Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Communications Decency Act United States Government - 1,121 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

... ; regions of privacy' that 'The System' cannot invade. (3) This simply serves to show that computer hackers are not only teenage boys with social problems who sit at home with their computers; they can be anyone. The crash of AT& T's network and their desire to blame it on people other than themselves brought the political impetus for a new attack on the electronic underground. This attack took the form of Operation Sundevil. "Operation Sundevil" was a crackdown on those traditional scourges of the digital underground: credit card theft and telephone code abuse. The targets of these raids were computer bulletin board systems. Boards can be powerful aids to organized fraud. Underground boards carry lively, extensive, detailed, and often quite flagrant discussions of lawbreaking techniques and illegal activities.

Discussing crime in the abstract, or discussing the particulars of criminal cases, is not illegal, but there are stern state and federal laws against conspiring in groups in order to commit crimes. It was these laws that were used to seize 25 of the 'worst' offenders, chosen from a list of over 215 underground Best that the Secret Service had fingered for 'carding' traffic. The Secret Service was not interested in arresting criminals. They sought to seize computer equipment, not computer criminals. Only four people were arrested during the course of Operation Sundevil; one man in Chicago, one man in New York, a nineteen-year-old female peak in Pennsylvania, and a minor in California.

This was a politically motivated attack designed to show the public that the government was capable of stopping this fraud, and to show the denizens of the electronic underground that the government could penetrate into the very heart of their society and destroy routes of communication, as well as bring down the legendary BBS operators. This is not an uncommon message for law-enforcement officials to send to criminals. Only the territory was new. Another message of Sundevil was to the employees of the Secret Service themselves; proof that such a large-scale operation could be planned and accomplished successfully. The final purpose of Sundevil was as a message from the Secret Service to their long-time rivals the Federal Bureau of Investigation. Congress had not clearly stated which agency was responsible for computer crime.

Later, they gave the Secret Service jurisdiction over any computers belonging to the government or responsible for the transfer of money. Although the secret service can't directly involve themselves in anything outside of this jurisdiction, they are often called on by local police for advice. Hackers are unlike any other group of criminals, in that they are constantly in contact with one another. There are two national conventions per year, and monthly meetings within each state. This has forced people to pose the question of whether hacking is really a crime at all. After seeing such movies at 'The Net' or 'Hackers', people have begun to wonder how vulnerable they individually are to technological crime.

Cellular phone conversations can be easily overheard with modified scanners, as can conversations on cordless phones. Any valuable media involving numbers is particularly vulnerable. A common practice among hackers is 'trashing'. Not, as one might think, damaging public property, but actually going through a public area and methodically searching the trash for any useful information. Public areas that are especially vulnerable are ATM chambers and areas where people posses credit cards printouts or telephone bills.

This leads to another part of hacking that has very little to do with the technical details of computers or telephone systems. It is referred to by those who practice it as "social engineering." With the information found on someone's phone bill (account or phonecard number), an enterprising peak can call up and impersonate an employee of the telephone company- obtaining useable codes without any knowledge of the system whatsoever. Similar stunts are often performed with ATM cards and pin numbers. The resulting codes are either kept or used by whomever obtained them, traded or sold over Bulletin Board Systems or the Internet, or posted for anyone interested to find.

With the increasing movement of money from the physical to the electronic, stricter measures are being taken against electronic fraud, although this can backfire. In several instances, banks have covered up intrusions to prevent their customers from losing their trust in the security of the system. The truth has only come out long after the danger was passed. Electronic security is becoming a way of life for many people. As with the first cellular telephone movements, this one has begun with the legitimately wealthy and the criminals. The most common security package is PGP, or Pretty Good Privacy.

PGP uses RSA public-key encryption algorithms to provide military-level encryption to anyone who seeks to download the package from the Internet. The availability of this free package on the Internet caused an uproar and brought about the arrest of the author, Phil Zimmerman. The United States government lists RSA encryption along with weapons of which the exportation is illegal. The Zimmerman case has not yet been resolved. The United States government has begun to take a large interest in the Internet and private Bulletin Board Systems. They have recently passed the Communications Decency Act, which made it illegal to transmit through the Internet or phone lines in electronic form any "obscene or inappropriate" pictures or information.

This Act effectively restricted the information on the Internet to that appropriate in PG- 13 movies. As of June 12, 1996, the censorship section of the Communications Decency Act was overturned by a three-judge panel of the federal court of appeals, who stated that it violates Internet user's first amendment rights, and that it is the responsibility of the parents to censor their children's access to information, not the government's. The court of appeals, in effect, granted the Internet the protections previously granted to newspapers, one of the highest standards of freedom insured by our Constitution. The Clinton administration has vowed to appeal this decision through the Supreme Court. Technological crime is harder to prosecute than any other, because the police are rarely as technologically advanced as the people they are attempting to catch.

This situation was illustrated by the recent capture of Kevin Mitnick. Mitnick had eluded police for years. After he broke into security expert Tsumona's computer, Tsumona took over the investigation and captured Mitnick in a matter of months. It will be fascinating to see, as technology continues to transform society, the way that technological criminals, usually highly intelligent and dangerous, will transform the boundaries of crime. As interesting to see will be how the government will fight on this new battle ground against the new types of crime, while preserving the rights and freedom of the American people.


Free research essays on topics related to: secret service, united states government, court of appeals, communications decency act, bulletin board

Research essay sample on Communications Decency Act United States Government

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com