Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Forensic Science Unauthorized Access - 1,421 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

The "Love Bug" Virus The virus dubbed the "love bug" started to rapidly spread throughout the world on May 4, 2000. According to David Ruppe (May 5, 2000) in an article on the ABCNEWS. com website, The virus came in the form of "ILOVEYOU" in the subject line, which seemed harmless and greets people in a friendly way. They have no idea that they are in for a big surprise as they opened their email. The message inside reads: "kindly check the attached LOVELETTER coming from me" (Ruppe, May 5, 2000). A 22 -year-old college dropout was arrested in the Philippines as the author of this virus (anonymous, August 21, 2000).

When the attachment contained in the email was opened, the virus rapidly proliferated by automatically sending copies to everyone listed in the user's email address book. Experts have concluded that this was the cause of the rapid slow down of servers around the world. Some of the servers have been so severely overloaded that they have shut down. This in turn has been preventing other email from being se 3 nt (anonymous September 5, 2000). As Hillebrand reports, "The Head of corp 0 orate communications at the computer Security Company Sophos And- Virus, Graham Cluely says that companies have been bombarded by this virus and have begun to switch off email systems." Cluely also concluded that one of the reasons that the virus is so popular because it makes a tug on your emotions, love can get you into trouble (Hillebrand May 15, 2000).

In this certain case there are several categories of Cybercrime that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was supposed to gather information once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victim's Internet accounts to surf the net for free. (Ruppe May 5, 2000). The second cybercrime category is the computer as the instrumentality of the crime.

Since the computer was the main focus of the crime and was used to implement it. The third and final cybercrime category is that the crime is associated with the prevalence of computers. This one is because it allowed the theft of the components of the login names as well as the passwords. This could be classified as having multiple cybercrime categories (Casey p 17). The crime scene for this specific case is the apartment and the computer where the virus originated. This was the originating site and where the virus was supposed to send back the passwords and login names.

There were many different email addresses that were in use from that same computer (Casey 167). National Bureau of Investigations (NBI) of the Philippines will be prosecuting de Guzman with charges for credit fraud under the Access Devices Regulation Act- 1998 this could actually let the author off relatively easy (anonymous August 21, 2000). The NBI crime squad has next to no experience with such computer investigations as well as no equipment to analyze computer programs. (Hillebrand may 15, 2000). The Unites States tried to get permission to expedite One de Guzman to try him for this crime here.

But this has never happened, so the Philippines has jurisdiction In the Philippines there is a lack of computer criminal laws and therefore the over this matter (Anonymous Sept 5, 2000). As Ruppe reports, virus rapidly spread to private, commercial, and government computers across Asia, Australia, Europe and North America. Some of the computers that have been affected are the Pentagon, the C. I.

A. , Asian Wall Street Journal, British Telecom, ATT, Cable and Wireless in London, and the British Parliament, and also some Individual members of congress. Here in Oregon the virus forced the city of Eugene to cut the link between its computers and the Internet. The harms that this crime has inflicted are only to those that had computers with Internet emails. That was the way that the virus spread as it was opened.

It has caused an estimate of damages totaling $ 8 billion (USA$) (Ruppe May 5, 2000). In trying to track down the person that that sent the "love bug virus" They were able to decipher part of the code and find the ISP that was used and what email address it had come from. rem back -love letter (VBE) < I hate to go to school> rem by: spyder / / @ grammar soft Group/ Manila, Philippines On Error Resume Next Dim fso, dir system, darwin, dir temp, eq, ctr, file, vbs copy, dow Eq = "" Ctr = O Set fso = CreateObject ("scripting. fileSystem Object") This is the first few lines of the virus code (I have a friend into computers) that was used. After deciphering it as you can see at the top in blue the email address is visible allowing the officials to track him down. Recreate "HKCU Software|Microsoft Internet Explorer Main|Start Page", " web 7 b 3 vb/WIN-BUGSFIX.

exe" In looking at part of this code you can see web is in part of the code. This was the Internet Service Provider that unknowingly carried a password stealing second phase of the virus (anonymous August 21, 2000) Officials found no computers in the apartment and figured they were carried out in pieces. However they were able to find a box with 17 items that included computer magazines, telephones, diskettes, wires and cassette tapes. They used this evidence to help seal their case. A caller ID was also used in tracking down the phone line used to carry the virus (Anonymous September 5, 2000).

Officials never really did say how this evidence was used in conjunction with the code that was found. However taking an opinion, the computer school that De Guzman had been kicked out of had a paper describing almost in detail of this virus and its functions. His professor was the one that alerted the authorities and that was how the NBI were able to surveillance the apartment just seven hours after the virus had been released (Ruppe May 5, 2000). Since the Philippines has no law covering computer hacking, they were only allowed to charge the former college student with traditional crimes such as theft and violation of an "access devices" law that normally applies to fraud using credit cards. The Access Devices Regulation Act of 1998 which was chiefly written to target credit card fraud but also covers the use of any unauthorized access device in order to obtain goods or services (anonymous August 21, 2000) Since this incident has happened Federico Opinion, Head of the National Bureau of Investigation, said "violators of the access devices law need not use a credit card to commit a crime" (anonymous August 21, 2000).

The vital material in this case is that DE Guzman used an unauthorized access device, which is prohibited. In order to support the separate theft charge, Philippine officials had to prove that he had an intent to gain, this was supported by the fact of stealing passwords for access to the internet. I was highly impressed at the way the NBI was able to surveillance the apartment so soon after the virus had been sent. I think this was due to the fact that the professor was not afraid to come forward and say "hey I might know this guy." I did not like however the fact that the Philippine government had not law governing this type of crime. These crimes affect everyone in the world not just down the street or another state.

However since this has come to light the E-Commerce Act has passed into law in the Philippines and carries a fine of at least $ 2, 300 plus three jail sentences. The credit card legislation has much lesser penalties. This Act however is not retroactive (Hillebrand May 15, 2000). Cited Page Casey, Eoghan. (2001) Pg. 17. Digital Evidence and Computer Crime, Forensic Science computers and the Internet.

London, Academic Press Casey, Eoghan. (2001) pg. 167. Digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic Press Charges Dismissed Philippines Drop Charges In " Love Bug" Virus Case. (August 21, 2000). Associated Press, ABCNEWS.

com Hillebrand, Mary. (May 15, 2000) Nations Gather To Target Cybercrime. E-Commerce Times. Revisiting the Case (Sept 5, 2000) Associated Press, ABCNEWS. com Ruppe, David. (May 5, 2000) "Love Bug" Travels Around the Globe.

ABCNEWS. com


Free research essays on topics related to: email address, forensic science, computer crime, credit card, unauthorized access

Research essay sample on Forensic Science Unauthorized Access

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com