The 5,2000). A 22-year-old college dropout was arrested

The 5,2000). A 22-year-old college dropout was arrested

The “Love Bug” VirusThe virus dubbed the “love bug” started to rapidly spread throughout the world on May 4, 2000. According to David Ruppe (May 5,2000) in an article on the website, The virus came in the form of “ILOVEYOU” in the subject line, which seemed harmless and greets people in a friendly way. They have no idea that they are in for a big surprise as they opened their email. The message inside reads: “kindly check the attached LOVELETTER coming from me” (Ruppe, May 5,2000). A 22-year-old college dropout was arrested in the Philippines as the author of this virus (anonymous, August 21,2000). When the attachment contained in the email was opened, the virus rapidly proliferated by automatically sending copies to everyone listed in the user’s email address book.

Experts have concluded that this was the cause of the rapid slow down of servers around the world. Some of the servers have been so severely overloaded that they have shut down. This in turn has been preventing other email from being se3nt (anonymous September 5, 2000).As Hillebrand reports, “The Head of corp0orate communications at the computer Security Company Sophos Anit- Virus, Graham Cluely says that companies have been bombarded by this virus and have begun to switch off email systems”. Cluely also concluded that one of the reasons that the virus is so popular because it makes a tug on your emotions, love can get you into trouble (Hillebrand May 15,2000).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

In this certain case there are several categories of Cybercrime that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was supposed to gather information once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victim’s Internet accounts to surf the net for free.

(Ruppe May5, 2000). The second cybercrime category is the computer as the instrumentality of the crime. Since the computer was the main focus of the crime and was used to implement it. The third and final cybercrime category is that the crime is associated with the prevalence of computers. This one is because it allowed the theft of the components of the login names as well as the passwords. This could be classified as having multiple cybercrime categories (Casey p17).The crime scene for this specific case is the apartment and the computer where the virus originated.

This was the originating site and where the virus was supposed to send back the passwords and login names. There were many different email addresses that were in use from that same computer (Casey 167).National Bureau of Investigations (NBI) of the Philippines will be prosecuting de Guzman with charges for credit fraud under the Access Devices Regulation Act- 1998 this could actually let the author off relatively easy (anonymous August 21,2000). The NBI crime squad has next to no experience with such computer investigations as well as no equipment to analyze computer programs.

(Hillebrand may 15,2000). The UnitesStates tried to get permission to expedite Onel de Guzman to try him for this crime here. But this has never happened, so the Philippines has jurisdiction In the Philippines there is a lack of computer criminal laws and therefore the over this matter (Anonymous Sept 5, 2000).

As Ruppe reports, virus rapidly spread to private, commercial, and government computers across Asia, Australia, Europe and North America. Some of the computers that have been affected are the Pentagon, the C. I. A., Asian Wall Street Journal, British Telecom, ATT, Cable and Wireless in London, and the British Parliament, and also some Individual members of congress. Here in Oregon the virus forced the city of Eugene to cut the link between its computers and the Internet. The harms that this crime has inflicted are only to those that had computers with Internet emails.

That was the way that the virus spread as it was opened. It has caused an estimate of damages totaling $8 billion (USA$) (Ruppe May5, 2000).In trying to track down the person that that sent the “love bug virus” They were able to decipher part of the code and find the ISP that was used and what email address it had come from.rem barok -loveletter(VBE) <I hate to go to school>rem by: spyder / emailprotected / @ grammarsoft Group/Manila, PhilippinesOn Error Resume NextDim fso, dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dowEq=””Ctr=OSet fso = CreateObject(“scpripting.fileSystemObject”)This is the first few lines of the virus code (I have a friend into computers) that was used.

After deciphering it as you can see at the top in blue the email address is visible allowing the officials to track him down.Rgcreate “HKCUSoftware|MicrosoftInternet Explorer Main|StartPage”,”

exe”In looking at part of this code you can see is in part of the code.

This was the Internet Service Provider that unknowingly carried a password stealing second phase of the virus( anonymous August 21,2000) Officials found no computers in the apartment and figured they were carried out in pieces. However they were able to find a box with 17 items that included computer magazines, telephones, diskettes, wires and cassette tapes. They used this evidence to help seal their case. A caller ID was also used in tracking down the phone line used to carry the virus( Anonymous September 5, 2000). Officials never really did say how this evidence was used in conjunction with the code that was found. However taking an opinion, the computer school that De Guzman had been kicked out of had a paper describing almost in detail of this virus and its functions. His professor was the one that alerted the authorities and that was how the NBI were able to surveillance the apartment just seven hours after the virus had been released(Ruppe May 5, 2000).

Since the Philippines has no law covering computer hacking, they were only allowed to charge the former college student with traditional crimes such as theft and violation of an “access devices” law that normally applies to fraud using credit cards. The Access Devices Regulation Act of 1998 which was chiefly written to target credit card fraud but also covers the use of any unauthorized access device in order to obtain goods or services (anonymous August 21,2000) Since this incident has happened Federico Opinion, Head of the National Bureau of Investigation, said “violators of the access devices law need not use a credit card to commit a crime”(anonymous August 21,2000). The vital material in this case is that DE Guzman used an unauthorized access device, which is prohibited.

In order to support the separate theft charge, Philippine officials had to prove that he had an intent to gain, this was supported by the fact of stealing passwords for access to the internet.I was highly impressed at the way the NBI was able to surveillance the apartment so soon after the virus had been sent. I think this was due to the fact that the professor was not afraid to come forward and say “hey I might know this guy”. I did not like however the fact that the Philippine government had not law governing this type of crime. These crimes affect everyone in the world not just down the street or another state. However since this has come to light the E-Commerce Act has passed into law in the Philippines and carries a fine of at least $2,300 plus three jail sentences.

The credit card legislation has much lesser penalties. This Act however is not retroactive (Hillebrand May 15, 2000).Cited PageCasey, Eoghan.

(2001) Pg. 17. Digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic PressCasey, Eoghan. (2001) pg.

167. Digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic PressCharges Dismissed Philippines Drop Charges In ” Love Bug” Virus Case. (August 21, 2000).

Associated Press, ABCNEWS.comHillebrand, Mary. (May 15,2000) Nations Gather To Target Cybercrime. E-Commerce Times.Revisiting the Case (Sept 5, 2000) Associated Press, ABCNEWS.comRuppe, David.

(May 5, 2000) “Love Bug” Travels Around the Globe.

No Comments

Add your comment


I'm Alfred!

We can help in obtaining an essay which suits your individual requirements. What do you think?

Check it out