1995-11-09 - DUF_ibf

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a39c76ae828bff628ea9759505f9c805bc90cf5ac9081e26d1c0a83bfcfe6694
Message ID: <199511081552.KAA06338@pipe3.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-09 01:00:27 UTC
Raw Date: Thu, 9 Nov 1995 09:00:27 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Thu, 9 Nov 1995 09:00:27 +0800
To: cypherpunks@toad.com
Subject: DUF_ibf
Message-ID: <199511081552.KAA06338@pipe3.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   Pal has provided a gopher-FBI paper:


   "Computer Crime Categories: How Techno-criminals Operate."
   By David L. Carter, a professor in the School of Criminal
   Justice, Michigan State University

   Types of Computer Crimes

      Computer As the Target
      Computer As the Instrumentality of the Crime
      Computer Is Incidental to Other Crimes
      Crimes Associated With the Prevalence of Computers

   Perspective on Legal Issues

   Special Problems with Computer-Related Crime

      Intellectual Property
      Malfeasance by Computer
      International Issues

   Conclusion

      Criminals have adapted the advancements of computer
      technology to further their own illegal activities.
      Unfortunately, their actions have far out-paced the
      ability of police to respond effectively.


   DUF_ibf  (21 kb in two parts)














Thread