Three Examples of Computer Crime
Snooping
Snooping is looking through information files in the hopes of finding the something interesting*. If the files are on paper, an attacker(a person who presupposes a crime) may do this by opening a file drawer and searching through the files. If the files are on the computer system, an attacker may attempt to open one file after another until information is found.
By the definition of snooping, I, as an instructor of my students, am guilty about the crime. There are times that the students personal directory are full of interesting materials that I copy them without the permission of the student.
Eavesdropping
When someone listens in on a conversation that they are not part of, that is eavesdropping*. To gain unauthorized access to information, an attacker must position himself at a location where information of interest is likely to pass by. This is most often done electronically. The introduction of wireless networks has increased the opportunity to perform eavesdropping. Now an individual does not have to place a system or listening device on the physical wire. Instead, the attacker might be able to sit in a parking lot or on the street near a building while accessing information.
I viewed a documentary regarding wireless hacking in a Video CD. I have seen that some people who wanted fortune and serve it as a livelihood, they travel form regions to regions, especially the countries that are not serious on the matter Usually, third world countries, I have a friend in Papua New Guinea and he told me that the natives out there look-up unto the Filipino people for without the Filipinos, their knowledge on computers are far than expected.
Interception
Unlike eavesdropping, interception is an active attack against the information. When an attacker intercepts information, he is inserting herself in the path of the information and capturing it before it reaches destination, After examining the information, the attacker may allow the information to continue to its destination or not.
NBI investigating committee on the issue of call centers operating in the Philippines have a problem on how legit is the call centers exchange of information from source to destination and vice versa. A raid on call centers somewhere in Pampanga where the operation is a call center but the content of their exchange is a NUDE production at the exchange of dollars. The Office of the Computer Crime NBI Division (OCCNBID) could not respond on these situations because of the lack of technology in their office to catapult the events. The event is not new in the world of computers. We can see lots of them committed everyday. The movie AntiTrusts depicts the real crime story that we can experience by watching it.
End of activity
- reference1: Network Security A Beginners Guide, Maiwald Eric, pp 1-20.
- reference2: Hackers Exposed Linux, Linux Security Secrets and Solution, Brian Hatch and James Lee2, pp 122-150.
-
|