Actually, the defense attorney's statement is ludicrous.

The address will be the victim's e-mail address if the worm can find that information in the victim's computer, otherwise the address will be chosen from a list of 15 addresses, mostly with female names, contained in the worm.

A good example of a geometric series is the propagation of a computer worm.

Police in the Philippines knew the name and locationof the suspect within 12 hours of the initial release of the worm,but the police were hampered bythe lack of laws there for computer crimes.

VAXcomputers running versions of the Berkeley UNIX operating system.

This virus infected the boot sector of 5¼ inchfloppy diskettes with a 360 kbyte capacity.

On 11 May 2000, one week after the initial release of the worm,the author's attorney said thathis client did not realize how rapidly the worm would propagate.

Morris, 928 F.2d 504, 506 (2dCir.

Partly as a result of adequate law in the Philippines,just five days after the initial release of the virus therewas active discussion of extraditing the suspect to a developed countrywhere harm occurred and where the laws were adequate to punishthe perpetrator.

Writing essays in all domains of writing is amazingly simple.

The closest relevantPhilippine law was designed to cover credit card or bank account fraud,but was broad enough to cover unauthorized taking of goods and services.

Just click "Add eBook" during checkout.

However, extradition laws only allow extraditionin cases where the offense was a crime in the suspect's home country in the country to which extraditionis sought, so extradition from the Philippines was not possible.

Denning, editor, Addison-Wesley, 1990.

Some of the copycat versions were moredestructive than the original, as these copycat versions overwrotefiles of types , , and ,which destroyed the user's operating system.

Just click "Add eBook" during checkout.

This example shows the international nature of computer crime:a criminal in one country can rapidly cause havoc all over the world,using the international reach of the Internet.

Available from the and published in various places.

The deception in this subject and e-mail message may be particularlyhorrifying to a naive person, but one must expect computer criminalsto be honest and sincere.