Diaz_Lab3
pdf
keyboard_arrow_up
School
Valencia College *
*We aren’t endorsed by this school
Course
2414C
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
4
Uploaded by KidGrasshopper3117
Lab 3: Cybercrime Investigations
Instructions:
Read each question and answer according to each section.
The
answers can be found in Chapter 4 of Cybercrime: The Investigation, Prosecution
and Defense of a Computer related Crime by Ralph D. Clifford
.
Section 1: Matching:
Match the Case (Letters A- H) to the corresponding
questions (1-8).
Answers will only be used once.
A) United States v. Mitra
B) United States v. Morris
C) United States v. O
’
Brien
D) United States v. John
E) United States v. Ivanov
F) United States v. Hsu
G) United States v. Weaver
H) United States v. Poehlman
Question 1:
In __________, the First Circuit upheld a sentencing enhancement of
two levels based on computer knowledge, which the court found constituted
“
special skills,
”
warranting the enhancement.
Question 2:
In __________, the defendant was convicted for intentionally
accessing a
“
federal interest computer
”
and thereby causing damage after releasing
a destructive program onto the Internet.
Question 3:
In __________, the court concluded that the defendant obtained
something of value within the meaning of Section 1030 (a)(4) when he obtained
root access to a protected computer.
Question 4:
In __________, the U.S. District Court for the Central District of
Illinois held that under the Stored Wire and Electronic Communications Act and
the Wiretap Act, a court may compel an Internet Service Provider to comply with a
subpoena and produce the contents of its subscriber
’
s email.
Question 5:
In __________, the defendant, while searching
“
alternative lifestyles
”
Internet sites for adult companions, encountered a government agent posing as a
mother seeking a
“
sexual mentor
”
for her three daughters.
Question 6:
In __________, the defendant was convicted for interfering with a
computer-based emergency services communication system.
Questions 7:
In __________, an employee of one company sent an email to an
employee of a competitor
’
s company, which outlines and requested information
relating to the competitor
’
s technology.
Question 8:
In __________, the court held that exceeding authorized access can
“
include exceeding the purposes for which access is
‘
authorized.
’”
Section 2: Fill in the Blank.
Using the word bank provided below, fill in the
answer to questions 9-16. Answers will only be used once.
WORD BANK
Section 1030 (a)(3)
Section 1030 (a)(4)
Pure Hackers
Section 1030 (a)(7)
Section 1030 (a)(6)
Section 1030 (a)(5)
Operation Web Snare
Identity Theft Penalty Enhancement Act (ITPEA)
Question 9:
__________ prohibits online extortion through the transmission of
any threats to cause damage to obtain information from, to impair confidentiality
of information obtained from, or to demand something of value in relation to
damage of a protected computer with the intent to extort something of value.
Question 10:
__________ is the principle anti-hacking subsection in the CFAA.
Question 11:
Under __________, the CFAA protects government computers and
prohibits intentionally accessing a nonpublic computer of a U.S. department or
agency without authorization.
Question 12:
The
__________ adds two years to the prison sentence received by
any individual convicted of an enumerated felony who knowingly and without
lawful authority transfers, possesses, or uses a means of identification of another
person.
Question 13:
__________ was the biggest federal crackdown on cybercrime to
date.
It included more than 160 investigations, 140 search and seizure warrants,
and the arrest or convictions of more than 150 individuals.
Question 14:
In __________ the CFAA prohibits trafficking in passwords that
could be used to access a protected computer, where it is done knowingly and with
intent to defraud.
Question 15:
__________ prohibits access to a protected computer, without or in
excess of authority, with the intent to defraud or obtain anything of value.
Question 16:
__________ are outsiders who access systems, without any
authorization, for their own interest and not for economic profit, and traditionally
lack the criminal intent to damage systems.
Section 3: Short Answer:
Read the questions and in 1-2 sentences answer the
questions in the text boxes provided, as stated in the textbook.
Question 17:
An offender will be liable under section 1030(a)(5) if the defendant
conducts damage that:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
3._________________________________________________________________
__________________________________________________________________
4._________________________________________________________________
__________________________________________________________________
Question 18:
Section 1832 of the EEA requires the government to establish that:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3._________________________________________________________________
__________________________________________________________________
Question 19:
Section 1202 of Title 17 protects against the concealment of
copyright infringement caused by tampering with copyright management
information (CMI).
CMI includes:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
3._________________________________________________________________
__________________________________________________________________
4._________________________________________________________________
__________________________________________________________________
Question 20:
To prove copyright infringement after the enactment of the NET Act,
the prosecution must show:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
3._________________________________________________________________
__________________________________________________________________
4._________________________________________________________________
__________________________________________________________________