I do not have the spare time that would be requiredfor a thorough search and analysis of reported cases and statutes oncomputer crime, as well as newspaper accounts (most criminalproceedings are resolved without generating any judicial decisionthat is reported in legal databases or books),so my revisions are mostly generalizations.
Sue criminals in tort
There are no precise, reliable statistics on the amountof computer crime and the economic loss to victims, partly becausemany of these crimes are apparently not detected by victims,many of these crimes are never reported to authorities, and partlybecause the losses are often difficult to calculate.
Retailers Against Crime | Working together to detect …
Journalists play an important role in this deterrence by reportingon the crime (and how people were harmed), arrest, trial, andsentence of the guilty criminals.
Europol and Interpol reaffirm fight against cyber crime
The criminals who change or delete data, or who deliberately gobble largeamounts of computer resources, have a more sinister motive and arecapable of doing immense damage.
How to Protect Yourself Against Crime - WebMD
However the criminals who trash other people's websites are actingas self-appointed censors who deny freedom of speech to those with whomthey disagree.
Gun Facts | Gun Control and Crime
The computer voyeurs, like petty criminals who peek in other people's windows,generally hack into other people's computers for the thrill of it.
Japanese War Crime Trials | HistoryNet
However, this excuse makes these criminals into vigilanteswho serve as legislature, judge, jury, and executioner:arrogantly determining what is in the best interests of society.
International Actions against Cybercrime: Networking …
Not only should you refuse to provide such information, but please report such requests to the management of the online service or the local police, so they can be alert to an active criminal.
The Value of Civilian Handgun Possession as a Deterrent …
This brief duration is not because the criminal is a nice person, but because long-duration attacks make it easier for engineers at the victim's website to promptly trace the source of the attacks.
Crime on College Campuses in the U.S
However, in the unauthorized use of another's computer, thecriminal "enters" the computer via the telephone lines, which is breaking into the building.