Computer Crime In The 1990's


We're being ushered into the digital frontier. It's a cyberland with
incredible promise and untold dangers. Are we prepared ? It's a battle between
modern day computer cops and digital hackers. Essentially just think what is
controlled by computer systems, virtually everything.
By programming a telephone voice mail to repeat the word yes over and over
again a hacker has beaten the system. The hacker of the 1990's is increasingly
becoming more organized very clear in what they're looking for and very, very
sophisticated in their methods of attack.. As hackers have become more
sophisticated and more destructive, governments, phone companies and businesses
are struggling to defend ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

automated branch exchange known as a "PABX" or "PBX". One of these can
be found in any company with twenty or more employees. A "PABX" is a computer
that manages the phone system including it's voice mail. Once inside a "PABX" a
hacker looks for a phone whose voice mail has not yet been programmed, then the
hacker cracks it's access code and programs it's voice mail account to accept
charges for long distance calls, until the authorities catch on, not for a few
days, hackers can use voice mail accounts to make free and untraceablecalls to
all over the world. The hackers that commit this type of crime are becoming
increasingly organized. Known as "call cell operators" they setup flyby night
storefronts were people off the street can come in and make long distance calls
at a large discount, for the call cell operators of course the calls cost
nothing, by hacking into a PABX system they can put all the charges on the
victimized companies tab. With a set of stolen voice mail access ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

patterns so they'll hire these people to
get codes for them so they can dial from several different calling locations so
they cannot be detected.
The worlds telephone network is a vast maze, there are many places to hide
but once a hacker is located the phone company and police can track their every
move. The way they keep track is by means of a device called a "DNR" or a dial
number recorder. This device monitors the dialing patterns of any suspected
hacker. It lists all the numbers that have been dialed from their location, the
duration of the telephone call and the time of disconnection. The process of
catching a hacker begins at the phone company's central office were thousands ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime In The 1990's. (2004, June 30). Retrieved December 11, 2018, from http://www.essayworld.com/essays/Computer-Crime-In-The-1990s/10278
"Computer Crime In The 1990's." Essayworld.com. Essayworld.com, 30 Jun. 2004. Web. 11 Dec. 2018. <http://www.essayworld.com/essays/Computer-Crime-In-The-1990s/10278>
"Computer Crime In The 1990's." Essayworld.com. June 30, 2004. Accessed December 11, 2018. http://www.essayworld.com/essays/Computer-Crime-In-The-1990s/10278.
"Computer Crime In The 1990's." Essayworld.com. June 30, 2004. Accessed December 11, 2018. http://www.essayworld.com/essays/Computer-Crime-In-The-1990s/10278.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 6/30/2004 05:24:01 AM
Category: Computers
Type: Premium Paper
Words: 2399
Pages: 9

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime In The 90's
Prohibition In The 1920's
Feminism And Gender Equality In...
Changes In The Earth's Environm...
Feminism And Gender Equality In...
Concerns Facing The United Stat...
Concerns Facing The United Stat...
Serial Killers In The U.S
Computer Crime 2
The Constitution In The 1850's:...
Copyright | Cancel | Contact Us

Copyright © 2018 Essayworld. All rights reserved