Technology Argumentative Essay

This essay has a total of 3006 words and 11 pages.

Technology

It's the weekend, you have nothing to do so you decide to play around on your computer.
You turn it on and then start up, you start calling people with your modem, connecting to
another world, with people just like you at a button press away. This is all fine but what
happens when you start getting into other peoples computer files. Then it becomes a crime,
but what is a computer crime really, obviously it involves the use of a computer but what
are these crimes. Well they are: Hacking, Phreaking, & Software Piracy.


To begin I will start with Hacking, what is hacking. Hacking is basically using your
computer to "Hack" your way into another. They use programs called scanners which randomly
dials numbers any generating tones or carriers are recorded. These numbers are looked at
by hackers and then used again, when the hacker calls up the number and gets on he's
presented with a logon prompt, this is where the hacking really begins, the hacker tries
to bypass this anyway he knows how to and tries to gain access to the system. Why do they
do it, well lets go to a book and see "Avid young computer hackers in their preteens and
teens are frequently involved in computer crimes that take the form of trespassing,
invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games
evening, and they get entangled in the illegal use of their machines without realizing the
full import of what they are doing", I have a hard time believing that so lets see what a
"hacker" has to say about what he does "Just as they were enthraled with their pursuit of
information, so are we. The thrill of the hack is not in breaking the law, it's in the
pursuit and capture of knowledge.", as you can see the "hacker" doesn't go out to do
destroy things although some do. It's in the pursuit of knowledge. Of course this is still
against the law. But where did all of this start, MIT is where hacking started the people
there would learn and explore computer systems all around the world. In the views of
professional hacking is like drugs or any other addictive substance, it's an addiction for
the mind and once started it's difficult to stop. This could be true, as hackers know what
they are doing is wrong and they know odds are they will be caught. But as I mentioned
some hackers are just above average criminals, using there skills to break in banks and
other places where they can get money, or where they can destroy information. What a
hacker does at a bank is take a few cents or even a few fractions of a cents from many
different accounts this may seem like nothing but when all compiled can be alot. A stick
up robber averages about $8,000 each "job", and he has to put his life and personal
freedom on the line to do it while the computer hacker in the comfort of his own living
room averages $500,000 a "job". As for people destroying information, this is for taking
some one down, destruction of data could end a business which for some is very attractive.
It can cost a company thousands of dollars to restore the damage done.


Now that you have an understanding of what a "hacker" is, it time to move on to someone
closely associates with a hacker. This is a Phreak, but what is that. For the answer we
turn to the what is known as the "Official" Phreakers Manual "Phreak [fr'eek] 1. The
action of using mischievous and mostly illegal ways in order to not pay for some sort of
telecommunications bill, order, transfer, or other service. It often involves usage of
highly illegal boxes and machines in order to defeat the security that is set up to avoid
this sort of happening. [fr'eaking] v. 2. A person who uses the above methods of
destruction and chaos in order to make a better life for all. A true phreaker will not go
against his fellows or narc on people who have ragged on him or do anything termed to be
dishonourable to phreaks. [fr'eek] n. 3. A certain code or dialup useful in the action of
being a phreak. (Example: "I hacked a new metro phreak last night.")" The latter 2 ideas
of what a phreak is, is rather weird. A Phreak like the hacker likes to explore and
experiment, however his choice of exploring is not other computer but the phone system as
a whole. Phreaks explore the phone system finding many different ways to do things, most
often make free calls. Why do they do this, " A hacker and phreaker will have need to use
telephone systems much more than an average individual, therefore, methods which can be
used to avoid toll charges are in order. ". A phreak has two basic ways of making free
calls, he can call up codes or PBXs on his phone and then enter a code and make his call
or he can use Electronic Toll Fraud Devices. Codes are rather easy to get the phreak will
scan for them, but unlike a hacker will only save the tone(s) number instead of the
carrier(s). Then he will attempt to hack the code to use it, these codes range from
numbers 0 - 9 and can be any length, although most are not more than 10. Electronic Toll
Fraud Devices are known as Boxes in the underground. Most are the size of a pack of
smokes, or than can be smaller or bigger. I will not go too deep. They are electronic
devices than do various things, such as make outgoing calls free, make incoming calls
free, simulate coins dropping in a phone, etc. People who "Phreak" are caught alot these
days thanks to the new technology.


Software Piracy is the most common computer crime, it is the illegal coping of software.
"People wouldn't think of shoplifting software from a retail store, but don't think twice
about going home and making several illegal copies of the same software." and this is true
because I myself am guilty of this. The major problem is not people going out and buying
the software then making copies for everyone, it's the Bulletin Boards that cater to
pirating software, that really cause the problem. On anyone one of these boards one can
find an upwards of 300 - 1000 of pirated software open for anyone to take. This is a
problem and nothing can really be done about it. Few arrests are made in this area of
computer crime.


I will now devote a brief section to the above mentioned BBS' , most are legal and do
nothing wrong. However there are many more that do accept pirated software, pornographic
pictures, animations , and texts. As well as a trading area for phone codes, other BBS',
Credit Card numbers, etc. This is where a majority of Hackers and Phreaks come, as well as
those who continue to pirate software come to meet and share stories. In this is a new
world, where you can do anything, there are groups that get, crack, and courier software
all over the world some of them are called: INC: International Network Of Crackers, THG:
The Humble Guys, TDT: The Dream Team. As well a number of other groups have followed suit
such as Phalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and YAM (Youngsters Against
McAfee) these are virus groups who write and courier their work anywhere they can, they
just send it somewhere, where anyone can take it and use it in any manner they wish, such
as getting even with someone. All of these activities are illegal but nothing can be done,
the people running these boards know what they are doing. As it stands right now, the BBS
world is in two parts Pirating and the Underground, which consists of
Hackers/Phreaks/Anarchists/Carders(Credit Card Fraud)/Virus programmers. All have
different boards and offer a variety of information on virtually any subject.


Well from all of this reading you just did you should have a fairly good idea of what
computer crime is. I didn't mention it in the sections but the police, phone companies are
arresting and stopping alot of things every day. With the new technology today it is
easier to catch these criminals then it was before. With the exception of the BBS' the
police have made some major blows busting a few BBS', arresting hackers and phreaks. All
of which were very looked up to for knowledge in their areas of specialty. If I had more
time I could go into these arrests but I must finish by saying that these are real crimes
and the sentences are getting harsher, with alot of the older people getting out the newer
people are getting arrested and being made examples of. This will deter alot of would-be
computer criminal away.


Continues for 6 more pages >>