Introduction to computer crime

Introduction to computer crime

4.11 - 1251 ratings - Source

The con artists posed as bank machine repair technicians to victimize the ATM users. The con game involved getting the victims to hand over their access cards, and watching them later when they entered their personal identification numbers. Then, after ... After money was drawn form that account, the con artist simply waited for the next user. ... (The addresses for the groups listed in this paragraph, and in subsequent paragraphs are found in an appendix at the end of this report.) anbsp;...

Title:Introduction to computer crime
Author:Jay BloomBecker
Publisher: - 1985


You Must CONTINUE and create a free account to access unlimited downloads & streaming