ade records, etc. Lastly, a person can use a computer as an instrument for conducting or planning a crime. A perpetrator modeled his crime on a computer to alert him to the amount of activities he could engage in without attracting attention to his deeds, and later used the computer as a management tool to keep track of the activity, or even aid a stockbroker to produce forged investment statements to show huge profits to deceive his client and steal millions. Thus, the cyber criminal can only use the symbol of the computer to intimidate or deceive others. An example would be to convince his victim that he possess a very unique money making program or application able to do wonders like to hack classified information. Amazingly, it is difficult for agencies, institutions, or the private sector to know the extent of computer crime and abuse. Like other crimes, cyber terrorism is very difficult to detect until it has already struck, causing millions, if not billions of dollars, or even life. "In June 1999, tens of thousands of computer systems in several major U.S. companies (including AT&T, Boeing, and General Electric) had their files infected, damaged, or destroyed by a software virus, Explore. Zip worm. This file-destroying but, first detected in Israel, arrived as an e-mail message and utilized MAPI commands and Microsoft Outlook on Windows systems to propagate itself. It has been estimated that damages from the Explore. Zip worm and other viruses (e.g., Melissa macro virus) topped $7 billion during the first two quarters of 1999. By the end of the year, computer intrusions will cost private industry more than $20 billion" (Alexander & Swetnam, 4).It may seem Internet bandwidth connections have advanced way beyond what the program creators of "File Transfer Protocol" (FTP) ever imagined. Complete files can be sent across the globe at the click of a mouse into other hard-drives in less than 45 million bits per second on a T-3 connecti...