Preview

Related Literature

Powerful Essays
Open Document
Open Document
13314 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Related Literature
Chapter 3

COMPUTER AND INTERNET CRIME

In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that the computer has ever linked up to. * Dennis Miller, Saturday Night Live, U.S. television show
QUOTE

VIGNETTE
Treatment of Sasser Worm Author Sends Wrong Message

Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike the most
Computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager, Jaschen confessed and was convicted after a three day trial. Jaschen could have receives up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours community service.

Authorities said that once Jaschen realized the havoc the Sasser worm was causing, he tried to author a new version that reverse the damage. His real intent, they said, had simmply been to gain fame as a programmer and perhaps to increase business for his mother, who owned a computer shop in his hometown.
Although Jaschen’s sentence seemed like a crime to many in the IT industry, the real injustice occured just a few months after Jaschen’s indictment, when Securepoint, a German IT security company, hired Jaschen as a programmer. It appeared that the teen responsible for 70 percent of all computer virus

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses.…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Ralph Langner’s article on the Stuxnet worm discusses the hardware, distribution and targets of the attack. He also goes into detail regarding the outlook of future attacks and what we can do to prevent them.…

    • 958 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Facts: In the Case of Blackshades v. the United States, defendant Alex Yucel, a citizen of Sweden, was charged with computer hacking using the malware, “RAT,” under his company called Blackshades. Since he is the founder of the Blackshades, “Rat” had sold the malicious software to 6,000 customers. Blackshades is a malware which includes a remote tool, called “RAT.” With the malware, it enables it to control the victims’ computers. According to the plaintiff, the federal government, Blackshades have stolen thousands of usernames and passwords using this malware. There is evidence presented by the plaintiff that Yucel send an email to a business partner admitting and informing him that he has stolen credit card numbers from this system. The…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Where else the other virus called worm does not damage the system but it allows the hacker to view all the…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Latterly, while scrolling through my Facebook newsfeed, I stumbled across a very interesting photo – shared by one of my friends. It claimed that Hamza Bendelladj, a 27-year-old, Algerian hacker had been sentenced to death by a US judge after allegedly co-creating a banking Trojan horse known as “SpyEye”. The Trojan has reportedly infected more than 1.4 million computers across the globe. It was used to steal millions of dollars from more than 200 American banks and financial institutions after obtaining sensitive information from computer systems, which the hacker had then apparently, donated to several Palestinian charities.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The sting or “running the wire” is a great tool on the grifter’s belt because it allows them to pull of major scams with ease. Sometimes though the sting is ran opposite of the traditional patterns, when this happens the reverse sting is created. Now most of us when we hear the term computer hacker imagine a picture of an anti-social, introverted nerd who is obsessed with computers. Mitnick tells us in this book that images is actually false and the actual…

    • 1284 Words
    • 6 Pages
    Better Essays