<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Computer_fraud</id>
	<title>Computer fraud - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=Computer_fraud"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Computer_fraud&amp;action=history"/>
	<updated>2026-05-04T23:21:49Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=Computer_fraud&amp;diff=1443832&amp;oldid=prev</id>
		<title>imported&gt;Mateishomepage: Undid edit. https://prnt.sc/itF1b-dpSPmZ</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=Computer_fraud&amp;diff=1443832&amp;oldid=prev"/>
		<updated>2025-05-04T17:20:06Z</updated>

		<summary type="html">&lt;p&gt;Undid edit. https://prnt.sc/itF1b-dpSPmZ&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Computer fraud&amp;#039;&amp;#039;&amp;#039; is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources.&amp;lt;ref&amp;gt;{{cite web |title=Computer fraud |url=https://www.computerhope.com/jargon/c/computer-fraud.htm |website=Computer Hope |access-date=19 June 2023}}&amp;lt;/ref&amp;gt;  In the United States, computer fraud is specifically proscribed by the [[Computer Fraud and Abuse Act]] (CFAA), which criminalizes computer-related acts under federal jurisdiction and directly combats the insufficiencies of existing laws. &amp;lt;ref&amp;gt;{{Cite journal |last=Kevin Jakopchek |date=2014-01-01 |title=&amp;quot;Obtaining&amp;quot; the Right Result: A Novel Interpretation of the Computer Fraud and Abuse Act That Provides Liability for Insider Theft Without Overbreadth |journal=Journal of Criminal Law and Criminology |url=https://scholarlycommons.law.northwestern.edu/jclc/vol104/iss3/4 |volume=104 |issue=3 |pages=605}}&amp;lt;/ref&amp;gt; Types of computer fraud include:&lt;br /&gt;
&lt;br /&gt;
*Distributing [[Hoax|hoax emails]]&lt;br /&gt;
*Accessing unauthorized computers&lt;br /&gt;
*Engaging in data mining via [[spyware]] and [[malware]]&lt;br /&gt;
*[[Hacker_(computer_security)|Hacking]] into computer systems to illegally access personal information, such as [[Credit_card|credit cards]] or [[Social_Security_number|Social Security numbers]]&lt;br /&gt;
*Sending [[Computer_virus|computer viruses]] or worms with the intent to destroy or ruin another party&amp;#039;s computer or system.&amp;lt;ref&amp;gt;{{Cite web|title = What is Computer Fraud? (with pictures)|url = http://www.wisegeek.org/what-is-computer-fraud.htm|website = wiseGEEK|accessdate = 2015-12-08}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Phishing]], [[social engineering (security)|social engineering]], [[computer virus|viruses]], and [[DDoS]] attacks are fairly well-known tactics used to disrupt service or gain access to another&amp;#039;s network, but this list is not inclusive.&lt;br /&gt;
&lt;br /&gt;
==Notable incidents==&lt;br /&gt;
&lt;br /&gt;
;The [[Melissa Worm|Melissa Virus/Worm]]&lt;br /&gt;
The Melissa Virus appeared on thousands of email systems on March 26, 1999. It was disguised in each instance as an important message from a colleague or friend.&amp;lt;ref&amp;gt;{{Cite web|title = Melissa Worm|url = https://lawsofmalta.com/blogs/other/melissa-worm/|website = lawsofmalta.com| date=2 April 2024 }}&amp;lt;/ref&amp;gt; The [[Computer virus|virus]] was designed to send an infected email to the first 50 email addresses on the users’ [[Microsoft Outlook]] address book. Each infected computer would infect 50 additional computers, which in turn would infect another 50 computers. The virus proliferated rapidly and exponentially, resulting in substantial interruption and impairment of public communications and services. Many [[system administrators]] had to disconnect their computer systems from the Internet. Companies such as [[Microsoft]], [[Intel]], [[Lockheed Martin]] and [[Lucent Technologies]] were forced to shut down their email gateways due to the vast amount of emails the virus was generating. The Melissa virus is the most costly outbreak to date, causing more than $400 million in damages to [[North America]]n businesses.&lt;br /&gt;
&lt;br /&gt;
After an investigation conducted by multiple branches of government and law enforcement, the Melissa Virus/Worm was attributed to [[David L. Smith (virus writer)|David L. Smith]], a 32-year-old [[New Jersey]] programmer, who was eventually charged with computer fraud.&amp;lt;ref&amp;gt;Johanna Granville [http://www.scribd.com/doc/14361572/Dotcon-Dangers-of-Cybercrime-by-Johanna-Granville “Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions,”] &amp;#039;&amp;#039;Australian Journal of Politics and History&amp;#039;&amp;#039;, vol. 49, no. 1. (Winter 2003), pp. 102-109.&lt;br /&gt;
&lt;br /&gt;
http://www.softpanorama.org/Malware/Malware_defense_history/Ch05_macro_viruses/Zoo/melissa.shtml&lt;br /&gt;
&amp;lt;/ref&amp;gt; Smith was one of the first people ever to be prosecuted for the act of writing a virus. He was sentenced to 20 months in federal prison and was fined $5,000. In addition, he was also ordered to serve three years of supervised release after completion of his prison sentence. The investigation involved members of [[New Jersey]] State Police High Technology Crime Unit, the [[Federal Bureau of Investigation]] (FBI), the Justice Department’s Computer Crime and Intellectual Property Section, and the [[Defense Criminal Investigative Service]].&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[[Information Security|Information security]]&lt;br /&gt;
*[[Information technology audit]]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://blogs.ittoolbox.com/security/investigator/ Information Security &amp;amp; Computer Fraud Cases &amp;amp; Investigations] {{Webarchive|url=https://web.archive.org/web/20090224205938/http://blogs.ittoolbox.com/security/investigator/ |date=2009-02-24 }}&lt;br /&gt;
*[https://www.ubs.com/ Union Bank of Switzerland]&lt;br /&gt;
*[https://www.law.cornell.edu/wex/computer_and_internet_fraud Cornell Law: Computer and Internet Fraud]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Information security}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Internet fraud]]&lt;br /&gt;
[[Category:Information technology audit]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Mateishomepage</name></author>
	</entry>
</feed>