U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Hi-Tech Crime: Protecting Yourself in the Computer Age

NCJ Number
227041
Date Published
2008
Length
30 pages
Annotation
This paper identifies various crimes and risks for victimization that have accompanied the increased use of modern technology, notably computer technology and other interactive technologies through which people engage in business and social activities.
Abstract
The paper first addresses child safety on the Internet. It notes that child molesters prowl the various arenas of information-sharing on the Internet, such as "chat rooms," looking for vulnerable children who are desperate for friends and excitement. Consequently, parents and other adults must be attentive to protective mechanisms for children when they are on the Internet. This includes placing the computer in a centrally located area in the home, explaining to children about how predators use the Internet to victimize children, establish time frames for Internet access, use security software, and monitor school policies on how students use the Internet while at school. This paper also provides general guidelines for the safe use of the Internet with regard to e-mail, in-person meetings with unknown people from Internet contacts, and protection against scams introduced through the Internet. Another abuse of modern technology discussed is the "cloning" of cellular phones, in which one cellular telephone is made to "act" the same as another by copying the identity and phone number of one phone and inserting it into another, such that the cloned phone subscriber is billed. Digital cellular phones are somewhat secure from cloning compared to analog phones. Other criminal uses of modern technology and countermeasures that can be adopted are also discussed, including identity theft and various types of financial crimes. A listing of 12 resources