Abstracts - faqs.org

Abstracts

News, opinion and commentary

Search abstracts:
Abstracts » News, opinion and commentary

3 arrests show global threat to computers

Article Abstract:

Three Australians are arrested for tampering with computers in the US and Australia. The three are: Nanshon Even-Chaim, 18 years old; Richard Jones, 20; and David John Woodcock, 21. The break-ins took place on an international network known as Internet, which links university, corporate and government computers. In Mar 1990, a man identifying himself only as 'an Australian named Dave' made news by calling the New York Times, taunting security officials by admitting he had broken into systems in the US. Australian Federal Police say they knew about the group's activities as long ago as 1988, but they were able to conduct a serious investigation only after new legislation covering computer crimes became effective in Jul 1989. Computer specialists say this case raises questions about the vulnerability of technology internationally, because laws in different countries may vary or not exist at all.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1990
Australia, Cases, Internet, Crime, Access control, Computer hackers, Hacker, Jones, Richard (British theatrical director), Woodcock, David John, Even-Chaim, Nanshon

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Drive to counter computer crime aims at invaders; legitimate users voice worries over rights

Article Abstract:

Government crackdown on computer crime is increasing in response to lawmakers and corporations but some civil liberties are being threatened by the investigations. Secret Service officials, who are the primary federal enforcers of computer crimes laws since 1984, suspect that a large number of bright young computer enthusiasts are responsible for many computer crimes including telecommunication fraud, credit card fraud, unauthorized access to other computers and computer viruses. The lack of legal precedents for search and seizure and freedom of speech as it pertains to the computer world raises some questions as to how the government can prosecute and investigate computer crimes.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1990
Social aspects, Safety and security measures, Laws, regulations and rules, Freedom of speech, Organized crime, Electronic data processing departments, Data processing departments, Theft of Information

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA



Subjects list: Computer crimes, Security, Legal Issues, Computer Crime
Similar abstracts:
  • Abstracts: Computer intruder gets probation and fine but avoids prison term. Student found guilty in computer jamming
  • Abstracts: Electronic forms that fill the bill. Footprints in the sands of time
  • Abstracts: Japan sets sights on winning lead in new computers; field dominated by U.S.; goal is software that allows thousands of processors to operate in tandem
  • Abstracts: Physicists close in on world's fastest supercomputer; facing daunting calculations on subatomic particles, scientists build their own system
  • Abstracts: U.S. proposes easing computer export curbs. U.S. is easing restrictions on exports of technology
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.