Computer Crime It’s the weekend, you have nothing to do so you decide to play aroundon your computer.

You turn it on and then start up, you start callingpeople with your modem, connecting to another world, with people just likeyou at a button press away. This is all fine but what happens when youstart getting into other peoples computer files. Then it becomes a crime,but what is a computer crime really, obviously it involves the use of acomputer but what are these crimes. Well they are: Hacking, Phreaking, ;To begin I will start with Hacking, what is hacking. Hacking isbasically using your computer to “Hack” your way into another. They useprograms called scanners which randomly dials numbers any generating tonesor carriers are recorded.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

These numbers are looked at by hackers and thenused again, when the hacker calls up the number and gets on he’s presentedwith a logon prompt, this is where the hacking really begins, the hackertries to bypass this anyway he knows how to and tries to gain access to thesystem. Why do they do it, well lets go to a book and see “Avid youngcomputer hackers in their preteens and teens are frequently involved incomputer crimes that take the form of trespassing, invasion of privacy, orvandalism. Quite often they are mearly out for a fun and games evening, andthey get entangled in the illegal use of their machines without realizingthe full import of what they are doing”, I have a hard time believing thatso lets see what a “hacker” has to say about what he does “Just as theywere enthraled with their pursuit of information, so are we. The thrill ofthe hack is not in breaking the law, it’s in the pursuit and capture ofknowledge.”, as you can see the “hacker” doesn’t go out to do destroythings although some do. It’s in the pursuit of knowledge. Of course thisis still against the law. But where did all of this start, MIT is wherehacking started the people there would learn and explore computer systemsall around the world.

In the views of professional hacking is like drugs orany other addictive substance, it’s an addiction for the mind and oncestarted it’s difficult to stop. This could be true, as hackers know whatthey are doing is wrong and they know odds are they will be caught. But asI mentioned some hackers are just above average criminals, using thereskills to break in banks and other places where they can get money, orwhere they can destroy information. What a hacker does at a bank is take afew cents or even a few fractions of a cents from many different accountsthis may seem like nothing but when all compiled can be alot. A stick uprobber averages about $8,000 each “job”, and he has to put his life andpersonal freedom on the line to do it while the computer hacker in thecomfort of his own living room averages $500,000 a “job”. As for peopledestroying information, this is for taking some one down, destruction ofdata could end a business which for some is very attractive. It can cost acompany thousands of dollars to restore the damage done.

Now that you have an understanding of what a “hacker” is, it time tomove on to someone closely associates with a hacker. This is a Phreak, butwhat is that. For the answer we turn to the what is known as the”Official” Phreakers Manual “Phreak fr’eek 1.

The action of usingmischievous and mostly illegal ways in order to not pay for some sort oftelecommunications bill, order, transfer, or other service. It ofteninvolves usage of highly illegal boxes and machines in order to defeat thesecurity that is set up to avoid this sort of happening. fr’eaking v. 2.A person who uses the above methods of destruction and chaos in order tomake a better life for all. A true phreaker will not go against his fellowsor narc on people who have ragged on him or do anything termed to bedishonourable to phreaks. fr’eek n. 3.

A certain code or dialup useful inthe action of being a phreak. (Example: “I hacked a new metro phreak lastnight.”)” The latter 2 ideas of what a phreak is, is rather weird. APhreak like the hacker likes to explore and experiment, however his choiceof exploring is not other computer but the phone system as a whole. Phreaksexplore the phone system finding many different ways to do things, mostoften make free calls. Why do they do this, ” A hacker and phreaker willhave need to use telephone systems much more than an average individual,therefore, methods which can be used to avoid toll charges are in order. “.

A phreak has two basic ways of making free calls, he can call up codes orPBXs on his phone and then enter a code and make his call or he can useElectronic Toll Fraud Devices. Codes are rather easy to get the phreakwill scan for them, but unlike a hacker will only save the tone(s) numberinstead of the carrier(s). Then he will attempt to hack the code to use it,these codes range from numbers 0 – 9 and can be any length, although mostare not more than 10. Electronic Toll Fraud Devices are known as Boxes inthe underground.

Most are the size of a pack of smokes, or than can besmaller or bigger. I will not go too deep. They are electronic devicesthan do various things, such as make outgoing calls free, make incomingcalls free, simulate coins dropping in a phone, etc.

People who “Phreak”are caught alot these days thanks to the new technology.Software Piracy is the most common computer crime, it is the illegalcoping of software. “People wouldn’t think of shoplifting software from aretail store, but don’t think twice about going home and making severalillegal copies of the same software.” and this is true because I myself amguilty of this. The major problem is not people going out and buying thesoftware then making copies for everyone, it’s the Bulletin Boards thatcater to pirating software, that really cause the problem. On anyone oneof these boards one can find an upwards of 300 – 1000+ of pirated softwareopen for anyone to take. This is a problem and nothing can really be doneabout it.

Few arrests are made in this area of computer crime. I will now devote a brief section to the above mentioned BBS’ , mostare legal and do nothing wrong. However there are many more that do acceptpirated software, pornographic pictures, animations , and texts. As well asa trading area for phone codes, other BBS’, Credit Card numbers, etc. Thisis where a majority of Hackers and Phreaks come, as well as those whocontinue to pirate software come to meet and share stories. In this is anew world, where you can do anything, there are groups that get, crack, andcourier software all over the world some of them are called: INC:International Network Of Crackers, THG: The Humble Guys, TDT: The DreamTeam. As well a number of other groups have followed suit such asPhalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and YAM (YoungstersAgainst McAfee) these are virus groups who write and courier their workanywhere they can, they just send it somewhere, where anyone can take itand use it in any manner they wish, such as getting even with someone.

Allof these activities are illegal but nothing can be done, the people runningthese boards know what they are doing. As it stands right now, the BBSworld is in two parts Pirating and the Underground, which consists ofHackers/Phreaks/Anarchists/Carders(Credit Card Fraud)/Virus programmers.All have different boards and offer a variety of information on virtuallyWell from all of this reading you just did you should have a fairlygood idea of what computer crime is.

I didn’t mention it in the sectionsbut the police, phone companies are arresting and stopping alot of thingsevery day. With the new technology today it is easier to catch thesecriminals then it was before. With the exception of the BBS’ the policehave made some major blows busting a few BBS’, arresting hackers andphreaks. All of which were very looked up to for knowledge in their areasof specialty. If I had more time I could go into these arrests but I mustfinish by saying that these are real crimes and the sentences are gettingharsher, with alot of the older people getting out the newer people aregetting arrested and being made examples of.

This will deter alot ofBibliography: