Skip to main content

A Pragmatic, Experiential Definition of Computer Crimes

  • Chapter
  • First Online:
Cybercrimes: A Multidisciplinary Analysis
  • 3474 Accesses

Abstract

Although the first known virus for a personal computer has been traced to 1980 and a systematic study had been undertaken at Bell Labs in 1984 [1,2], the world really did not take notice until the Melissa virus began to infect millions of computers in late March 1999. After the Melissa virus struck, Elliot Turrini was assigned as the lead prosecutor for the Department of Justice’s criminal investigation into Melissa’s disseminator. This also marked the conception of this book. Elliot had little to do with the physical investigation that led to the perpetrator’s apprehension.With valuable assistance from America Online (AOL) investigators, the New Jersey State Police and the Federal Bureau of Investigation caught the perpetrator, David Smith, within days. It soon became clear that apprehending the perpetrator was the relatively easy part. AOL had provided a report stating that the Melissa Virus had been posted on a Usenet group hosted under AOL by an individual who had accessed an AOL account from a small ISP in Monmouth County, New Jersey. The caller identification information in the call record from this small ISP, revealed that the virus was launched from David Smith’s apartment. The remaining steps associated with proving that David Smith had launched the virus involved classic police work, including search warrants and interviews, which the New Jersey State Police and the FBI conducted very well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thompson, K. (1984) On trusting trust. Unix Review, 7(11), 71–74.

    Google Scholar 

  2. Ghosh, S. (2002, February/March). Computer virus attacks on the rise: Causes, mitigation, and the future. Financial IT Decisions 2002, Vol. 1, a Bi-Annual Technology Publication of the Wall Street Technology Association, Red Bank, New Jersey. Retrieved from http://www.wsta.org; ISBN 1-85938-369-6, 1:16–17.

  3. GAO, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. (1989, June). Computer security: Virus highlights need for improved Internet management. Technical report.

    Google Scholar 

  4. Reitinger, P. (2003, July 15) ‘Industry speaks’ hearing (without a multidisciplinary effort by both government and industry, we will not succeed). Testimony at House Select Committee on Homeland Security, Subcommittee on Cybersecurity, Science, Research & Development.

    Google Scholar 

  5. Conly, C. H. (1989, July 6). Organizing for computer crime investigation and prosecution. National Institute of Justice.

    Google Scholar 

  6. Goodman, M. (2001, August). Making computer crime count. The FBI Law Enforcement Bulletin.

    Google Scholar 

  7. Computer Crime & Intellectual Property Section (CCIPS), US DoJ. (2007, March). CCIPS prosecuting computer crimes manual (p. 5). Retrieved from http://www.justice.gov/criminal/cybercrime/ccmanual/00ccma.html

  8. Lessig, L. (1999). Code and other laws of cyberspace. New York, NY: Basic Books.

    Google Scholar 

  9. Microsoft. (2004). Encarta reference library. Microsoft Corporation.

    Google Scholar 

  10. Olson, M. (1965). The logic of collective action. Cambridge, MA: Harvard University Press.

    Google Scholar 

  11. Weaver, N. C. (2001, August 15). Warhol worms: The potential for very fast Internet plagues.

    Google Scholar 

  12. Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. Proceedings of the 11th USENIX Security Symposium.

    Google Scholar 

  13. Ghosh, S., & Lee, T. (2000). Modeling and asynchronous distributed simulation: Analyzing complex systems. Piscataway, NJ: IEEE Press.

    Book  Google Scholar 

  14. The Learning Channel. (2001, July 25). Hackers: Computer outlaws. Cable Television.

    Google Scholar 

  15. CERT. (1999). CERT Advisory CA-1999-04 Melissa Macro Virus. Retrieved from http://www.cert.org/advisories/CA-1999-04.html

  16. CERT. (2000). CERT Advisory CA-2000-04 Love Letter Worm. Retrieved from http://www.cert.org/advisories/CA-2000-04.html

  17. Frontenac Motor Company. (2001). The Ford Model T: A short history of Ford’s innovation. Retrieved from http://www.modelt.ca/background-fs.html

  18. Seat belt history. School Transportation News Online. Retrieved from http://www.stnonline.com/stn/occupantrestraint/seatbelthistory/

  19. Railroad history. The National Railroad Museum. Retrieved from http://www.nationalrrmuseum.org/EdPacket/html/Tguide1.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Turrini, E., Ghosh, S. (2011). A Pragmatic, Experiential Definition of Computer Crimes. In: Ghosh, S., Turrini, E. (eds) Cybercrimes: A Multidisciplinary Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_1

Download citation

Publish with us

Policies and ethics