U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

When Criminals Turn to Computers, Is Anything Safe?

NCJ Number
85984
Journal
Smithsonian Volume: 13 Issue: 5 Dated: (August 1982) Pages: 116-118,120-122,124,126
Author(s)
G Kolata
Date Published
1982
Length
7 pages
Annotation
Wayward programmers, executives, even teenagers, are participating in the computer crime wave which is soaring along with the growth in the number of microcomputers and the number of people who know how to use them.
Abstract
Most computer crimes are not reported because business managers fear the bad publicity that would result from such a revelation. Most experts state flatly that it is easy to commit computer crimes. At the Department of Defense (DOD) during the early 1970's, 'tiger teams' were set up; these were groups of people authorized to try to steal sensitive information from DOD computers. However, the teams were disbanded after they found that they could get anything they wanted from the computers. 'Joyriders,' often teenagers who like to break into computer networks just for fun and 'computer hackers' (programming enthusiasts) are two types of common computer criminals. When these teenagers commit crimes and are caught, they are rarely punished. Most adult criminals commit computer crimes for profit and usually aim to exploit gross weaknesses in computer systems with which they are familiar. Most computer crimes can be prevented if physical security is increased and accounting practices are improved. More sophisticated computer systems are also needed. Numerous examples of computer crimes are cited.