Abstract
Although the first known virus for a personal computer has been traced to 1980 and a systematic study had been undertaken at Bell Labs in 1984 [1,2], the world really did not take notice until the Melissa virus began to infect millions of computers in late March 1999. After the Melissa virus struck, Elliot Turrini was assigned as the lead prosecutor for the Department of Justice’s criminal investigation into Melissa’s disseminator. This also marked the conception of this book. Elliot had little to do with the physical investigation that led to the perpetrator’s apprehension.With valuable assistance from America Online (AOL) investigators, the New Jersey State Police and the Federal Bureau of Investigation caught the perpetrator, David Smith, within days. It soon became clear that apprehending the perpetrator was the relatively easy part. AOL had provided a report stating that the Melissa Virus had been posted on a Usenet group hosted under AOL by an individual who had accessed an AOL account from a small ISP in Monmouth County, New Jersey. The caller identification information in the call record from this small ISP, revealed that the virus was launched from David Smith’s apartment. The remaining steps associated with proving that David Smith had launched the virus involved classic police work, including search warrants and interviews, which the New Jersey State Police and the FBI conducted very well.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Thompson, K. (1984) On trusting trust. Unix Review, 7(11), 71–74.
Ghosh, S. (2002, February/March). Computer virus attacks on the rise: Causes, mitigation, and the future. Financial IT Decisions 2002, Vol. 1, a Bi-Annual Technology Publication of the Wall Street Technology Association, Red Bank, New Jersey. Retrieved from http://www.wsta.org; ISBN 1-85938-369-6, 1:16–17.
GAO, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives. (1989, June). Computer security: Virus highlights need for improved Internet management. Technical report.
Reitinger, P. (2003, July 15) ‘Industry speaks’ hearing (without a multidisciplinary effort by both government and industry, we will not succeed). Testimony at House Select Committee on Homeland Security, Subcommittee on Cybersecurity, Science, Research & Development.
Conly, C. H. (1989, July 6). Organizing for computer crime investigation and prosecution. National Institute of Justice.
Goodman, M. (2001, August). Making computer crime count. The FBI Law Enforcement Bulletin.
Computer Crime & Intellectual Property Section (CCIPS), US DoJ. (2007, March). CCIPS prosecuting computer crimes manual (p. 5). Retrieved from http://www.justice.gov/criminal/cybercrime/ccmanual/00ccma.html
Lessig, L. (1999). Code and other laws of cyberspace. New York, NY: Basic Books.
Microsoft. (2004). Encarta reference library. Microsoft Corporation.
Olson, M. (1965). The logic of collective action. Cambridge, MA: Harvard University Press.
Weaver, N. C. (2001, August 15). Warhol worms: The potential for very fast Internet plagues.
Staniford, S., Paxson, V., & Weaver, N. (2002). How to own the Internet in your spare time. Proceedings of the 11th USENIX Security Symposium.
Ghosh, S., & Lee, T. (2000). Modeling and asynchronous distributed simulation: Analyzing complex systems. Piscataway, NJ: IEEE Press.
The Learning Channel. (2001, July 25). Hackers: Computer outlaws. Cable Television.
CERT. (1999). CERT Advisory CA-1999-04 Melissa Macro Virus. Retrieved from http://www.cert.org/advisories/CA-1999-04.html
CERT. (2000). CERT Advisory CA-2000-04 Love Letter Worm. Retrieved from http://www.cert.org/advisories/CA-2000-04.html
Frontenac Motor Company. (2001). The Ford Model T: A short history of Ford’s innovation. Retrieved from http://www.modelt.ca/background-fs.html
Seat belt history. School Transportation News Online. Retrieved from http://www.stnonline.com/stn/occupantrestraint/seatbelthistory/
Railroad history. The National Railroad Museum. Retrieved from http://www.nationalrrmuseum.org/EdPacket/html/Tguide1.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Turrini, E., Ghosh, S. (2011). A Pragmatic, Experiential Definition of Computer Crimes. In: Ghosh, S., Turrini, E. (eds) Cybercrimes: A Multidisciplinary Analysis. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-13547-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13546-0
Online ISBN: 978-3-642-13547-7
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)