Saturday, June 09, 2007

Computer Tampering--I can't wait on some local folks to be busted !!!

Computer tampering will be one of the newest charges introducing folks to the criminal justice sytem with felony charges.


35-43-1-4. Computer tampering.

(a) As used in this section:
"Computer network" and "computer system" have the meanings set
forth in IC 35-43-2-3.
"Computer program" means an ordered set of instructions or
statements that, when executed by a computer, causes the computer
to process data.
"Data" means a representation of information, facts, knowledge,
concepts, or instructions that:
(1) May take any form, including computer printouts, magnetic
storage media, punched cards, or stored memory;
(2) Has been prepared or is being prepared; and
(3) Has been processed, is being processed, or will be
processed; in a computer system or computer network.

(b) A person who knowingly or intentionally alters or damages a
computer program or data, which comprises a part of a computer
system or computer network without the consent of the owner of the
computer system or computer network commits computer tampering, a
Class D felony.

Journal-Gazette profiles the typical predator who is know different than a stalker.
In March, the woman noticed that the e-mail address of a male friend in the military had been changed by one character. The friend’s e-mail address could be traced to a location overseas, where he was stationed, but the new, slightly altered e-mail address was traced to Kendallville, the affidavit said.

A police investigation found that the second e-mail address was created from a computer at the Kendallville Police Department and that the account was accessed multiple times between April 3 and May 16 during times Pegan was working, the affidavit said.

The investigation also turned up an invoice sent to Pegan’s work e-mail address from Real Tech Spyware for computer-monitoring software, which allows the user to monitor the activity on another computer. The software Pegan bought was used to monitor a computer named “Christie,” the name of the computer used by Pegan’s ex-girlfriend, the affidavit said.

In interviews with police, Pegan admitted to accessing his ex-girlfriend’s e-mail account and even deleting or blocking some e-mail addresses, the affidavit said. He added other e-mail addresses to her account, such as the slightly altered e-mail address of her overseas friend, and continued corresponding with her under this assumed identity.

He got the woman to install the monitoring software on her computer by sending it from the e-mail address similar to her friend’s as an attachment labeled “for our soldiers.exe,” the affidavit said.



Also , I like the computer trepasser law for those who sneak and place stuff on your computer:


TITLE 35 CRIMINAL LAW AND PROCEDURE

ARTICLE 43 OFFENSES AGAINST PROPERTY

CHAPTER 2 BURGLARY--TRESPASS

Burns Ind. Code Ann. @ 35-43-2-3

35-43-2-3. Computer trespass.

(a) As used in this section:
"Access" means to:
(1) Approach;
(2) Instruct;
(3) Communicate with;
(4) Store data in;
(5) Retrieve data from; or
(6) Make use of resources of;
a computer, computer system, or computer network.
"Computer network" means the interconnection of communication
lines with a computer through remote terminals or a complex
consisting of two (2) or more interconnected computers.
"Computer system" means a set of related computer equipment,
software, or hardware.

(b) A person who knowingly or intentionally accesses:
(1) A computer system;
(2) A computer network; or
(3) Any part of a computer system or computer network;
without the consent of the owner of the computer system or computer
network, or the consent of the owner's licensee, commits computer
trespass, a Class A misdemeanor. [P.L.35-1986, @ 3.]


He got the woman to install the monitoring software on her computer by sending it from the e-mail address similar to her friend’s as an attachment labeled “for our soldiers.exe,” the affidavit said.


The article stated this was a police officer. Who wouldn't have suspected a police? That is why you question question question, because the one's who are supposed to be above the law are often involved in circumventing the law. Why? because they know how the system works.

2 comments: