Targeting the computer:
When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.
Computer as an instrument:
Using computers as an instrument, many criminals started making crimes by falsified use of ATM cards for stealing money through online.
Crime where computer is not …show more content…
responsible but would be a part of criminal act:
Some criminals wreck storage media devices like disks to avoid the proof /evidence of the crime.
Piracy:
Now a day’s hackers develop pirated software for penetrating into other computers when they use such piracy software’s.
Laws of the most common computer crimes:
The Computer Fraud and Abuse Act (CFAA):
CFAA- when a hacker breaks into other computers for stealing information is considered against the law and can be imprisoned (Cory, 2013).
ECONOMIC ESPIONAGE ACT:
In this law, when a person espionages on the other industry to know the trade secrets .
This is considered to be against the law.
Real incidents which clearly explains the above laws and how the investigation process has been done:
Incident1:
Highly known incident of corporate surveillance, which took place in the early era among the branded –goods companies Procter & Gamble and Unilever. These companies are known for their fierce competition (Crane, 2005).
Motive for gathering intelligence:
The main purpose was to know the formulas and strategies of Shampoo brand –named as Clairol hair care and also to know their future products. Procter & Gamble have hired outsiders to spy on Unilever with the help of contractors to know the essential information about the Unilever through trash bins.
How the espionage has been done:
Dumpster diving: The staff who investigated had succeeded by finding lot of documents related to Unilever’s Company. The most essential information like their future plans, strategic ideas of marketing and formulas of making Shampoo. This is the most famous industrial –espionage incident happened using trash can as a tool because it is perfectly legal in most of the countries. It is legal because trash cans are not private property, so one can trespass. Procter & Gamble won the competition, when both companies involved in auctioning the Clairol
Shampoo.
Incident2:
In 1992, there was a famous incident of corporate espionage between Gillette and Steven Louis Davis. Steven Louis who works for Wright industries which was associated with Gillette for building the technology of new shaving System. He has leaked the entire strategies to design the new razor to Warner-Lambert, BIC and American safety razor.
Motive:
Steven Louis did this for a commercial purpose to gain huge amount of money. Tools used:
Steven Louis has used Fax machine and Email as a tool and sent the sketches of the new razor design (Tier, 2013). Steven Louis was sentenced to 27 years of jail and to pay 1.3 million dollars as compensation.
INDUSTRIAL TRENDS IN PROTECTING PRIVACY USING TECHNOLOGY:
DIGITAL DEVICES AND BYOD:
Now a day’s they are facing many problems due to digital devices because of numerous smart phones being used by the smart phones. The organization must create both guest network and main network separately where the personal data related to an organization can be hidden.
Social Media:
Social media helps many companies to market and communicate by them themselves for business purpose. For providing great service, they collect entire personal information from the customers. Organizations try hard to protect the data collected from the customers but using data mining techniques hackers can collect the information. Organizations have to be very alert while they collect the data from the customers ("Privacy trends 2014," 2014).
In memory computing:
The access for the data in the Random access memory can be done by the users for creation of complex applications which are used to retrieve the data. When privacy framework is created by the organization, it is very much easy to develop secured applications ("Privacy trends 2014," 2014).
LEGAL ISSUES AND PARTICULAR PROBLEMS RELATED TO COMPUTER CRIMES:
It is very difficult to prove for the investigator whether the hacker purposely committed a crime or accidentally destroyed all the files.
It is also very much hard to detect the evidence of the computer crime since the crime in conducted within few seconds and automatically erases the evidence.
Crimes mostly associated with the intellectual property-documents or files, can be considered as theft when the product has commercial value and can be used privately for the research purpose.
Solutions:
Security awareness could really help very much from the issues of security.
Always thinking like an attacker could always help in regulating the issues concerned with the security.
Secure mechanisms and software has to be used to prevent these crimes.
REFERENCES:
DAVID, L. C. (1995). Computer crime categories how techno-criminals operate. Retrieved from https://www.ncjrs.gov/pdffiles1/Digitization/156176NCJRS.pdf
Cory, D. (2013). Understanding the computer fraud and abuse act: can you go to jail for violating a click through agreement?. Retrieved from http://boingboing.net/2013/02/18/understanding-the-computer-fra.html
(2014). Privacy trends 2014 privacy protection in the age of technology. Retrieved from http://www.ey.com/Publication/vwLUAssets/EY_-_Privacy_trends_2014:_Privacy_protection_in_the_age_of_technology/$FILE/EY-Insights-on-GRC-Privacy-trends-2014.pdf
Crane, A. (2005). In The Company Of Spies: When Competitive Intelligence Gathering Becomes Industrial Espionage. Business Horizons, 48(3), 233-240.
Tie, R. (n.d.). Economic Espionage.Economic Espionage. Retrieved November 3, 2013, from http://www.fraud-magazine.com/article.aspx?id=2147483718