Crime Classification Manual Part II Chapter 10 A 10

 


Crime Classification Manual Part II Chapter 10 A 10

A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITION

 

Trojan horses are programs placed on a computer to capture and send information to a third party unbeknown to the computer user. They have been used in cases of identity theft (see classification 521). Another type of Trojan horse captures the user’s keystroke information and searches for personal and financial information. This type of program is called a “key logger.”

Comments

Popular posts from this blog

Crime Classification Manual Part II Chapter 10 A 31

Is the role of deviant sexual fantasy related to the types of sexual offence committed by Ted Bundy? (9)

Crime Classification Manual Part II Chapter 10 A 22