. Common thefts include unauthorized withdrawal of vital market research, financial statements, design data, marketing and budgeting projections, mailing lists, and cash. In 1974, Stanford Research Institute (California) listed 85 computer-related incidents in the previous few years, 33 of which totaled $13 million in losses alone. Other examples of computer crimes cited are the notorious 'Jeff Ward case,' involving theft of information by a computer from a computer, and the Equity Funding scandal, often referred to as the biggest fraud in the history of the United States. The U.S. and Canadian Governments have taken steps to combat such fraud and embezzlement schemes as have several universities worldwide. Computer systems penetration can occur in several ways: browsing, the most direct method; artifice, the intentional introduction of a clandestine code into the system; foible, or an accidential opening that permits unauthorized control of the system or unauthorized access; impersonation; tapping a communication line; or radiation, which involves passive eavesdropping without direct connection. Security in Canada is far from adequate, and experts differ on the potential for handling computer crimes. Some believe that the technology already exists to ensure complete security, while others feel that the human element will continue to make the entire system inherently vulnerable. A brief note on data encryption techniques used to combat computer theft is provided. No references are cited.