Crime by computer is a very serious offense. But, it is by nature such a 'clean' crime that it attracts some of the most unsuspecting criminals. Theft and sabotage by electronic means requires a keen and intuitive mind as opposed to brute strength, which is required for most conventional thievery. Children too young to even be in high school do some of the worst damage to businesses, utilities, and governments, both nationally and internationally. The most common of all computer crimes, and the most highly publicized, involves 'hackers'. A hacker is someone who uses a computer as a hobby. But, a stereotype of a hacker is someone who enjoys spending hours on end doing mischief with their computer, though, usually not with malicious intent. Often hackers connect their personal computer to the telephone system, via a modem, to some sort of larger variety of computer. This - 1 - usually means alot of long distance telephoning. Because of this, the phone company is a major target of crime by computer. Theft of service by illegally charging a call to another person is the most common method of avoiding telephone billing. A person, as defined by insiders, who participates in such activity is termed a 'phone phreak'.[1] A typical 'hangout' for phreaks is the electronic bulletin board. These are basically electronic areas accessed by telephone which provide information and services to anyone who might find it useful. Some are legal; many are not. A great number provide information that encourages misconduct. Here, one can often find an abundance of illegal phone numbers to illegally charge long distance calls; codes and passwords to access university, government and corporate computers; and an incredible amount of technical information. Valid credit card numbers and phone numbers for such systems as the Defense Department's research computer are some of the kinds of 'stuff' that is available.[2] The numbers for these boards are extremely closely guarded; many can only be obtained from other boards. Regulation of hackers is extremely difficult. A Los Angeles man is currently under investigation for having one illegal telephone number on the bulletin board he operates out of his house. This is but the tip of the iceberg. There is very little legislation on the subject, and what there is has proven ---------- 1. Richard Sandza. "The Night of the Hackers," Newsweek, November 12, 1984, p. 17 2. Newsweek, November 12, 1984, p. 18 - 2 -