This preview shows page 1. Sign up to view the full content.
Unformatted text preview: er become more efficient at carrying out a crime. Computer-assisted crimes are usually covered by regular criminal laws in that they are not always considered a
“computer crime.” One way to look at it is that a computer-targeted crime could not
take place without a computer, whereas a computer-assisted crime could. Thus, a computer-targeted crime is one that did not, and could not, exist before computers became
of common use. In other words, in the good old days, you could not carry out a buffer
overflow on your neighbor, or install malware on your enemy’s system. These crimes
require that computers be involved.
If a crime falls into the “computer is incidental” category, this means a computer
just happened to be involved in some secondary manner, but its involvement is still
insignificant. For example, if you had a friend who worked for a company that runs the
state lottery and he gives you a printout of the next three winning numbers and you
type them into your computer, your computer is just the storage place. You could have
just kept the piece of paper and not put the data in a computer. Another example is
child pornography. The actual crime is obtaining and sharing child pornography pictures or graphics. The pictures could be stored on a file server or they could be kept in
a physical file in someone’s desk. So if a crime falls within this category, the computer
is not attacking another computer, and a computer is not being attacked, but the computer is still used in some significant manner.
You may say, “So what? A crime is a crime. Why break it down into these types of
categories?” The reason these types of categories are created is to allow current laws to
apply to these types of crimes, even though they are in the digital world. Let’s say someone is on your computer just looking around, not causing any damage, but she should
not be there. Should the legislation have to create a new law stating, “Thou shall not
browse around in someone else’s computer,” or should we just use the already created
trespassing law? What if a hacker got...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12