U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Underground: Computer Hacking, Crashing, Pirating and Phreaking

NCJ Number
M Harry
Date Published
257 pages
This book describes various types of computer crime, methods used to implement them, offender profiles, computer security measures, and some methods used to defeat them.
Results are presented from a survey of 21 persons who posted messages on 'pirate' bulletin boards in New York and California to determine their demographics and involvement in computer crime. Most of the respondents were in high school, and their primary computer offenses were piracy and phreaking. Piracy is the making of unauthorized copies of copyrighted computer programs, and phreaking is the avoiding of charges for long distance phone calls. These two types of computer crime are explained. Among the basic security rules presented for countering unauthorized computer access are the elimination of temptation, restricted knowledge of the physical location of the computer, use of a two-tier entry system, and restricted technical knowledge of the computer system. The book explains how offenders defeat these various security measures. After explaining how 'hackers' access corporate data networks such as Telenet and Tymnet, the discussion focuses on how computer criminals use electronic bulletin boards to share information on how to commit computer crime. The appendixes provide information from one underground computer bulletin board to illustrate the kind of information that circulates in the computer underground. 5 book and magazine resources.


No download available