NCJ Number
35110
Date Published
1976
Length
320 pages
Annotation
CASE HISTORIES OF INGENIOUS COMPUTER-AIDED CRIMES ARE PRESENTED.
Abstract
WRITTEN IN A STYLE AND USING LANGUAGE EASILY UNDERSTOOD BY A PERSON WITH MINIMAL COMPREHENSION OF COMPUTER JARGON, ENOUGH SPECIFIC INFORMATION IS PROVIDED TO MAKE THE READER AWARE OF FAULTS IN COMPUTER HARDWARE AND SOFTWARE DESIGN AND TO SUGGEST WAYS THAT THESE SECURITY LOOPHOLES MAY BE CLOSED. AMONG THE EXAMPLES USED ARE A KIDNAPPING WITH PAYMENT MADE THROUGH AUTOMATED BANK STATIONS, THE INFAMOUS EQUITY FUNDING INSURANCE FRAUD, THE FIRST PROSECUTED CASE OF COMPUTER SOFTWARE THEFT THROUGH TELEPHONE TERMINALS, AND A CASE OF ARSON OF A COMPUTER INSTALLATION. OTHER CRIMES AIDED BY OR PERPETRATED ON COMPUTERS INCLUDE EMBEZZLEMENT, BANK THEFT, DATA ERADICATION, CONSUMER ABUSE, GAMBLING WITH THE ILLEGAL AID OF COMPUTERS, AND VIOLATIONS OF DATA PRIVACY CONCERNING MENTAL PATIENTS.