U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

ESPIONAGE AND THEFT USING COMPUTERS

NCJ Number
38841
Journal
Assets Protection Volume: 2 Issue: 1 Dated: (WINTER 1976) Pages: 32-38
Author(s)
J H FINCH
Date Published
1976
Length
7 pages
Annotation
ARTICLE DEVELOPS A PICTURE OF A NEW FORM OF CRIME, COMPUTER RELATED FRAUD, THAT HAS BURGEONED WITH MODERN TECHNOLOGICAL ADVANCES.
Abstract
AIDING THIS INCREASE IN COMPUTER RELATED CRIMES IS THE FACT THAT MORE PEOPLE ARE GAINING KNOWLEDGE IN THE COMPUTER FIELD, THUS HAVING THE TECHNICAL CAPABILITY TO COMMIT SUCH CRIMES. TO ILLUSTRATE THE IMPACT OF THESE CRIMES, THE AUTHOR CITES A NUMBER OF DOCUMENTED INCIDENTS TYPIFYING COMPUTER DATA THEFT. IN ORDER TO CLARIFY THE SUBJECT, THE AUTHOR DELINEATES SIX MAJOR CATEGORIES OF GAINING UNAUTHORIZED ACCESS TO COMPUTERIZED DATA. ALSO NOTED IS THE FACT THAT SECURITY PROBLEMS MOST FREQUENTLY OCCUR WITH THE USE OF REMOTE TERMINALS. THE ARTICLE CONCLUDES WITH SUGGESTIONS FOR USING SECURITY CHECKLISTS, HARDWARE AND SOFTWARE MONITORS, AND ENCRYPTION DEVICES OR SCRAMBLERS TO PREVENT ESPIONAGE AND THEFT OF COMPUTER SYSTEMS....KAP

Downloads

No download available

Availability