skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 98499 Find in a Library
Title: Spies in the Wires
Corporate Author: British Broadcasting Corporation
United Kingdom
Project Director: J Green
Date Published: 1984
Sponsoring Agency: British Broadcasting Corporation
London, W1M 4AA, England
Films, Inc
Wilmette, IL 60091
Not Available Through National Institute of Justice/NCJRS Document Loan Program
Rockville, MD 20849
Sale Source: Films, Inc
1213 Wilmette Avenue
Wilmette, IL 60091
United States of America

Not Available Through National Institute of Justice/NCJRS Document Loan Program
Rockville, MD 20849
United States of America
Language: English
Country: United Kingdom
Annotation: This video cassette examines the vulnerability of electronic information processing to violations of privacy and various criminal offenses.
Abstract: Experts discuss key security and privacy problems in electronic data processing. One problem considered is that of juvenile computer 'hackers' who access data systems through home computers and telephone modems. Curtailing this invasion of data systems is noted to be difficult, since the public does not consider these activities to be criminal, tending to admire the enterprising intellects of these young 'hackers.' The experts advise that this public attitude only encourages further experimentation in illegally accessing various computer data systems. Another security problem identified is computer fraud involving electronic funds transfer. The vulnerability of such transactions is noted to be their use of telephone lines, which can be accessed easily with the use of a modem, an electronic monitoring device, and a cheap FM radio transmitter. The final problem considered involves the vulnerability of data transmitted over radio wires. Although cryptographic codes are reported to have been developed to counter computer interception of such data, many are concerned about who would use these codes and for what purposes. Use by organized crime for illegal purposes is cited, as is use by the state to intrude in the private lives of citizens.
Index Term(s): Computer related crime; Data security; Right of privacy
Note: *This document is currently unavailable from NCJRS. Videocassette, 48 minutes running time, 3/4 inch, color, rental is available from sales source.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=98499

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.