6.5 Current Technologies


6.5 Current Technologies

Perhaps the best way to finalize our exploration of how criminals engage and adapt computer and Internet technology is by discussing a couple of examples. The technologies discussed are only a very small sample of what is available to the cyber criminal. Of these technologies, only a few of the many criminal adaptations are illustrated.

6.5.1 A Computer Virus

A computer virus is a foreign program that is designed to enter a computer system with the purpose of executing one or more particular functions without the knowledge or consent of the system administrator. The function of a virus is specified by its creator. The criminal applications of viruses in the cyberverse are almost without limits. They are typically used to steal, broadcast, and/or destroy information (examples include computer files containing personal contact information, credit card numbers, and passwords).

  • A thief can program and disseminate a virus on a given network that is designed to locate and gather victim password information used in online banking.

  • A stalker can program and disseminate a virus to a particular victim's PC via anonymous personal e-mail designed to locate and gather sensitive personal information including address books, financial files, and digital images.

  • A terrorist can program and disseminate a virus on a particular network that is designed to delete or alter specific files essential to that network's function. In doing so, they can alter or disrupt that function.

6.5.2 A Public E-Mail Discussion List

Individuals may develop and maintain or join one of the many public e-mail discussion lists available via the Internet to share the details and experiences of their lives with others. They are also a way to meet and learn from people with similar experiences and interests. The content of an e-mail discussion list is dependent on the list topic, and the types of posts that are sent by subscribers. However, any e-mail discussion list represents a captive audience susceptible to individual and multiple broadcasts of information over that list.

  • A thief may use information (personal details elicited from text and photographs) gathered from a victim's posts on an e-mail discussion list to plan a burglary, targeting specific valuables in specific rooms.

  • An ex-intimate may join a discussion list to which their former intimate subscribes. Once subscribed, they may publicly harass and defame their former intimate with a mixture of true and false information. This can be accomplished by the distribution of explicit and/or invasive personal images, as well as the dissemination of false accusations of child abuse, sex crimes, or other criminal conduct.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net