This document discusses various types of computer crimes including unauthorized computer access, creation and spreading of malicious programs, cyber harassment, and weak punishment in the US. It notes that while computer crimes are increasing, accurate statistics are difficult to obtain since many go unreported or losses are hard to calculate. The document outlines different forms of unauthorized computer use such as voyeurism, data alteration, deletion, and denial of service attacks. It also discusses how computer crimes are new ways to harm people compared to older crimes where computers are merely a tool.