skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 47812 Find in a Library
Title: COMPUTER CAPERS - TALES OF ELECTRONIC THIEVERY, EMBEZZLEMENT, AND FRAUD
Author(s): T WHITESIDE
Date Published: 1978
Page Count: 164
Language: English
Country: United States of America
Annotation: THE METHODS AND MOTIVES OF COMPUTER CRIME ARE EXAMINED IN A SERIES OF ANECDOTAL STORIES DEALING WITH COMPUTER CRIMINALS. POSSIBLE SECURITY MEASURES BUSINESSES AND LAW ENFORCEMENT PERSONNEL CAN TAKE ARE ALSO DETAILED.
Abstract: THIS BOOK ORIGINALLY APPEARED AS A SERIES OF ARTICLES IN NEW YORKER MAGAZINE. IT STARTS WITH A DETAILED LOOK IN ONE OF THE WORLD'S LARGEST RECORDED COMPUTER FRAUDS, THE EQUITY FUNDING SCANDAL WHICH PROBABLY NETTED OVER $1 BILLION DOLLARS FOR THE CORPORATE OFFICERS WHO PERPETRATED IT. AT THE OTHER EXTREME IS THE CHIEF TELLER AT THE UNION DIME BANK WHO MANIPULATED INACTIVE SAVINGS ACCOUNTS TO FINANCE HIS GAMBLING LOSSES. OTHER CHAPTERS LOOK AT THE ALIENATED PROGRAMMERS WHO DESTROY WHOLE SYSTEMS, THE CLEVER MANIPULATORS WHO MANAGE TO ROUND OFF SMALL SUMS INTO THEIR OWN ACCOUNTS, AND THE THIEVES WHO STEAL COMPUTER HARDWARE AND SOFTWARE FOR RESALE. THESE SCHEMES HAVE BEEN FOILED BY SHARP-EYED CLERKS, THE SECURITIES AND EXCHANGE COMMISSION, JILTED LOVERS, AND LUCK. GREED IS ONLY ONE MOTIVE. MANY OF THESE CRIMINALS SEE THE COMPUTER AS A SYMBOL OF AN IDEOLOGICAL ACT. BUSINESSES ARE SOMETIMES SO EMBARRASSED WHEN THE CRIME IS DISCOVERED THAT THEY HIRE THE PERPETRATOR AS A SECURITY SPECIALIST. AN APPENDIX LISTS PROPOSED FEDERAL LEGISLATION TO CONTROL COMPUTER CRIME. ANOTHER GIVES EXCERPTS FROM A SPECIAL REPORT SUBMITTED TO CONGRESS BY THE COMPTROLLER GENERAL OF THE U.S. GENERAL ACCOUNTING OFFICE ON COMPUTER-RELATED CRIMES IN FEDERAL PROGRAMS. THIS REPORT CONTAINS SPECIFIC RECOMMENDATIONS TO CONTROL COMPUTER LOSES. A THIRD APPENDIX, TITLE 'PENETRATION OF A UNIVAC COMPUTER,' EXAMINES FAILINGS IN SYSTEMS DESIGN AND COMPUTER SECURITY WHICH MAKE COMPUTER CRIME POSSIBLE. A BIBLIOGRAPHY IS INCLUDED.
Index Term(s): Computer abuse; Computer privacy and security; Crimes against businesses; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=47812

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.