Paper Details  
 
   

Has Bibliography
7 Pages
1853 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime Info

ture. And by the turn of the century, "nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier." (Carley, A 1:1) A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. "My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights." (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson's computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. "I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson's game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them." (Steve Jackson Interview) Computer professionals are grappling not only with issues ...

< Prev Page 3 of 7 Next >

    More on Computer Crime Info...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA