From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a39c76ae828bff628ea9759505f9c805bc90cf5ac9081e26d1c0a83bfcfe6694
Message ID: <199511081552.KAA06338@pipe3.nyc.pipeline.com>
Reply To: N/A
UTC Datetime: 1995-11-09 01:00:27 UTC
Raw Date: Thu, 9 Nov 1995 09:00:27 +0800
From: John Young <jya@pipeline.com>
Date: Thu, 9 Nov 1995 09:00:27 +0800
To: cypherpunks@toad.com
Subject: DUF_ibf
Message-ID: <199511081552.KAA06338@pipe3.nyc.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Pal has provided a gopher-FBI paper:
"Computer Crime Categories: How Techno-criminals Operate."
By David L. Carter, a professor in the School of Criminal
Justice, Michigan State University
Types of Computer Crimes
Computer As the Target
Computer As the Instrumentality of the Crime
Computer Is Incidental to Other Crimes
Crimes Associated With the Prevalence of Computers
Perspective on Legal Issues
Special Problems with Computer-Related Crime
Intellectual Property
Malfeasance by Computer
International Issues
Conclusion
Criminals have adapted the advancements of computer
technology to further their own illegal activities.
Unfortunately, their actions have far out-paced the
ability of police to respond effectively.
DUF_ibf (21 kb in two parts)
Return to November 1995
Return to “John Young <jya@pipeline.com>”
1995-11-09 (Thu, 9 Nov 1995 09:00:27 +0800) - DUF_ibf - John Young <jya@pipeline.com>