Chapter 7. Low tech hacking and the law
Where can you go for help?
Information in this chapter
• Meet Mr. Tony Marino
• Meet Special Agent (SA) Gregory K. Baker, FBI
A computer can be used to commit a crime—for instance, people can use a computer to download child pornography. But that same computer can also be the victim of a crime—if, for example, an attacker attempts to break into the computer to gain access to intellectual property. Because the computer plays such an integral role in the daily activities of individuals and corporations alike, it is important to understand the crimes associated with computers and to know the law enforcement agencies to contact for help should the need arise. With that in mind, this chapter introduces readers to ...
Get Low Tech Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.