re intentional. This raises the issue of competitors' attempts to gain information on their closest competitor. For example, Boeing Aircraft accused Airbus of bugging Boeing employees' hotel rooms and airline seats and tapping the telephone lines in order to get information. Financial Attacks are most often committed by people inside or close to the company. Obviously, people most familiar with a company's system and operations can commit a crime and easily cover their trails. An MCI assistant was arrested for selling thousands of credit card numbers obtained over telecommunication lines. The total cost of the incident was $50 million. When these criminals are placed in prison, more financial attacks can occur. Prisoners at Metro Jails (Tennessee) were able to illegally access long distance telephone accounts in order to sell calls to other prisoners.The motivation behind terrorist attacks is simple: why knock out electricity in only one city when you can do the same for an entire state? Computer facilities and technology companies are a terrorist's choice attacks since the damage can be more widespread and devastating.Grudge attacks are committed for one reason only, revenge. Former employees often commit grudge attacks as the result of a recent firing or demotion. Reasonless attacks are committed just "for fun. The motivation of these attacks is merely challenge rather than trying to cause destruction or gain profit. Although these attacks are done without the intention of doing harm they are just as dangerous as any other type of computer attack. One of the most dangerous individuals is one who has found himself in a place he doesnt fully understand or knows he doesnt belong.Technology-related crime loss is estimated at an annual $8 billion. The loss includes stealing computer hardware/software and fraud (breaking into a computer and stealing money or information to make a profit). Computer fraud loss is estimated at ...