ABSTRACT

Incidents of computer-related crime and telecommunications fraud have increased dramatically over the

past decade, but due to the esoteric nature of this crime there have been very few prosecutions and even

fewer convictions. The same technology that has allowed for the advancement and automation of many

business processes has also opened the door to many new forms of computer abuse. Although some of

these system attacks merely use contemporary methods to commit older, more familiar types of crime,

others involve the use of completely new forms of criminal activity that have evolved along with

the technology.