Diaz_Lab1

pdf

School

Valencia College *

*We aren’t endorsed by this school

Course

2414C

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

4

Uploaded by KidGrasshopper3117

Report
Lab 1: Cybercrime Investigations Instructions: Read each question and answer according to each section. The answers can be found in Chapter 2 of Cybercrime: The Investigation, Prosecution and Defense of a Computer related Crime by Ralph D. Clifford . Section 1: Matching: Match the Case (Letters A- H) to the corresponding questions (1-8). Answers will only be used once. A) United States v. Slaughter B) United States v. Mosby C) United States v. Schuster D) United States v. Kammersell E) Reno v. American Civil Liberties Union F) United States v. Farraj G) Flores-Figueroa v. United States H) Jaynes v. Virginia Question 1: In __________, the Tenth Circuit held that the defendant sending a threatening communication from his computer to the recipient’s computer could be prosecuted under Section 875 even though the defendant and the recipient were located in the same state. Question 2: In response to __________, Congress passed the Child Online Protection Act (COPA), which imposes criminal penalties of a $50,000 fine and six months in prison for knowingly posting, for “commercial purposes,” of online content that is “harmful to minors.” Question 3: In __________, a computer technician for Alpha Computer Services was prosecuted for violating 1030(a)(5)(B) when he utilized the companies wireless Internet service by using customer access information after he had been terminated from the company.
Question 4: In __________, a former employee of the Internal Revenue Service was prosecuted for violating 1030(a)(2) after she accessed an IRS database without being authorized to do so. Question 5: In __________, the Supreme Court held that to convict a Mexican national of aggravated identity theft under 18 U.S.C. 1028 (a) (1), for presenting his employer with an alien registration card that used his real name but had numbers on it that belonged to another person, the government had to prove the defendant knew these numbers had been assigned to another person. Question 6: In __________, the Virginia Supreme Court struck down the state’s anti-spam statute as violating the First Amendment. Questions 7: In __________, a U.S. postal service employee was prosecuted under 1030 (a)(2) for using a United States Postal Office computer to access real estate web sites he used in his career as a part-time realtor. Question 8: In __________, the district court held that a paralegal who e-mailed an excerpt from his firm’s trial plan for tobacco litigation could be held liable for violating 18 U.S.C. 2314. Section 2: Fill in the Blank. Using the word bank provided below, fill in the answer to questions 9-16. Answers will only be used once. WORD BANK Section 2425 Section 1030 CAN-SPAM Act Section 1029 South Carolina Section 223 (a) Section 1028 Economic Espionage Act of 1996 Question 9: __________ of Title 18 of the U.S. Code is the basic federal cybercrime provision. It defines a number of computer-related offenses, e.g., hacking, cracking, virus dissemination, fraud, password trafficking, and extortion. Question 10: __________ of Title 47 of the U.S. Code makes it an offense to use a telecommunication device in interstate of foreign communications to make, create or solicit and initiate the transmission of “any comment, request, suggestion,
proposal, image or other communication which is obscene, or child pornography, with intent to annoy , abuse, threaten, or harass another person.” Question 11: The __________ allowed businesses and marketers to send unsolicited e-mail to anyone with an e-mail address as long as they have identified themselves clearly, do not use fraudulent headers and honor consumer requests to cease sending them unsolicited commercial e-mail. Question 12: __________ of Title 18 of the U.S. Code makes it a federal crime for someone “using mail or any facility or means of interstate or foreign commerce, or within the specia l maritime and territorial jurisdiction of the United States” to “knowingly” initiate the transmission of the name, address, telephone number, social security number, or electronic mail address of one whom he or she knows to be under sixteen years of age “ with the intent to entice, encourage, offer or solicit any person to engage in any sexual activity for which any person can be charged with a criminal offense.” Question 13: __________ of Title 18 of the U.S. Code prohibits activities involving counterfeit access devices, which it defines as “any access device that is counterfeit, fictitious, altered or forged, or an identifiable component of an access device or a counterfeit access device. Question 14: __________ of Title of the U.S. Code criminalizes various acts constituting fraud in connection with identification documents. Question 15: The __________ made the theft of trade secrets a federal crime. Question 16: __________ includes denial of service attacks in its prohibition on disseminating malware. Section 3: Short Answer: Read the questions and in 1-2 sentences answer the questions in the text boxes provided, as stated in the textbook. Question 17: Section 875 of Title 18 of the U.S. Code makes it a federal crime to transmit any of the following in interstate of foreign commerce: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3._________________________________________________________________ __________________________________________________________________ 4._________________________________________________________________ __________________________________________________________________ Question 18: Section 2256 (8) of Title 18 defined “child pornography” as “any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture or se xually explicit conduct” in which: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ 3._________________________________________________________________ __________________________________________________________________ Question 19: There are two basic substantive defenses to a charge of criminal copyright infringement: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________ Question 20: The Lanham Act defines a ‘trademark’ as including any word, name, symbol, or device, or any combination thereof: 1._________________________________________________________________ __________________________________________________________________ 2._________________________________________________________________ __________________________________________________________________