WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:     | 1 || 3 | 4 |   ...   | 16 |

«Item type text; Dissertation-Reproduction (electronic) Authors DUNN, THURMAN STANLEY. Publisher The University of Arizona. Rights Copyright © is ...»

-- [ Page 2 ] --
Two employees borrowed tapes of population registry and copied them using another computer. They sold the copies at reduced prices to their employer's customers. Both employees were convicted and given a six-month jail sentence.

CASE 5. CONSPIRED BANK EMBEZZLEMENT, NEW JERSEY

The computer systems vice-president, senior computer operator, and three non-employees of a bank were charged with transferring money from infrequently used savings accounts to newly opened accounts. They were detected when conversion to a new computer disrupted their work.

CASE 6. COMPUTER SERVICE THEFT, DETROIT

Two engineers accidentally discovered that a password one digit different than the~r own happened to belong to the president of the time-sharing firm. The president's password allowed access to privileged customer and accounting data. It allowed the engineers to use unlimited amounts of computer time and obtain customer information and proprietary program listings. Discovery was made by computer operators who noticed the password being used at unusual times. The engineers were fired and no other action taken.

CASE 7. PROGRAM THEFT, CALIFORNIA

A programmer stole a copy of a program from the computer file of his employer's competitor through telephone circuits, using a remote job entry terminal. Criminal charges of theft of a trade secret and a civil suit resulted in conviction and a judgment for $300,000 damages for the plaintiff.

CASE 8. CUSTOMER LIST THEFT, WHITE PLAINS, NEW YORK

An employee tried to sell listings of new customers to an outside buyer. He was caught when a potential buyer reported the offer to the pol ice. The 1ist was estimated to be worth $37,000 in the address list market. The case was dropped for lack of evidence.

CASE 9. INDUSTRIAL ESPIONAGE, WEST GERMANY

A secret agent for East Germany is alleged to have copied confidential financial and production data of 3,000 West German firms onto tape and given the tape to the government of East Germany. The outcome of the case is not known.

CASE 10. SALARY ROUND-DOWN, FRANCE An employee was authorized to round salaries down to two decimal places, but when he did so he accrued the remainder amounts to his own salary.

The total salaries, of course balanced correctly. The disposition of the case is not known.

CASE 11. OVERSTATED ACCOUNTS PAYABLE

An account clerk at a catering service, in collusion with a grocery store owner submitted false account numbers and invoices for undelivered food to a computer system. Thefts amounted to $120,000 over eight years. Both conspirators were convicted.

CASE 12. COLLECTION AGENCY REBILLING, TEXAS

A computerized collection agency sent new bi lls to people who had paid their bills the previous year. They relied for profit on the reluctance of most people to fight computerized systems. Disposition of the case is not known.

CASE 13. PENSION FRAUD, CANADA An employee in an insurance company changed the account numbers of several deceased insured persons to his own to collect their pensions.

He was caught when a staple in a punch card forced manual handling, which revealed several cards with the same number.

CASE 14. PAYROLL FRAUD, WEST GERMANY An EDP operator pressed the "repeat" button on the printer to print 200 extra copies of his own paycheck.

He was caught when he cashed 37 checks all at the same bank.

CASE 15. SALES COMMISSION FRAUD, ENGLAND

A programmer in a mail-order company created a sales commission account in the name of Zwana to be the last in order. He adjusted the commission program to collect commission round-downs in the last account. He was discovered after three years when Marketing happened to choose the first and last accounts for a public relations project.

CASE 16. THEFT OF COMPUTER TIME, LOS ANGELES

The manager of EDP and part of his staff were using the firm's computer to analyze racehorse handicaps, making several thousand dollars each week. Case disposition is not known.

CASE 17. INFORMATION THEFT, CALIFORNIA A Student copied 500 passwords from the system file by using a text editor program to gain access to a, presumably, protected file.

The password file is now kept in scrambled form; sanctions were privately imposed on the student.

CASE 18. THEFT OF PATENTABLE PROCESSES

Two employees scheduled for layoff took program listings describing secret processes to be patented. One employee was fired, the other died of a heart attack.

CASE 19. PHONY WELFARE GRANTS, CALIFORNIA

In Los Angeles County, welfare grants are paid from vouchers based on punch cards. Someone put extra cards in the computer to produce authorized grants. No suspects were identified.

CASE 20. THEFT OF COMPUTER SERVICES, TEXAS

A high school student found a privileged password of the computer service's analyst on a listing in a wastebasket. He also obtained detailed specifications of the system-presumably by merely ask i ng for them. He used 1arge amounts of computer time, played computer games and obtained other customer's data.





He was discovered when a computer operator noticed scratch tapes being read before being written. Restitution was made.

CASE 21. THEFT OF COMPUTER SERVICES, CALIFORNIA

High school students were allowed to use free computer terminal services on one project. The computer system employee involved subsequently left. The students continued to use the services, using new passwords they found. They used $3,000 worth of services before being caught. Now a "poaching bit" is set to alert operators to suspected account activity.

Sanctions were imposed privately on the students.

CASE 22. BANK EMBEZZLEMENT, NEW YORK A bank teller manipulated hundreds of accounts through his teller terminal into the computer system.

The details of manipulation are omitted. He was caught when a raid on a bookie showed large bets placed by the suspect. He was prosecuted for embezzling $1.5 million by the Manhattan District Attorney's Office.

CASE 23. DIVIDENDS FRAUD A clerk adjusted a computer program used to prepare dividends, thereby generating dividend checks to former shareholders, but addressed to an accomplice.

The program then erased records of the check. The clerk was convicted for embezzling $33,000.

CASE 24. STOLEN PROGRAMS A programmer in Texas stole $5 million worth of programs he was maintaining and tried to sell them to one of his employer's customers.

He served five years in prison on charges of Grand Theft.

CASE 25. EQUITY FUNDING SCANDAL Phony life insurance policies were created and integrated with records of actual policies, then the mixture was resold to firms who bought the policies with the idea of collecting further premiums.

Equity purportedly created 56,000 insurance policies amounting to some $2 billion out of a total 91,000 policies reportedly worth $6.5 billion. To prevent discovery, computer personnel had to perpetuate the deceit by manipulating records so as to show changes in the phony policies, such as a reasonable number of lapses, cancellations, and deaths. The computer program also had to be designed to conceal the fictitious business from auditors and state insurance examiners.

In further efforts to outwit auditors and examiners, the firm installed electronic surveillance equipment in various rooms so that conversations about verification plans could be overheard.

The conspiracy fell apart in March of 1973, after a former employee of Equity reported details of it to the New York State Insurance Department and to a Wall Street insurance analyst who, in turn notified some of his commercial clients as well as New York Stock Exchange Officials.

Federal indictments were brought against 22 people by a Federal Grand Jury on 105 criminal counts.

Information on computer fraud is difficult to gather because cases are often not classified as such. Further, there is hesitance in organizations, particularly those which thrive on the confidence of customers and stockholders, to disclose their vulnerability to computer fraud (Randall 1978, Wong 1977, p. 60, Parker 1976, Alderman 1977, Allen 1971).

Additional limitations on obtaining computer fraud information result from the lack of federal laws covering this type of crime (Parker 1979, Schultz 1979, Boockholdt and Horvitz 1978). Future legislation, in conjunction with continued probing by researchers, will hopefully improve the availability of information on computer fraud over the next few years.

Wagner (1979), finding that library research did not reveal any "rich" reference resource -- bibliography, reference book, textbook, documentary, or trade or professional publication --for the citation of computer fraud cases, designed a survey to develop a network of He thought the following information resources for such material.

resources would offer the greatest potential for computer fraud cases

information:

Selected accounting firms Selected consultants, educators and researchers Selected boards of public accountancy State societies of Certified Public Accountants Selected business and electronic data processing periodicals Selected information centers and regulatory agencies Selected business, commercial, industry, professional, and trade organizations/associations Selected computer vendors Selected insurance companies State officials having supervision of insurance activities Selection of survey recipients was made by Wagner on a judgmental basis since there was no way of determining the appropriate universe from which to draw a sample. Wagner received 132 replies of 371 survey recipients, for a 35 percent rate. Even though ~esponse

–  –  –

assigned to help unravel, after the fact, the Equity Funding "fraud maze. Two were consultants who headed up computer ll software firms. Another was Donn B. Parker of Stanford Research Institute. An EDP security consultant, who had actually been a former fraud perpetrator, indicated he would release such information only for a fee. Also among the firsthand (raw) data held by respondents were two apparently new computer fraud cases.

Several respondents were reluctant to release information which they had available. Only thirteen respondents indicated they would grant free and open access to any computer fraud materials. Although three insurance companies offering surety, fidelity, and professional liability insurance responded, none offered free access to relevant records.

Even more disturbing are the following statistics reprinted from Security World (Becker 1978) in a recent U.S. Department of Justice publication (1980): "--One percent of all computer crimes is detectedapprox imate ly 7 percent of the crimes that are detected are reported to the police--of those brought for prosecution, only 1 out of 33 results in a jail sentence--conclusion; 1 out of every 22,000 computer criminals is going to jail."

As a result of the numerous limitations on information available in the area of computer fraud, the extent of this type of crime is not really known. It has been estimated that only 15 percent of known crimes are recorded (Parker 1976). This is deduced by surveys of samples of the general public, counting the number of people who have been victims of crime. These statistics are then compared with police reports of crimes that are compiled by the FBI and published annually as the FBI Uniform Crime Report. Most of the crimes reported in this manner are of the more violent type, such as robberies, auto theft, and rape; far less is known about white-collar crime and even less is known about computer fraud.

H. Jeffrey Bayless, Chief Deputy District Attorney for Denver, estimates that only about 5 percent of computer crimes committed in the U.S. are ever reported because banks, insurance companies and other institutions would rather cover their losses than risk embarrassing publicity.

Although there is no way to accurately estimate the extent of computer fraud, most experts consider it an increasingly serious problem.. In one study, Parker (1975) noted that "in 42 computerrelated bank frauds and embezzlements in the period 1962 to 1975, the average loss per case is $430,000 (total $18 million, range $200 to $6.8 million)."

Leonard 1. Krauss, who is a computer security consultant with Ernst & Ernst estimates that half a billion dollars a year is stolen because of computer fraud.

Loss will probably exceed a billion dollars in the near future (Randall 1978).

The rapid expansion of minicomputers may give many more people an opportunity to perpetrate frauds. Timothy B. Braithwaite, a systems security manager at the Defense Computer Institute agreed in his recent statement that "distributed processing, micro and minis, remote terminals and integrated file struct\lres all place new complex security demands on ADP organizations that can barely secure traditional batch operation" (Randall 1978).

A problem which, according to August Bequai (1978), may be far more serious than the monetary losses is an antiquated and overbureaucratized legal apparatus for dealing with computer crime. He sees our very form of government as being at stake if we fail to adapt our legal system to the ever-growing computer technology. Detection is, of course, a necessary part of this adaptation.

Based on the research for this dissertation, it is evident that there is considerable concern regarding computer fraud. Several researchers have attempted to determine the extent of computer fraud and categorize it for analysis, (for example: Parker 1975, Parker 1976, Krauss and MacGahan 1979, Allen 1977, Allen 1979, Comptroller General of the United States 1976, and Auerbach 1978/79). The most extensive and most often referenced database on computer fraud is Donn Parker's (Wagner 1979).

Numerous researchers, many utilizing existing raw data, have attempted to provide insight into prevention and detection of computer fraud (Auerbach 1978/79, Lobel 1976, Horne 1974, Wagner 1979, Krauss and MacGahan 1979, Allen 1979, Parker 1979, Hsiao, Kerr and Madnick 1979, Bequai 1978, Leibhotz and Wilson 1974).



Pages:     | 1 || 3 | 4 |   ...   | 16 |


Similar works:

«This Week in Baseball Weekly Information for Ohio Baseball Coaches Jerry Snodgrass, Baseball Sport Administrator, OHSAA Spring, 2016 2016 “Plays of the Day” Compilation of “Plays of the Day” From Baseball DOD, Dan McGinnis Play #1 The Play: After bunting the ball fair in front of home plate, the right-handed batter, as he attempts to advance to first base, has his left foot on the ground, outside the batter's box, in front of home plate. His right foot is still on the ground in the...»

«1 Date of publication: 12th November 2011 (pp. 1 – 67) The description of a new genus and twenty-three new species of Metarbelidae (Lepidoptera: Cossoidea) from the lowland tropical rain forests of the Guineo-Congolian Region with notes on habitats and biogeography INGO LEHMANN University of Bonn, Zoological Research Institute and Museum Alexander Koenig, Adenauerallee 160, 53113 Bonn, Germany Friedrich-Ebert-Damm 59, 22047 Hamburg; e-mail: ingo5.lehmann@googlemail.com Abstract Haberlandia...»

«Math Matters: Why Do I Need To Know This? Bruce Kessler, Department of Mathematics Western Kentucky University Episode Ten 1 Consumer mathematics – Paying off credit card debt Objective: To show how a better understanding of the mathematics of calculating debt payments can influence our decisions in financial matters. Specifically, we examine credit card debt, and the time necessary to pay-off a “max-ed out” card. The method for doing that is equivalent to the mathematics for...»

«University of Helsinki Faculty of Theology Holy Communion Rites in the Polish and Lithuanian Reformed Agendas of the 16th and Early 17th Centuries Darius Petkūnas, M.Th. Helsinki 2004 Abstract The present work investigates the liturgies of the Reformed churches of Poland and Lithuania during the 16th and 17th centuries. It examines the development of liturgical theology and its liturgical expression beginning with the 6th decade of the 16th century when the Reformation influence moved from...»

«www.ahmadiyya.org Allegations of misinterpreting “The Will” of Promised Messiah A reply to Ansar Raza’s article ‘Misinterpretation of The Will by AAIIL’ by Dr Zahid Aziz Mr Ansar Raza, in his capacity as Missionary of the AMJ, Canada (the Canada branch of the Qadiani Jamaat), has sent me an article he has written bearing the above title. It is written in reference to Maulana Muhammad Ali’s introductory and explanatory notes to the Will of the Promised Messiah (the book known as...»

«Evans Mill Pond By Will Butz May 1988 Revised by James Robertson May 2005 In the early times, the plot of ground that we today call Evans Mill Pond was a densely tree-covered series of rolling hills. Immigrants (merchants and farmers) arriving in the colonies in the 1720's and 30's took advantage of the numerous small land grants issued for land settlement. Such was probably the lot of the Besley family, Huguenots and refugees from religious persecution in France. It was the Besley family that...»

«Reseeding open-pollinated canola varieties in Canada Reseeding open-pollinated canola varieties in Canada Prepared for the Manitoba Canola Growers’ Association by Strategic Vision Consulting Ltd. May 3, 2011 Strategic Vision Consulting Ltd. makes no representation or warranty as to the potential outcomes stated within this report. Strategic Vision Consulting Ltd. assumes no liability whatsoever for damages suffered by the Manitoba Canola Growers’ Association or any third party for any...»

«Summer 2016 MCAS Cherry Point’s Personal & Professional Development Program As summer kicks into high gear, some of you will be trying to In This Issue focus and concentrate on the receipt of PCS orders. I would like to offer a couple of the many resources that the Career and Resource Services Office has to help ease worries. Info & Referral P.2 Education Office P.3 Our Plan Your Move class can help answer many of the questions you and/or your family members may have about topics like Station...»

«COMPLETE LYRICS transcribed by Mark Clague, Ph.D. American Music Institute University of Michigan Recordings available at www.starspangledmusic.org or as digital downloads through iTunes, Amazon and other web retailers Disc One Track 1 The Anacreontic Song (1775/76) 1. To ANACREON in Heav’n, where he sat in full Glee, A few Sons of Harmony sent a Petition, That He their Inspirer and Patron would be; When this Answer arriv’d from the JOLLY OLD GRECIAN “Voice, Fiddle, and Flute, “No...»

«Based on the nomination and support materials, please judge each nominee on a scale of 1 to 10, with a score of 10 being the highest Category: Community Service Award Awarded for programs that demonstrate that the individual property is responsive to the local community. Examples include: campaigns to benefit local or national service organizations or charities, service to any part of the community through a special project and joint undertakings with community groups for the benefit of the...»

«Working Paper Series Congressional Budget Office Washington, DC Projecting Hospitals’ Profit Margins Under Several Illustrative Scenarios Tamara Hayford Congressional Budget Office (tamara.hayford@cbo.gov) Lyle Nelson Congressional Budget Office (lyle.nelson@cbo.gov) Alexia Diorio (formerly of CBO) September 2016 Working Paper 2016-04 To enhance the transparency of the work of the Congressional Budget Office and to encourage external review of it, CBO’s working paper series includes both...»

«Students with Visual Impairments and Assistive Technology: Results from a Cognitive Interview Study in Five States National Accessible Reading Assessment Projects National Accessible Reading Assessment Projects TARA T Technology Assisted Reading Assessment Students with Visual Impairments and Assistive Technology: Results from a Cognitive Interview Study in Five States Christopher Johnstone, Jason Altman, Joe Timmons, and Martha Thurlow August 2009 All rights reserved. Any or all portions of...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.