skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 51086 Find in a Library
Title: ORGANIZED CRIME IN THE COMPUTER ARENA
Journal: POLICE CHIEF  Volume:45  Issue:10  Dated:(OCTOBER 1978)  Pages:24,26,28-29
Author(s): A BEQUAI
Corporate Author: International Assoc of Chiefs of Police
United States of America
Date Published: 1978
Page Count: 4
Sponsoring Agency: International Assoc of Chiefs of Police
Alexandria, VA 22314
Format: Article
Language: English
Country: United States of America
Annotation: THE INFILTRATION INTO THE COMPUTER FIELD BY ORGANIZED CRIME ELEMENTS, FACILITATED BY COMPUTER SYSTEMS AND INADEQUATE SECURITY MEASURES SURROUNDING THEM, IS ADDRESSED.
Abstract: THE FEDERAL GOVERNMENT EMPLOYS MORE THAN 10,000 COMPUTERS, PRIVATE INDUSTRY USES MORE THAN 80,000 COMPUTERS, AND MORE THAN 100,000 MINICOMPUTERS ARE IN USE. ALL THESE COMPUTERS ARE MANAGED BY APPROXIMATELY 2 MILLION OPERATORS, PROGRAMMERS, AND TECHNICIANS. COMPUTERS GENERALLY ARE USED FOR ONE OF TWO FUNCTIONS, GENERAL (DIGITAL) OR SPECIAL (ANALOG). EIGHT CATEGORIES OF CRIME IN THE COMPUTER FIELD ARE NOTED: DATA CRIMES, THEFT OF SERVICES, PROPERTY-RELATED CRIMES, INDUSTRIAL SABOTAGE, POLITICALLY RELATED SABOTAGE, VANDALISM BY EMPLOYEES, CRIMES AGAINST THE INDIVIDUAL, AND FINANCIALLY RELATED CRIMES. THEFT OF DATA OR DATA CRIMES USUALLY ATTRACT THE INTEREST OF ORGANIZED CRIME SYNDICATES. THESE CRIMES TAKE THE FORM OF STEALING OR COPYING VALUABLE COMPUTER PROGRAMS. A LARGE INTERNATIONAL MARKET EXISTS FOR COMPUTERIZED DATA, AND SPECIALIZED FENCES PLAY A ROLE IN THE RAPIDLY EXPANDING MARKET. COMPUTERS HAVE BEEN USED BY EMPLOYEES TO RUN THEIR OWN PERSONAL BUSINESSES, AND MEMBERS OF ORGANIZED CRIME HAVE USED COMPANY COMPUTERS TO KEEP TRACK OF ILLEGAL INVESTMENTS. A GREAT INCREASE IN THE THEFT OF SERVICES INVOLVING COMPUTERS IS ANTICIPATED. POLITICALLY MOTIVATED SABOTAGE IS ON THE INCREASE WITH THE ESTABLISHMENT OF NUMEROUS POLITICAL EXTREMIST GROUPS. COMPUTER PERSONNEL CAN BE EMPLOYED EASILY BY CRIMINAL GROUPS TO ATTACK OR MANIPULATE A PRIVATE OR GOVERNMENT COMPUTER. BETTER SECURITY IS RECOMMENDED THROUGH THE ISOLATION OF THE COMPUTER FACILITY FROM OTHER DIVISIONS WITHIN A FIRM OR GOVERNMENT AGENCY, THE IMMEDIATE REPORTING OF ERRORS IN A SYSTEM OR DATA TO RESPONSIBLE OFFICIALS, AND THE PERIODIC REVIEW AND REVISION OF SECURITY MEASURES. (DEP)
Index Term(s): Computer privacy and security; Computer related crime; Computers; Organized crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=51086

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.