Diaz_Lab1
pdf
keyboard_arrow_up
School
Valencia College *
*We aren’t endorsed by this school
Course
2414C
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
4
Uploaded by KidGrasshopper3117
Lab 1: Cybercrime Investigations
Instructions:
Read each question and answer according to each section.
The
answers can be found in Chapter 2 of Cybercrime: The Investigation, Prosecution
and Defense of a Computer related Crime by Ralph D. Clifford
.
Section 1: Matching:
Match the Case (Letters A- H) to the corresponding
questions (1-8).
Answers will only be used once.
A) United States v. Slaughter
B) United States v. Mosby
C) United States v. Schuster
D) United States v. Kammersell
E) Reno v. American Civil Liberties Union
F) United States v. Farraj
G) Flores-Figueroa v. United States
H) Jaynes v. Virginia
Question 1:
In __________, the Tenth Circuit held that the defendant sending a
threatening communication from his computer to the
recipient’s
computer could be
prosecuted under Section 875 even though the defendant and the recipient were
located in the same state.
Question 2:
In response to __________, Congress passed the Child Online
Protection Act (COPA), which imposes criminal penalties of a $50,000 fine and
six months in prison for knowingly posting, for “commercial purposes,” of online
content that is “harmful to minors.”
Question 3:
In __________, a computer technician for Alpha Computer Services
was prosecuted for violating 1030(a)(5)(B) when he utilized the companies
wireless Internet service by using customer access information after he had been
terminated from the company.
Question 4:
In __________, a former employee of the Internal Revenue Service
was prosecuted for violating 1030(a)(2) after she accessed an IRS database without
being authorized to do so.
Question 5:
In __________, the Supreme Court held that to convict a Mexican
national of aggravated identity theft under 18 U.S.C. 1028 (a) (1), for presenting
his employer with an alien registration card that used his real name but had
numbers on it that belonged to another person, the government had to prove the
defendant knew these numbers had been assigned to another person.
Question 6:
In __________, the Virginia Supreme Court struck down the state’s
anti-spam statute as violating the First Amendment.
Questions 7:
In __________, a U.S. postal service employee was prosecuted under
1030 (a)(2) for using a United States Postal Office computer to access real estate
web sites he used in his career as a part-time realtor.
Question 8:
In __________, the district court held that a paralegal who e-mailed
an excerpt from his firm’s trial plan for tobacco litigation could be held liable for
violating 18 U.S.C. 2314.
Section 2: Fill in the Blank.
Using the word bank provided below, fill in the
answer to questions 9-16. Answers will only be used once.
WORD BANK
Section 2425
Section 1030
CAN-SPAM Act
Section 1029
South Carolina
Section 223 (a)
Section 1028
Economic Espionage Act of 1996
Question 9:
__________ of Title 18 of the U.S. Code is the basic federal
cybercrime provision.
It defines a number of computer-related offenses, e.g.,
hacking, cracking, virus dissemination, fraud, password trafficking, and extortion.
Question 10:
__________ of Title 47 of the U.S. Code makes it an offense to use a
telecommunication device in interstate of foreign communications to make, create
or solicit and initiate the transmission of “any comment, request, suggestion,
proposal, image or other communication which is obscene, or child pornography,
with intent to annoy
, abuse, threaten, or harass another person.”
Question 11:
The __________ allowed businesses and marketers to send
unsolicited e-mail to anyone with an e-mail address as long as they have identified
themselves clearly, do not use fraudulent headers and honor consumer requests to
cease sending them unsolicited commercial e-mail.
Question 12:
__________ of Title 18 of the U.S. Code makes it a federal crime for
someone “using mail or any facility or means of interstate or foreign commerce, or
within the specia
l maritime and territorial jurisdiction of the United States” to
“knowingly” initiate the transmission of the name, address, telephone number,
social security number, or electronic mail address of one whom he or she knows to
be under sixteen years of age “
with the intent to entice, encourage, offer or solicit
any person to engage in any sexual activity for which any person can be charged
with a criminal offense.”
Question 13:
__________ of Title 18 of the U.S. Code prohibits activities
involving counterfeit
access devices, which it defines as “any access device that is
counterfeit, fictitious, altered or forged, or an identifiable component of an access
device or a counterfeit access device.
Question 14:
__________ of Title of the U.S. Code criminalizes various acts
constituting fraud in connection with identification documents.
Question 15:
The __________ made the theft of trade secrets a federal crime.
Question 16:
__________ includes denial of service attacks in its prohibition on
disseminating malware.
Section 3: Short Answer:
Read the questions and in 1-2 sentences answer the
questions in the text boxes provided, as stated in the textbook.
Question 17:
Section 875 of Title 18 of the U.S. Code makes it a federal crime to
transmit any of the following in interstate of foreign commerce:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3._________________________________________________________________
__________________________________________________________________
4._________________________________________________________________
__________________________________________________________________
Question 18:
Section 2256 (8) of Title 18 defined “child pornography” as “any
visual depiction, including any photograph, film, video, picture, or computer or
computer-generated image or picture or se
xually explicit conduct” in which:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
3._________________________________________________________________
__________________________________________________________________
Question 19:
There are two basic substantive defenses to a charge of criminal
copyright infringement:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________
Question 20:
The Lanham Act defines a ‘trademark’ as including any word, name,
symbol, or device, or any combination thereof:
1._________________________________________________________________
__________________________________________________________________
2._________________________________________________________________
__________________________________________________________________