Free Essay

Information Theft

In:

Submitted By parshallwilliam
Words 1062
Pages 5
William Parshall
Mr. Burke
June 6, 2015
Information Theft
Is information theft in today’s world, using the internet primarily, a pertinent issue? The world grows continually smaller. Each passing day interconnectivity amongst personal computers becomes increasingly normative. These electronic bridges are at the foundation of the networks of networks which comprise the Internet, which was initially a concept developed as a means by which both communication and vast archives of information could be preserved in the event of a nuclear war. The design was simple: a system of information exchange which was indestructible in its redundancy. In other words, Russia would need to vaporize North America entirely to with the Cold War.

In the absence of a real war, for years the Internet remained inhabited largely by members of academic and scientific communities who prized and throve upon instant exchange of information. It was these individuals who became the first denizens of cyberspace, a new frontier characterized, like the wild west, by anarchy and governed, similarly, by the good sense of inhabitants.

With interest in the Internet as a phenomenon increasing steadily over the past decade, however, it is evident that those now living are witnesses of a bizarre transformation whereby technological experience becomes wholly integral to our daily routine. As scores flock to experience the new online realm, tiny enclaves of similarly-interested individuals coalesce into electronic communities engaging in facilitated exchange of ideas, goods and information. As these communities continue to grow, codes of conduct are frequently established, challenged, and broken. People begin to engage in ecommerce, to establish eculture and to discuss being a good netizen, or user of the internet. These are the inhabitants of today's cyberspace. Among these inhabitants are some individuals whose interests and pursuits will push the envelope of legality online, whose actions will culminate in a laundry list of cyber-legislation, who will, in turn, be largely responsible for shaping the future face of the Internet. Some of these individuals exploit holes in security to gain unauthorized access to computers and are known as hackers. They are intelligent, resourceful, inquisitive, curious, patient, technical-minded and untiring to the point of obsession. At least the good ones are.

Kevin David Mitnick is an exceptional hacker who was arrested in February of 1995 in Raleigh, North Carolina. He was later indicted on 25 counts of criminal activity "including charges for unauthorized access devices, computer fraud, wire fraud, and interception of wire or electronic communications" (Littman 388). In addition, "the major alleged offenses were the misappropriation of copies of the proprietary software of Motorola, Nokia, Fujitsu Ltd., Novell, and NEC Ltd." (Littman 388) So his most egregious offense was possession of a copy of some source code which those companies, in most instances, frequently licensed for a fee. It remains to be seen whether those companies, in actuality, have been burglarized, and whether Mitnick's actions constituted theft of information.

Information theft is an important issue in our world where info-brokers control mass opinion. It is additionally important in cyberspace where the world is composed of information, and information is a valuable meticulously cultivated resource. It is unacceptable that information be tightly controlled, difficult to come by and accessible only to a few individuals. Such a scenario would fly directly in the face of the fundamental precepts of the Internet, and hearken eerily to the double thinking denizens of George Orwell's 1984. Similarly, it is unrealistic to dream that all information be free for everyone. Somewhere between these two extremes lies a fine line which, when crossed, constitutes theft of information. It is not clear whether Mitnick crossed this line.

It is true that he was in possession of proprietary source code for five multinational technology-based companies. But he downloaded copies of the code, which was still safely stored on its original computer and in the hands of its rightful owners. They had not lost anything, nothing was missing, and they would never have noticed anything amiss because nothing was different. Mitnick had effectually made a carbon-copy of the code which he intended to look at and learn from. There is no evidence that he intended to profit from or otherwise distribute the code which he had copied. His motivation appears to have been curiosity.

The affronted companies claimed that Mitnick had caused them millions of dollars in damages. It had, after all, cost them millions to develop the source code which was now in his possession. Still, they still had their code, and they would be protected by other legislation which would prevent Mitnick from profiting off their work. It seems preposterous to hold a man liable for damages incurred by the loss of something they still had. In this digital age, however, the phenomena of precise reproduction and exact duplication do raise additional questions as to what constitutes property and theft.

For now, it is important to consider a variety of factors when characterizing an event as the theft of information. The original owner of the information must remain in possession of an unaltered version of it. The so-called thief must not gain financially or cause financial loss or other damages to the original owner through his or her possession of the information. Finally, the so-called thief should not distribute, or demonstrate evidence of intent to distribute or gain financially or cause financial loss or other damages to the original owner of the information, by the subsequent ownership thereof.

This being said, it is intuitively understood that on some level Kevin Mitnick did engage in the theft of information. What remains unclear is how we as a society should respond. It does not seem that he ought to be severely punished for what amounts to curiosity. Certainly he could have made a great deal of money and caused extensive damage, but there is simply no evidence of this being his intent. In the absence of a precedent, it is difficult to judge wisely. The only certainty is that as more people come to inhabit cyberspace, more of these cases will come to the forefront of our imagination and attention, more legal decisions will be made and more precedents set which will have real bearing on your very own little corner of cyberspace.

Works Cited:
Littman, Jonathan. The Fugitive Game: Online with Kevin Mitnick. Little, Brown and Company. New York: 1997.

Similar Documents

Premium Essay

A Case Study on How to Manage the Theft of Information

...A Case Study on How to Manage the Theft of Information Robert M Polstra III Kennesaw State University 2004 Westwood Rd Smyrna, GA 30080 404-641-8937 rpolstra@hotmail.com ABSTRACT 1. INTRODUCTION This paper shows the importance that management plays in the protection of information and in the planning to handle a security breach when a theft of information happens. Recent thefts of information that have hit major companies have caused concern. These thefts were caused by companies’ inability to determine risks associated with the protection of their data and these companies lack of planning to properly manage a security breach when it occurs. It is becoming necessary, if not mandatory, for organizations to perform ongoing risk analysis to protect their systems. Organizations need to realize that the theft of information is a management issue as well as a technology one, and that these recent security breaches were mainly caused by business decisions by management and not a lack of technology. After counter-terrorism and counter-intelligence, cyber crime is the third highest priority for the U.S. Federal Bureau [4]. With the rise of the theft of information and the lure of big profits for this stolen information, it is necessary for information systems to have the ability to protect this valuable asset. It is estimated that a credit card number unsupported by any other documentation is worth $10, and a credit history report retails for $60 [2]...

Words: 3469 - Pages: 14

Free Essay

Identity Theft: How Information Technology Has Made It Easier to Do

...Identity Theft: How Information Technology Has Made It Easier To Do IFSM201 Identity theft is not a new problem; it has actually been around for many years but with technology evolving by the minute it has made identity theft easier than ever before to do and almost get away with, leaving little to no traces. In the past the way to commit identity theft was to kill a person and assume their identity, this was way before photo ids were customary, during those times id theft wasn’t that prevalent. During the 50’s and 60’s with the invention of credit cards and Social Security Cards identity theft began to increase slightly, since most people carried their social security cards or passports in their wallets making it easy for thieves to steal and assume their identity; even though a thief may have had your personal information it still wasn’t easy for them to get credit without applying for it in person with photo identification or without the manager of the bank that was extending the credit vouching for you personally (History of Identity Theft) Obtaining credit now a days is a lot easier as long as you have the required information, even if that information is not yours, you no longer need a bank manager to vouch for you; this gives thieves more opportunities to get your information and make it their own. With the invention of the Internet and having just about every transaction we do transmitted electronically, identity thieves have the ability to...

Words: 1196 - Pages: 5

Free Essay

Argumentative Essay

...Associate Level Material Critical Analysis Forms Fill out one form for each source. |Source 1 Title and Citation: Identity Theft Is a Serious Problem | |Swecker, C. (2009). Identity Theft Is a Problem (Cyber Crime ed.) Louise I. Gerdes. Detroit: Greenhaven Press. | | | | | |1 |Identify the principal issue presented by the |Identity theft has emerged as one of the dominant white collar crime | | |source. |problems of the twenty-first century | | | | | |2 |Identify any examples of bias presented by the |This particular article seemed bias free to me. The author did a good job of| | |author. If none exist, explain how you |producing statistics backing his claims. The author gives detailed | | |determined this. |information about the FBI internet crime numbers along with information | | | |regarding the Internet Crime Complain Center. I never felt that the author | | | |was...

Words: 1132 - Pages: 5

Premium Essay

Computer

...Computer Crimes Computer Crimes Computer Crimes Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, "computer crime". The following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field. Computer crimes are often heard a lot about in the news. When you ask someone why he/she robbed banks, they world replied, "Because that's where the money is." Today's criminals have learned where the money is. Instead of settling for a few thousand dollars in a bank robbery, those with enough computer knowledge can walk away from a computer crime with many millions. The National Computer Crimes Squad estimates that between 85 and 97 percent of computer crimes are not even detected. Fewer than 10 percent of all computer crimes are reported this is mainly because organizations fear that their employees, clients, and stockholders will lose faith in them if they admit that their computers have been attacked. And...

Words: 1814 - Pages: 8

Free Essay

Categories of Computer Crimes

...criminal activities which involve the use of information technology to get illegal or unauthorized access to a a computer system with the mind set of damaging, deleting, and altering computer data. Computer crimes are include but are not limited to electronic frauds, misuse of devices, identity theft and data. Computer crimes do not necessarily have to involve damage to physical property. The computer could have participated in the crime or may have been the target. There are for common types of computer crimes computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. Categories of Computer Crime There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records is another crime that targets the computer directly. This type of crime you could change a criminal history, modifying warrant information, creating a driver’s license, passport, or...

Words: 802 - Pages: 4

Free Essay

Crme

...Assignment 1: Digital Computer Crime Information Technology in Criminal Justice Lashavia Davis Strayer University Professor Marina Stakic February 4, 2015 Computer crimes refer to any crime that involves a computer and a network, where unauthorized use of the computers where it may or may not have played an instrumental part in committing the crime. Computer crimes have a broad range of potentially illegal activities. It may be divided into one of two types of categories, “crimes that target computer networks or devices directly, and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.’” Which we have four major categories that fit inside one of two types of categories; the computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer. This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network...

Words: 1491 - Pages: 6

Free Essay

Crime

...The U.S. Department of Justice administers two statistical programs to measure the magnitude, nature, and impact of crime in the Nation: the Uniform Crime Reporting (UCR) Program and the National Crime Victimization Survey (NCVS). Each of these programs produces valuable information about aspects of the Nation’s crime problem. Because the UCR and NCVS programs are conducted for different purposes, use different methods, and focus on somewhat different aspects of crime, the information they produce together provides a more comprehensive panorama of the Nation’s crime problem than either could produce alone. The International Association of Chiefs of Police (IACP) began publishing information for the UCR Program in 1929, just two years after the IACP had established a committee to research the uniform reporting of crime statistics. Since September 1930, the FBI has administered the program and currently collects information on the following crimes: murder and non-negligent manslaughter, forcible rape, robbery, aggravated assault, burglary, larceny-theft, motor vehicle theft, and arson. Law enforcement agencies report arrest data for 21 additional crime categories. The UCR Program compiles data from monthly law enforcement reports or individual crime incident records transmitted directly to the FBI or to centralized state agencies that then report to the FBI. The program thoroughly examines each report it receives for reasonableness, accuracy...

Words: 417 - Pages: 2

Premium Essay

Computer Science

...knowledge from its perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...

Words: 1361 - Pages: 6

Free Essay

Conducting Surveys

...the research environment are most appropriate for our organizational problem. What data collection instrument(s) will be used? Survey? Interview? There are two methods of research in which we are preparing to use. One method of research is the observation method and the other is the focus group method. Both methods are an excellent choice when trying to take control of the losses of a business do to theft. The observation method which is sometime referred to as the field method will give Bloomingdale’s loss prevention team the ability to observer and gather first hand information from the loss prevention team on the behaviors of its employees’ theft problems and issues as well as the consumers. The biggest advantage of this method is that is gives the loss prevention teams an opportunity to participate in the survey. It also gives a greater validation to the information that was retrieved. The focus group works well with each individual loss prevention group because it gives them a opportunity to work closely together in small groups and will limit the amount of information to just the participants in the group. When using a focus group it is a little more expensive than a...

Words: 552 - Pages: 3

Premium Essay

Operation High Roller

...Operation High Roller CSIA 301 November 23, 2014 New forms of cyber crime continue to come up all the time. Technology has aided the theft of money from bank accounts from banks from all over the world and one such cyber attack was Operation High Roller a cyber attack that targeted corporate bank accounts. According to The Wall Street Journal, these attacks which began in Europe spread to Latin America and even the United States (Booker 2012). The attackers did fraudulent transfer of money from accounts belonging to financial institutions. For instance, in the United States, the victims of the attack were companies whose commercial accounts had a minimum of several million dollars. The attackers sent SpyEye and Zeus software to hack computers that were infected with malware. This cyber attack has an extensive network and automation which interacts with serves that are used by their target victims. But much of the transactions are carried out in the servers used by the criminals. Two security firms, McAFee and Gurdian Analytic (Business Insider) were behind this discovery and they realized that there was no human participation required in the transactions. All the criminals needed were insider understanding of the goings on in the banking industry transaction systems. They then developed commercial and custom codes which they maliciously used to siphon millions of dollars into their virtual accounts. About sixty serves were identified as the ones used in making attempted...

Words: 1415 - Pages: 6

Premium Essay

Computer Crimes

...Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference)...

Words: 803 - Pages: 4

Premium Essay

Computer Crimes

...Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor, & Fritsch, 2011) The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference)...

Words: 803 - Pages: 4

Free Essay

Final Paper

...com/criminal-law/criminal- terms. Jane committed this crime when she agreed to accept the five hundred dollars, in exchange for the key. Thinking that Jack was going to commit some sort of crime or / “steal some of her valuables”. For this reason I do think that the woman should be convicted easily of this crime. although the mitigating factor I found should help her during the sentencing phase, and my even provide an adequate defense. Identity Theft: is the crime of obtaining the personal identifying information of another person and using that information to obtain property or information to which he is not entitled, and doing so without the permission of the person whose personal identifying information is used. This is a very rapidly growing area of white collar crime, is international in scope, and is often done with sophisticated computer hacking techniques, but can also be accomplished by simply surfing trash cans. Shredders are good protection against identity theft. Penalties vary from state to state, but many identity theft offenses are felonies which carry state prison http://criminal-law.freeadvice.com/criminal-law/white_collar_crimes/identity_theft.htm Forgery: A person commits the crime of forgery when, with the intent to defraud, s/he executes, alters or publishes a writing without the owner's knowledge or consent. A...

Words: 1097 - Pages: 5

Premium Essay

Larceny

...commit or engage in larceny or other similar crimes. When considering the relationship between the crime and the consequences, some still choose the crime. This result has been considered a variable of the environment in which a person is exposed to. Also while evaluating this information a conclusion was drawn that sometimes it is more profitable for a criminal to steal than to work. NICOLETA-ELENA BUZATUI, METHODOLOGICAL PARTICULARITIES IN INVESTIGATING HOME LARCENY A description in the second sentence of this journal article describes larceny as: In agreement with article 208 of the Penal Code1, theft - in its simple form - is considered to be any movable goods seized from somebody’s property without the consent of the respective person but simply taken into the unjustified possession of the thief. Any energy having an economic value is also considered to be movable goods, as for example documents. The deed is considered to be a theft even if the goods partially or totally belong to the doer and, the moment the theft was committed, it was in the legal possession of another person. The articles cover the breakdown of how the crime of larceny is investigated and each aspect of collecting information or evidence of the crime itself. It details from the moment of entry to prosecution of the crime. William T. Harbaugh...

Words: 645 - Pages: 3

Free Essay

Business Leadership Writing Assignement 1

...Curbing Bike Theft in Eugene Bike theft is an important issue in Eugene, especially for college students on and around campus. I recommend taking multiple steps to offer education on how to correctly use bike locks as well as enforce and increase the penalties for thieves. I’ve outlined how to educate students on theft prevention, how to register bikes, and how increased penalties will help reduce crime below. Education on Bike Locks Many bikes that are stolen are not properly locked up. The University should provide education on which locks to use and how to properly use them. With less bike theft due to prevention tactics, fewer bikes reported stolen might be offered more time and energy to locate by local police. Bikes left overnight or in dark, secluded places are more subject to theft. Educating students on the ways theft occurs prevents easy theft, which could turn off a large number people from stealing bikes. Information that is useful to students: * Use a metal “U” shaped lock * Verify that the “U” lock is properly inserted through the frame and tire * Put bikes in safe places at night * Register all bikes Having a representative on University campus to explain how important bike lock safety is can significantly decrease theft. Registration Bicycle registration is a viable way to prove ownership of a bike. Making registration for bicycles easier and more convenient creates situations where it is more difficult to resell a stolen bike...

Words: 487 - Pages: 2