Chapter 7. Low tech hacking and the law
Where can you go for help?
Information in this chapter
• Meet Special Agent (SA) Gregory K. Baker, FBI
A computer can be used to commit a crime—for instance, people can use a computer to download child pornography. But that same computer can also be the victim of a crime—if, for example, an attacker attempts to break into the computer to gain access to intellectual property. Because the computer plays such an integral role in the daily activities of individuals and corporations alike, it is important to understand the crimes associated with computers and to know the law enforcement agencies to contact for help should the need arise. With that in mind, this chapter introduces readers to ...