U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Why We Need Computer Crime Legislation

NCJ Number
74934
Journal
Interactive Computing Volume: 6 Issue: 4 Dated: (July/August 1980) Pages: 4-8
Author(s)
A Bequai
Date Published
1980
Length
5 pages
Annotation
The proposed Federal Computer Systems Protection Act (S. 240), which aims to combat computer crimes is defended.
Abstract
The bill was introduced on January 15, 1979, and would make the use or attempted use of a computer in a fraudulent scheme a Federal crime, punishable by imprisonment for up to 5 years and by fines of up to $50,000. The bill is needed to help stem the more then $100 million in annual computer-related crime costs and to fill the need for an effective statute. Traditional embezzlement, larceny, and fraud laws are ill-equipped to address computer crimes. Thus, the Senate's Subcommittee on Criminal Laws and Procedures has recommended passage of the legislation, although critics claim that such a bill is not needed and that it would serve only to augment Federal regulation of the private sector. The Senate staff identified five categories of computer crimes: the theft of valuable data through the use of electronic interceptive techniques, such as 'wiretapping' and 'piggyback entry'; the theft of services through the unauthorized use of another's computer for personal gain; the theft of valuable property through the illegal use of a computer; financial frauds; and computer sabotage. Most computer felons were between the ages of 18 and 37, were well-educated professionals, and had no prior criminal involvement. They often evaded prosecution by taking advantage of loopholes in the present laws. The bill forbids the use of a computer to defraud another of his property to obtain property under false pretenses, to embezzle the funds of an employer, and to steal or convert to one's use the property of another. Property is broadly defined as anything of value, including electronically processed data. Examples of computer crimes are cited. No references are supplied.