Page 16 - Forensic News Journal Oct Nov 2017
P. 16
Forensic News Journal
How Computer Criminals Control Information, pg 16-21
©2014-2017 SYT Global, Inc.
HOW COMPUTER
CRIMINALS CONTROL F
O
INFORMATION
R
N
By Meshaal MacLean E
S
I
Photo Courtesy of fbi.gov C
As computer-related there be a human or tech- systems and programs
crimes become more prev- nological problem. with the intent to impede a M
alent, understanding the business or create chaos in E
types of computer-related Here, the offender uses a business operations T
crimes provides law en- the computer to obtain * Unlawful access to H
forcement an insight for information or to damage criminal justice and other O
investigative strategies. operating programs while government records D
The first insight is to know committing the following * Changing a criminal his- O
and understand the types computer crimes: tory, modifying want and L
of computer crimes. warrant information O
* Theft of marketing in- * Creating a driver’s li- G
Computer as the Target formation, like customer cense, passport, or another Y
lists, pricing data, or mar- document for false identi-
This computer crime in- keting plans fication
cludes theft of intellectual * Blackmail based on * Changing tax records or
property. The offender information gained from gaining access to intelli-
accesses the operating computerized files, like gence files
program under the guise the medical information, * Techno-vandalism
of the system’s manager. personal history, or sexual through unauthorized ac-
The intruder accesses the preference cess to damage files or
contents of computer files * Sabotage of intellectual programs
in the system through property, marketing, pric- * Techno-trespass violat-
the trap door that permits ing, or personnel data ing the owner’s privacy as
access to systems should * Sabotage of operating in criminal trespass
16