U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Who Is Calling Your Computer Nest? Hacker!

NCJ Number
100790
Journal
Criminal Justice Journal Volume: 8 Issue: 1 Dated: (1985) Pages: 89-114
Author(s)
D Smith
Date Published
1985
Length
26 pages
Annotation
This note discusses how computers work, the integration of computer hardware and software applications, computer system vulnerability to criminal abuse, the characteristics of computer crime, computer crime legislation, and a proposed strategy for addressing the problem.
Abstract
A review of computer operations considers the history of computer operations and operational systems, including hardware, software, and the interception of transmitted data. An analysis of computer crime defines it, profiles its perpetrators, and presents an overview of detection and investigative activities. Prosecution efforts are also reviewed. Current Federal and State legislation used to prosecute computer-related crime is critiqued, along with legislation in Canada, West Germany, Australia, Japan, and Sweden. Although proposals recommend new legislation to deal more effectively with computer crime, computer system security and law enforcement are seen as the keys to preventing computer crime. Computer security techniques are outlined. 111 footnotes.