computercrimepaper - Computer Crime Computer Crime and...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Crime 1 Computer Crime and Fraud Computer Crime Luke A Boyd INF 103: Computer Literacy Barbara Hollinger February 1, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Crime 2 Computer Crime Look at this: “…more than $70,000.00 worth of computers and related equipment were stolen from the Graduate School of Education and Information Studies (GSE&IS) university police said (UCPD). . . . Over 30 computers were taken from labs, offices, and classrooms. Many of the students and faculty have been disrupted because of the lost research data . . . “ Posted as, “ School Adjusts to Major Computer Theft", Daily Bruin, Crime by Brooke Bridgford. Think that’s crazy, look here: “ . . . A thief has stolen a hard drive from Levi Strauss' headquarters in San Francisco containing sensitive data. The drive contains the birth dates, Social Security numbers and names of thousands of Levi Employees. Company officials are not currently sure whether the drive was stolen for the data it contains or simply for the hardware. Levi has warned 20,000 of its US workers that their personal information may be in the hands of criminals. The data could be used to access the employee's personal bank information or to apply for fraudulent credit cards… Fraudulent credit-card numbers are worth about $5,000.00 on the street, and a criminal gang could apply for two illegal cards in each name. The theft of the $200 hard drive could be a potential $200 million dollar crime if you had a smart criminal. . . " Posted as, "Levi Strauss Caught With Its Pants Down", Computer World , May 5, 1997 v31 n18 p.(s) Sharon Machlis. And finally, what about this: " . . . Data on a machine can be worth substantially more than the hardware itself if the thief knows about it. A laptop stolen from the British Defense Ministry in the early 90's had the entire Desert Storm war plan on it. The theft caused a furor among NATO allies, Wade said. But it is believed that
Background image of page 2
Computer Crime 3 data was never used and the computer was stolen simply as hardware. . . " Posted as, "Levi Strauss Caught With Its Pants Down", Computer World
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/21/2011 for the course ORGANIZATI 201 taught by Professor Pope during the Spring '11 term at Ashford University.

Page1 / 9

computercrimepaper - Computer Crime Computer Crime and...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online