The “Love Bug” Virus
The virus dubbed the “love bug” started to rapidly spread throughout the world on May 4, 2000. According to David Ruppe (May 5,2000) in an article on the ABCNEWS.com website, The virus came in the form of “ILOVEYOU” in the subject line, which seemed harmless and greets people in a friendly way. They have no idea that they are in for a big surprise as they opened their email. The message inside reads: “kindly check the attached LOVELETTER coming from me” (Ruppe, May 5,2000). A 22-year-old college dropout was arrested in the Philippines as the author of this virus (anonymous, August 21,2000).
When the attachment contained in the email was opened, the virus rapidly proliferated by automatically sending copies to everyone listed in the user’s email address book. Experts have concluded that this was the cause of the rapid slow down of servers around the world. Some of the servers have been so severely overloaded that they have shut down. This in turn has been preventing other email from being se3nt (anonymous September 5, 2000).
As Hillebrand reports, “The Head of corp0orate communications at the computer Security Company Sophos Anit- Virus, Graham Cluely says that companies have been bombarded by this virus and have begun to switch off email systems”. Cluely also concluded that one of the reasons that the virus is so popular because it makes a tug on your emotions, love can get you into trouble (Hillebrand May 15,2000).
In this certain case there are several categories of Cybercrime that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was supposed to gather information once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victim’s Internet accounts to surf the net for free. (Ruppe May5, 2000). The second cybercrime category is the computer as the instrumentality of the crime. Since the computer was the main focus of the crime and was used to implement it. The third and final cybercrime category is that the crime is associated with the prevalence of computers. This one is because it allowed the theft of the components of the login names as well as the passwords. This could be cl...
... middle of paper ...
...o the fact that the professor was not afraid to come forward and say “hey I might know this guy”. I did not like however the fact that the Philippine government had not law governing this type of crime. These crimes affect everyone in the world not just down the street or another state. However since this has come to light the E-Commerce Act has passed into law in the Philippines and carries a fine of at least $2,300 plus three jail sentences. The credit card legislation has much lesser penalties. This Act however is not retroactive (Hillebrand May 15, 2000).
Cited Page
Casey, Eoghan. (2001) Pg. 17. Digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic Press
Casey, Eoghan. (2001) pg.167. Digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic Press
Charges Dismissed Philippines Drop Charges In “ Love Bug” Virus Case. (August 21, 2000). Associated Press, ABCNEWS.com
Hillebrand, Mary. (May 15,2000) Nations Gather To Target Cybercrime. E-Commerce Times.
Revisiting the Case (Sept 5, 2000) Associated Press, ABCNEWS.com
Ruppe, David. (May 5, 2000) “Love Bug” Travels Around the Globe. ABCNEWS.com
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and cases (8th ed.).
The logic of this speech is very reasonable. At the beginning of the speech, Martin Luther King, Jr described the cause and purpose of the speech with vivid language. He began with Lincoln signing the emancipation declaration about one hundred years ago, and he naturally connected it to the present situation of Negros. “The life of the negro is still sadly crippled by the manacles of segregation and the chains of the discrimination” (King ). It is the metaphor, “the precise visual image plays a very small part in metaphor and what happens is that a perceived quality in one king of existence is transferred to
Today, not many people realize how lucky we are, but not long ago African Americans and other minorities were not equal to whites. Martin Luther King Jr. wanted that to change. In August 28, 1963, Martin Luther King gave a speech that’s changed us today. The speech was about how all people are equal and his dreams for others equality. In the “I Have a Dream” speech by Martin Luther King Jr. it states “This sweltering summer of the Negro's legitimate discontent will not pass until there is an invigorating autumn of freedom and equality”(King). This quote means that Martin Luther King
Gardner, T. J., & Anderson, T. M. (2013). Criminal evidence: Principles and Cases (8th ed.).
In Martin Luther King Jr.’s “I Have a Dream” speech, he elaborates on the injustices that were wildly plaguing America in the year 1963. Black people all over the country were being treated unfairly, locked up in prison for false crimes, and refused the great opportunities that white people were so lucky to receive. Before the year 1963, President Abraham Lincoln was the last person to make such an impact in the equal treatment of all people, so for about 100 years, blacks had no one to back them in their fight for equal treatment.
On August 28, 1963, Martin Luther King Junior gave a life changing speech to many people throughout the world. It is known as the I Have A Dream speech. This was a great achievement in Kings life, it changed the life's of thousands of people across America. The speech was about how Martin Luther King Junior was calling out for an end to racism in the United States.
Throughout the speech Martin Luther King Jr is explaining the pain and suffering the Negro’s /‘Black’ citizens and slaves had to go through every day. Martin’s purpose and message of the
Multi-platform computer worms are a tool that computer hackers use to infect computers to gain control access. Computer worms are a dangerous virus because they are self-replicating, meaning that they multiply themselves and spread onto other computer networks seeking a lapse in internet security. Computer worms do not need to attach themselves onto an existing computer program to gain access to the victim computer files. The computer worm was created on accident by a Cornell student named Robert Morris; he was seeking a way of managing the internet in 1988. “Morris had no malicious intent, but a bug in his program caused many of the computers the worm landed on to crash. … but worms had come of age and have since evolved into an effective way of attacking systems connected to the internet” (Barwise). Today, hackers use the Morris worm to infect computers. “Five men believed to be responsible for spreading a notorious computer worm on Facebook and other social networks — and pocketing several million dollars from online schemes — are hiding in plain sight in St. Petersburg, Russia …” (Richmond). Since the good intended creation of the worm it has only been used maliciously as a computer virus by money seeking computer hackers such as the Koobface gang in Russia.
In 1963, a great man delivered a monumental speech, which would be recorded in history as the greatest demonstration for freedom in the history of the United States of America. The man was Martin Luther King Jr. The speech was titled I have a dream. This speech was given on August 28, 1963, in Washington D.C., during the March on Washington. Overall this speech was immaculate. It was free of error and free of any logical fallacies. It was a well-rounded and extremely inspiring speech, which addressed the opposition with boldness, honor, and gravity.
My experience with working with a group is that the longer you work together, it feels like the people I work with becomes a family. Sometimes we argue; sometimes we pick each other up when things are tough, but we also work together when things need to be accomplished. Getting a new job is always an adventure; normally, I walk through the door on the first day with fresh eyes and a fresh mind. That is exactly how I entered my first day at CVS Pharmacy (later to be known as CVS Health). Because this was my first retail job, it already seemed better than my experiences with the food and beverage industry. For about four years, I had been in and out of the restaurant business and believed that there had to be something a little more relaxed. Obviously, what I was doing was not my calling, which is why I applied to CVS. It had opportunity for advancement and a relaxed atmosphere. A friends’ wife that works for this particular CVS and helped me get my foot in the door. Walking through the double automatic doors, I could see the cashier, who I would later know as Alyssa, smiling at a customer. My “new” manager approached me with a genuine smile. Just the positive atmosphere and environment set the tone of how it would be working here.
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
The history of cybercrime goes back to 1971 and the first computer virus called the Creeper which was created by Bob H. Thomas, who was a BBN engineer (Dalakov, Meltzer, and Phillips). BBN which stands for Bolt, Beranek and Newman, is now Raytheon BBN Technologies (“About”, Dalakov). A computer virus is a program that is created to cause damage to a computer or perform other malicious acts (204). The Creeper virus was designed to infect the ARPANET network. The ARPANET, which stands for Advance Research Projects Agency was set up by the U.S. Government as an agency in 1969 to provide a network of computers that would connect various academic and research organizations; it was the predecessor of the Internet (“Internet”, Morley, and Parker).
He delivered his speech in a way that made everyone feel like they had a part to play. Out of the 250,000 people that were there, he addressed every one of them. Martin luther King had a plan to show that a group of people no matter the color, gender, or where he or she comes from a difference can be made. He knew his audience and made the audience feel connected to one another. Martin Luther King addressed whites and blacks in his speech. We rallied the two races together with his use of words. Martin Luther King says “the Negro community must not lead us to a distrust of all white people, for many of our white brothers, as evidenced by their presence here today…(1963).” With this simple sentence King linked blacks and whites together with a call of action. The speech dose not just address people by race but also their hometowns. Martin Luther King talks to each state: New Hampshire, New York, Pennsylvania, Colorado, California, Georgia, Tennessee, and Mississippi. Martin Luther King presented his speech to a verity of people, but with his word choice and knowledge of his audience made them feel
Brownleek, Shannon. “The Most Persistent Virus.” U.S. News and World Report 29 May. 1995: 43-49.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.