Crime Classification Manual Part II Chapter 10 B 38
Crime Classification Manual Part II Chapter 10 B 38
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
In August, he
logged into the Internet computer system of a major Inter- net service provider
(ISP) using a program he had installed on an employee’s computer. This program
allowed the juvenile to use the employee’s computer remotely to access other
computers on the internal network of the ISP and gain access to portions of the
ISP’s operational information.
Comments
Post a Comment