ABSTRACT
Incidents of computer-related crime and telecommunications fraud have increased dramatically over the
past decade, but due to the esoteric nature of this crime there have been very few prosecutions and even
fewer convictions. The same technology that has allowed for the advancement and automation of many
business processes has also opened the door to many new forms of computer abuse. Although some of
these system attacks merely use contemporary methods to commit older, more familiar types of crime,
others involve the use of completely new forms of criminal activity that have evolved along with
the technology.