White Collar Crime

.. ess during the past ten years. According to the Los Angeles Times, James Richards has also donated 80,200 to GOPAC, the political action committee spearhearded by Gingrich. Computer Crime Computer technology has introduced new factors concerning the types of perpetrators, the forms of assets threatened, and embezzlement methods. ( Radzinowicz 357) Computer crimes generally fall into five categories: 1) theft of services 2) use of computer data for personal gain 3) unauthorized use of computers employed for various types of financial processing 4) property theft by computer 5) placing viruses to destroy data.

(Siegel 353) The terms “computer misuse” and “computer abuse” are also used frequently, but they have significantly different implications. Criminal law recognizes the concepts of unlawful or fraudulent intent and of claim of right; thus, any criminal laws that relate to computer crime would need to distinguish between accidental misuse of a computer system, negligent misuse of a computer system and intended, unauthorized access to or misuse of a computer system, amounting to computer abuse. Annoying behavior must be distinguished from criminal behavior in law. History has shown that a broad range of persons commits computer crime: students, amateurs, terrorists and members of organized crime groups. What distinguishes them is the nature of the crime committed.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The individual who accesses a computer system without further criminal intent is much different from the employee of a financial institution who skims funds from customer accounts. The typical skill level of the computer criminal is a topic of controversy. Some claim that skill level is not an indicator of a computer criminal, while others claim that potential computer criminals are bright, eager, highly motivated subjects willing to accept a technological challenge, characteristics that are also highly desirable in an employee in the data-processing field. According to a number of studies, however, employees represent the largest threat, and indeed computer crime has often been referred to as an insider crime. One study estimated that 90 per cent of economic computer crimes were committed by employees of the victimized companies. A recent survey in North America and Europe indicated that 73 per cent of the risk to computer security was attributable to internal sources and only 23 per cent to external criminal activity.

The American Bar Association conducted a survey in 1987: of 300 corporations and government agencies, 72 claimed to have been the victim of computer-related crime in the 12-month period prior to the survey, sustaining losses estimated to range from $ 145 million to $ 730 million. In 1991, a survey of security incidents involving computer-related crime was conducted at 3,000 Virtual Address Extension (VAX) sites in Canada, Europe and the United States of America. Seventy-two per cent of the respondents said that a security incident had occurred within the previous 12-month period; 43 per cent indicated that the security incident they had sustained had been a criminal offence. A further 8 per cent were uncertain whether they had sustained a security incident. Similar surveys conducted around the world report significant and widespread abuse and loss.

Computer criminals have gained notoriety in the media and appear to have gained more social acceptability than traditional criminals. The suggestion that the computer criminal is a less harmful individual, however, ignores the obvious. The current threat is real. The future threat will be directly determined by the advances made in computer technology. Although it is difficult to quantify the scope of the computer crime problem, public reports have estimated that computer crime costs us between five hundred million and ten billion dollars per year. The Computer Security Institute has surveyed 428 information security specialists in Fortune 500 companies; 42% of the respondents indicated that there was an unauthorized use of their computer systems in the last year.

Only a small portion of computer crimes come to the attention of the law enforcement authorities. While it is possible to give an accurate description of the various types of computer offences committed, it has proved difficult to give an accurate, reliable overview of the extent of losses and the actual number of criminal offences. At its Colloquium on Computer Crimes and Other Crimes against Information Technology, held at Wrzburg, Germany, from 5 to 8 October 1992, AIDP released a report on computer crime based on reports of its member countries that estimated that only 5 per cent of computer crime was reported to law enforcement authorities. Law enforcement officials indicate from their experience that recorded computer crime statistics do not represent the actual number of offences; the term “dark figure”, used by criminologists to refer to unreported crime, has been applied to undiscovered computer crimes. The invisibility of computer crimes is based on several factors.

First, sophisticated technology, that is, the immense, compact storage capacity of the computer and the speed with which computers function, ensures that computer crime is very difficult to detect. In contrast to most traditional areas of crime, unknowing victims are often informed after the fact by law enforcement officials that they have sustained a computer crime. Secondly, investigating officials often do not have sufficient training to deal with problems in the complex environment of data processing. Thirdly, many victims do not have a contingency plan for responding to incidents of computer crime, and they may even fail to acknowledge that a security problem exists. The dynamic nature of computer technology, compounded by specific considerations and complications in applying traditional laws to this new technology, dictate that the law enforcement, legal and judicial communities must develop new skills to be able to respond adequately to the challenge presented by computer crime. The growing sophistication of telecommunications systems and the high level of expertise of many system operators complicate significantly the task of regulatory and legal intervention by law enforcement agencies.

If the law enforcement community is expected to deal with the problem of computer crime, adequate training sessions must be implemented. To address computer crime, most police departments are allocating a greater proportion of resources to their economic or fraud investigation divisions, since many types of computer crime occur in the course of business transactions or affect financial assets. Accordingly, it is important for investigators to know about business transactions and about the use of computer in business. The ideal situation is to have investigators with not only solid criminal investigation backgrounds but also supplementary technical knowledge. This is similar to the traditional approach, where many police forces ensure that their fraud investigators, although not necessarily accountants, possess a thorough understanding of financial and business record keeping. Preventative Agencies In the late 1970s, the prevailing public attitude was “you can’t do anything about crime.” A varied group of individuals – government policy makers, law enforcement, business, labor leaders – disagreed. This group founded the National Citizens’ Crime Prevention Campaign featuring McGruff the Crime Dog, our nation’s symbol for crime prevention.

In 1977, FBI Director Clarence Kelley and his assistant, John Coleman, went to The Advertising Council with a proposal for a crime prevention public service advertising campaign. The Ad Council tabled the plan, but it sparked the interest of Leo Perlis, Director of the AFL-CIO’s Community Services Division and a member of The Ad Council’s public policy committee. Contact was made with the officials in the U.S. Department of Justice’s Law Enforcement Assistance Administration (LEAA), and with Carl M. Loeb, Jr. – a businessman and activist with a longstanding interest in reforming the criminal justice system and a board member of the National Council on Crime and Delinquency.

In late 1977, LEAA, the FBI, and the AFL-CIO formed a small planning group and included the National Sheriffs’ Association and the International Association of Chiefs of Police. Subsequently, two advisory bodies from 19 national agencies were formed that would become the nucleus of the Crime Prevention Coalition, now 136 member organizations strong. By 1982, the McGruff Public Service Advertising Campaign was an acknowledged success – in just two years McGruff’s “Take A Bite Out Of Crime,” slogan was known by over half the population and his advice heeded by a substantial portion of that audience. To help build a focus on prevention, the original partners in the Campaign decided to create a new home for McGruff in an agency whose sole mission was the prevention of crime. With seed funding from the federal government and supported by the leadership and financial contribution of Carl M.

Loeb, Jr., the National Crime Prevention Council was created as a nonprofit organization to manage the McGruff Campaign and coordinate activities of the Crime Prevention Coalition. Mr. Loeb served as Chairman of the Board until his death in 1985. John A. Calhoun, formerly U.S. Commissioner of the Administration for Children, Youth, and Families, was selected as NCPC’s first executive director. Individuals who had been working on the Campaign became the core staff of the newly formed NCPC. Through the hard work and dedication of people around the country, NCPC has evolved into the nation’s resource for crime prevention.

Aside from coordinating the efforts of the McGruff Campaign, NCPC provides comprehensive crime prevention technical assistance and training to communities throughout the United States; develops and implements highly-acclaimed and innovative youth development programs; runs pathbreaking demonstration programs such as the 10-city Community Responses to Drug Abuse and the seven-city Texas City Action Plan To Prevent Crime; disseminates information on effective crime prevention practices to thousands of individuals and organizations every year; and, publishes materials that reach millions, young and old. NCPC partners with socially responsible corporations to create mutually beneficial relationships. These corporate citizens enhance national and local crime prevention efforts and invest in NCPC, the national resource center for crime prevention. Not only do these companies provide financial resources, they provide management skills, marketing expertise, and creative synergy to all of NCPC’s programs. In October of 1994, RadioShack joined forces with NCPC and the National Sheriffs’ Association to form United Against Crime, a public-private alliance which offers a multi-year, free education program on crime prevention.

The partnership is one of the largest public-private sector crime prevention initiatives ever undertaken and was formed to empower people to take action that will result in less crime, stronger families, and more active communities. RadioShack has underwritten the cost of the alliance’s program and is devoting space in each of its 7,200 electronic retail stores to showcase crime prevention information centers. Since August 1995, RadioShack has provided resources and introduced quarterly satellite crime prevention trainings for law enforcement, community leaders, and the public in over 150 sites. United Against Crime has been recognized by the Public Relations Society of New York with the Big Apple Award for Community Relations and by the International Association of Business Communications with the ACE Award for Community Relations.