You are on page 1of 21

Manuel S.

Enverga University Foundation Basic Education Department Lucena City

COMPUTER: AS A TOOL OF CRIME

PRESENTED BY: Debbie Ann C. Lorejo III-Copper PRESENTED TO: Ms. Jennifer G. Garcia August 10.2011

ACKNOWLEDGMENT
The researcher will not be able to finish these research paper without the help of my sister and Also our Lord God. He gave us knowledge to answer all the given question in this research paper. Some question is hard, but I know that I can make it, because God and my sister are willing to help me in this research paper. And my sister give me money for this job.

The researcher

DEDICATION
The researcher would like to dedicate her research paper to her family, friends, God and specially to her mom. She do her best just to finish this research paper. She want that her family and of course her mom to make proud to her. And after she finish this research paper she know that her mom will proud to her. That s all, Thank you!

TABLE OF CONTENTS
Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Dedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii CHAPTER I Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10 CHAPTER II Review of related Literature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12 Review of related study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15 CHAPTER III Definition of terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-18 CHAPTER IV Bibliography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

CHAPTER I INTRODUCTION PURPOSE


I decide to pick this study because to help me and other people to know what happened to our community because of computers. My research paper, gives many ideas about using computer as a tool for doing a crime.

SUMMARY/GITS
There are no precise, reliable statistics on the amount of computer crime and the economic loss. To victims, partly because many of these crimes are apparently not detected by victims, many of These crimes are never reported to authorities, and partly because the losses are often difficult to calculate. Nevertheless, there is a consensus among both law enforcement personnel and Computer scientists who specialize in security that both the number of computer crime Incidents and the sophistication of computer criminals are increasing rapidly. Estimates are that Computer crime costs victims in the USA at least 5x10 / year, and the true value of such Crime might be substantially higher. Experts in computer security, who are not attorneys, speak O information warfare. While such information warfare is just another name for computer Crime, the world warfare does fairly denote the amount of damage inflicted on society. Computer can be the object of a crime. When a computer us affected by the criminal act it is the 4

of the crime. The computer can be used as the tool for conducting or planning a crime. It can also be called as the instrument of the crime. This is the form how to use a Computer as a tool of crime destroying a system, Hacking information, Manipulating data. Where you can find it In the network, And in the Internet. And which is called Cybercrime who accesses a computer system without permission. The fundamental issue in most computer crime is the criminals lack of respect for the property r privacy f other people. I hope that society will recognize the seriousness of computer crime and demand more severe punishment for such criminals. There is no doubt that the publicity surrounding an epidemic of a virus or worm increases awareness of security flaws. However, this incidental benefit does not justify the more than US$ 10 cost to clean the malicious code from more than a thousand inflected computers. Regardless of any benefits to society, a worm or virus is still an unauthorized access of a persons computer. A rational and socially acceptable response to discovering a security flaw is to privately notify the software. That vendor can then develop a patch and, when the patch is ready for public distribution, the vendor can inform system administrators. In that way, the vulnerability is not publicly for criminals to exploit before the patch is available. One of the functions of the criminal justice system is to deter crime by other people. Journalists play an important role in this deterrence by reporting on the crime (and how people were harmed), arrest, trial, and sentence of the guilty criminals. One hopes that people contemplating computer crimes will read 5

these reports by journalists, and say to themselves: I should not write a computer virus, because I dont want t be put in prison like David Lee Smith, the author of the Melissa virus. In the 1980s most hackers committed fraud to get a username and password for a computer accounts, and then logged on to the computer without proper authorization, and browsed through files, copying some, deleting or altering others. Such work does not require any knowledge of computer programming, just a rudimentary knowledge of a few operating system commands. Since 2000, authors of malicious programs use resources readily available on the internet to create a new computer virus or worm, or launch a denial of service attack. Again, such activities do not demonstrate a high level of proficiency in computer programming. It is an anti-social act for journalists to praise the exploits of hackers: the wrong message is sent to serious students in computer science who behave ethically and who are ignored by journalists, despite the fact that the students are both smarter and more ethical than hackers. There are three major classes of criminal activity with computers: 1. Unauthorized use of a computer, which might involve stealing a username and password. 2. Might involve accessing the victims computer via the Internet through backdoor operated by a Trojan Horse program. 3. Creating or releasing a malicious computer program (e.g., computer virus, worm, Trojan horse.) 6

4. Harassment and stalking in cyberspace. 1. Unauthorized Use Unauthorized use of computers tends generally takes the following Forms: Computer voyeur. The criminal reads (or copies) confidential or proprietary information, but data is neither deleted nor changed. In 1999, the Melissa virus inflected a [possibly confidential] document on a victims computer, then automatically sent the document. 2. Copy of the virus via e-mail to other people. Subsequently, the SirCam and Klez malicious programs made a similar release of [possibly confidential] documents from a victims computer. These malicious programs are a new way to release confidential information from a victims computer, with the confidential information going not to be author of the malicious program. 1. Changing Data. For example, change a grade on a school transcript, add money to a checking account, etc. Unauthorized changing of data is generally a fraudulent act. 2. Deleting Data. Deleting entire files could be an act of vandalism or sabotage.

3. Denying service to authorized users. On a modern time-sharing computer, any user takes some time and disk space, which is not available to other users. By denying time or disk space, for example: a. By sending large amounts of junk e-mail in one day, a so-called mail bomb. b. By having the computer execute a malicious program that puts the processing unit. c. Into an infinite loop. d. By flooding an internet server with bogus requests for WebPages, thereby denying. e. Legitimate users an opportunity to download a page and also possibly crashing the server. This is called a denial of service (DoS) attack. New crimes in cyberspace

1. Unauthorized use of a computer, which might involve stealing a username and password. 2. Might involve accessing the victims computer via the Internet through operated by a Trojan Horse program. 3. Creating or releasing a malicious computer program (e.g., computer virus, worm, Trojan horse. 4. Harassment and stalking in cyberspace. backdoor

When lay people hear the words "computer crime", they often think of obscene pictures

available on the Internet, or solicitation of children for sex by pedophiles via chat rooms on

the Internet. The legal problem of obscenity on the Internet is mostly the same as the legal

problem of obscenity in books and magazines, except for some technical issues of personal

jurisdiction on the Internet. I have discussed obscenity on the Internet in my May 1997 essay

on law & technology and I have nothing further to say about obscenity in this essay on computer crime.

Similarly, many crimes involving computers are no different from crimes without computers:

the computer is only a tool that a criminal uses to commit a crime. For example,

Using computer, a scanner, a graphics or software, and a high-quality color laser or ink jet printer for forgery or counterfeiting is the crime as using an old-fashioned printing press with link.

Stealing a laptop computer with proprietary information stored on the hard disk inside the computer is the same crime as stealing a briefcase that contains papers with proprietary information.

Using the Internet or online services to solicit sex to other forms of solicitation of sex, and so is not a new crime.

Using computers can be another way to commit either larceny or fraud.

10

CHAPTER II

REVIEW OF RELATED LETERATURE AND STUDY

REVIEW OF RELATED LETERATURE

Computer Forensics is the scientific study of computers or computer related data in relation to an investigation by a law enforcement agency for use in a court of law. While this technology may be as old as computers themselves, the advances in technology are constantly revising the science of computer forensics. In the technological old days, computer forensics was mostly related to data dumps, printing out every keystroke that had been logged on a computer in a series of eight digits, all of them zeroes and ones. Literally cases of paper would be used for the printing of the materials. Systems analysts would then have to convert all of the data into hex and then translate the value into whatever the actual keystroke was. In this way, it was possible to go over all of the data and figure out at what point the computer and the corresponding program crashed. Like computers and technology, Computer forensics has evolved by leaps and bounds since those days of old.

While all computer language still ultimately boils down to ones and zeroes or binary and then hex, the means by which programs are created, run and utilized has changed drastically.

11

Computer forensics has done well to keep up with the task at hand. Now hard drives can be wiped clean.

However, without an unconditional format (and in rare cases, even with the unconditional switch) the data can still be retrieved. It takes an expert in computer forensics however. It takes someone who is familiar with the technology of the computer and the science of computer forensics to reconstruct all of the data that has been wiped off of the hard drive.

Computer forensics can be used to track emails, instant messaging and just about any other form of computer related communications. This can be necessary, especially in the world today. Computer forensics experts have even advanced the technology to the point that they can track data real time, or while it is actually being sent and received. This is a mind-numbing task when you think about the billions of communications going on around the globe at any given time, but the science of computer forensics is constantly advancing every bit as quickly or sometimes even faster than the technology they are responsible for investigating.

Computer forensics is an interesting aspect of technology that is often overlooked. Computer forensics have been used to solve many crimes and should be considered a viable tool in many ways. The study of computer forensics is constantly growing along with technology.

12

REVIEW OF RELATED STUDY

According to Guian Cittadel P. Loares is a senior BS Computer Science student and a member of the Young Software Engineers Society. Computer Crime encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. Cyber Crime describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behavior perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. I could imagine the Internet being the main difference between the two. A computer doesn't necessarily mean one that is connected to the Internet. The term "cyber" however, denotes something done online. When lay people hear the words computer crime, they often think obscene pictures available on the internet, or solicitation of children for sex by pedophiles via chat rooms on the internet. 13

The legal problem of obscenity on the internet is mostly the same as the legal problem of obscenity in books and magazines, except for some technical issues of personal jurisdiction on the internet. I have discussed obscenity on the internet in my May 1997 essay on Law and technology and I have nothing further to say about obscenity in this essay on computer crime. Aside from my main point about deterrence of computer crime, by reporting of sentencing and punishment of computer criminals, there is another issue. The widespread reporting of the crime and the arrest of a suspect tarnishes the name of the suspect, by linking the crime and the suspects name in peoples minds. However, the suspect might later found not guilty of the crime. The lack of reporting f the trial and its outcome provides no opportunity for an innocent suspect to rehabilitate his good name. There is no doubt that the publicity surrounding an epidemic of a virus or worm increases awareness of security flaws. However, this incidental benefit does not justify the more than US$ 10 cost to clean the malicious code from more than a thousand inflected computers. Regardless of any benefits to society, a worm or virus is still an unauthorized access of a persons computer. A rational and socially acceptable response to discovering a security flaw is to privately notify the software. That vendor can then develop a patch and, when the patch is ready for public distribution, the vendor can inform system administrators. In that way, the vulnerability is not publicly for criminals to exploit before the patch is available. 14

According to Melissa Virus one hopes that people contemplating computer crimes will read these reports by journalists, and say to themselves: I should not write a computer virus, because I dont want to be put in prison like David Lee Smith. Journalists often glorify or praise the criminal suspect, by admiring his programming talent, or even calling him a genius. In the 1980s most hackers committed fraud to get a username and password for a computer accounts, and then logged on to the computer without proper authorization, and browsed through files, copying some, deleting or altering others. Such work does not require any knowledge of computer programming, just a rudimentary knowledge of a few operating system commands. Since 2000, authors of malicious programs use resources readily available on the internet to create a new computer virus or worm, or launch a denial of service attack. Again, such activities do not demonstrate a high level of proficiency in computer programming. It is an anti-social act for journalists to praise the exploits of hackers: the wrong message is sent to serious students in computer science who behave ethically and who are ignored by journalists, despite the fact that the students are both smarter and more ethical than hackers.

15

CHAPTER III DEFINITION OF TERMS 1. Precise- Clearly defined, exact.


2. Reliable- Dependable, trustworthy. 3. Statistics- The branch of mathematics dealing with the collection, analysis and presentation of numerical data. 4. Partly- In part, to some extent. 5. Consensus- An opinion held by all or most, general agreement, esp. in opinion. 6. Apparently- Easily seen, evident, seeming, but not real. 7. Sophistication- Refined, worldly-wise, intelligent, complex. 8. Rapidly- A great speed, fast, sudden, steep. 9. Warfare- Armed hostilities, conflict. 10. Hacking- To cut or chop violently. 11.Forensics- Belonging to or used in courts of law. 12. Dumps- To drop or put down carelessly in a heap, to deposit as rubbish, to abandon or get rid of, to sell goods abroad at a price lower than the market price abroad. A place for refuse, a. temporary store, a dirty dilapidated place 13. Drastically- Acting with force and violence. 16

14. Reconstruct- To build again, to build up, as from remains, an image of the original, to supply missing parts by conjecture. 15. Wiped- To rub a surface with cloth in order to clean or dry it, to remove, to erase, to kill off, to destroy. A wiping. 16. Obscenity- The state or quality of being obscene, an obscene act, word. 17. Jurisdiction- The right or authority to apply the law, the exercise of such authority, the limits of territory over which such authority extends. 18. Patch- A piece of cloth used for mending, a scrap of material, a shield for an injured eye, a black spot of silk, worn on the face, an irregular spot on a surface, a plot of ground, a bandage, an area or spot, to repair with a patch, to piece together, to mend in a makeshift way. 19. Vulnerability- Capable of being wounded physically or mentally opens to persuasion, easily influenced. 20. Exploit- A bold achievement, to utilize, develops, to take unfair advantage of, for financial gain. 21. Deterrence- Something that deters a nuclear weapon that deters attack through fear of retaliation, deterring. 22. Ethically- Of or pertaining to ethics, conforming to the principles of proper conduct, as established by society, a profession, legally available only n prescription. 17

23. Malicious- active ill will, intention to inflict injury upon another.

24. Denial- The act of denying, a refusal of a request, a refusal or reluctance t admit the truth of something. 25. Rudimentary- Elementary, imperfectly developed or represented only by a vestige. 26. Fraud- Deliberate deceit, an act of deception, a deceitful person, an impostor.

18

CHAPTER IV BIBLIOGRAPHY BOOK SOURCE

Peter Stephenson
September 1999

ELECTRONIC SOURCE

Article Source: http://EzineArticles.com/192667


Tips for avoiding Computer Crime www.yahoo.com/ why it s important to solve a crime http://www.rbs2.com/ccrime.htm

19

You might also like