MODULE 12 Activity 1 & 2
1. From the cases summarized above, explain what constitute a computer crime.
Computers and computer networks create new categories of crimes that did not exist in the pre-computer age. While technology has advanced quickly, the law has not. New crimes often do not fit the parameters of the preexisting legal framework. The widespread use of computers has resulted in a new challenge for law enforcement- computer crime. A computer crime can be said to occur when a computer is the target of the offense, that is, when the actor’s conduct is designed to steal information from, or cause damage to, a computer or computer network. Some computer crime definitions also include cases in which the computer is an integral tool in committing an offense. For example, a bank teller might write a computer program to skim small amounts of money from a large number of accounts. Although this might constitute a computer crime, such conduct is prohibited by traditional criminal laws, and could be charged accordingly.
2. Discuss at least three other examples of computer crimes.
The three given examples are only a part of millions computing problems. Today, it is quite difficult for a common user to determine where from and how his computer system can be attacked. More often it could be a virus attack, internet worms , spam, causing a denial of service, restricted information theft and, finally, internal threats.
Example#2:
From: "Ruben" Add to Address Book
To:voelardo@yahoo.com
Subject:The Best Choice in Life
Date:Sun, 6 Mar 2005 07:54:03 +0800
Computers and computer networks create new categories of crimes that did not exist in the pre-computer age. While technology has advanced quickly, the law has not. New crimes often do not fit the parameters of the preexisting legal framework. The widespread use of computers has resulted in a new challenge for law enforcement- computer crime. A computer crime can be said to occur when a computer is the target of the offense, that is, when the actor’s conduct is designed to steal information from, or cause damage to, a computer or computer network. Some computer crime definitions also include cases in which the computer is an integral tool in committing an offense. For example, a bank teller might write a computer program to skim small amounts of money from a large number of accounts. Although this might constitute a computer crime, such conduct is prohibited by traditional criminal laws, and could be charged accordingly.
2. Discuss at least three other examples of computer crimes.
The three given examples are only a part of millions computing problems. Today, it is quite difficult for a common user to determine where from and how his computer system can be attacked. More often it could be a virus attack, internet worms , spam, causing a denial of service, restricted information theft and, finally, internal threats.
Example#1:
Former IT Manager of Software Firm Indicted on Computer Crime Charges
The United States Attorney's Office for the Northern District of California announced that the former Information Technology Manager of Creative Explosions, Inc., a Silicon Valley software firm, was indicted today by a federal grand jury on charges that he gained unauthorized access to the computer system of his former employer, reading email of the company's president and damaging the company's computer network. Creative Explosions, Inc., is based in Scotts Valley, California.
The indictment charges Roman Meydbray, 27, of San Jose, California, with two counts of unlawful access to stored communications and one count each of intentionally causing damage to a computer and unauthorized access to a computer, recklessly causing damage. An affidavit filed in support of a search warrant alleges that Mr. Meydbray deleted a domain page of Creative Explosions and made configuration changes to email servers that caused e-mail to be rejected.
According to the indictment, Mr. Meydbray was employed by Creative Explosions from November 2001 to November 7, 2003, originally as Information Technology Manager and then as Network Manager. Creative Explosions is a software development company that produces and sells software programs that enable users to create high quality multimedia websites. The indictment alleges that less than two weeks after the company terminated his employment, Mr. Meydbray gained unauthorized access into Creative Explosions' computer system to change passwords on email accounts, read email of its president, and intentionally and recklessly cause damage.
The maximum statutory penalty for the counts of unlawful access to stored communications and causing reckless damage on a computer is five years in prison. The maximum penalty for intentionally causing damage to a computer is ten years in prison. Each offense also carries a maximum fine of $250,000 or twice the gross gain or loss whichever is greater; a three year term of supervised release; and $100 mandatory special assessment. An indictment simply contains allegations against an individual and, as with all defendants, Mr. Meydbray must be presumed innocent unless and until convicted.
Mr. Meydbray is expected to make his initial appearance in February 2005 before a U.S. Magistrate Judge in San Jose, but a date has not been set yet.
The prosecution is the result of an investigation by the Federal Bureau of Investigation's Cyber Crime Squad in Oakland. The investigation was overseen by the Computer Hacking and Intellectual Property (CHIP) Unit of the United States Attorney's Office for the Northern District of California. Mark L. Krotoski is the Assistant U.S. Attorney from the CHIP Unit who is prosecuting the case.
A copy of this press release may be found on the U.S. Attorney's Office's website at www.usdoj.gov/usao/can. Related court documents and information may be found on the District Court website at www.cand.uscourts.gov or on http://pacer.cand.uscourts.gov.
All press inquiries to the U.S. Attorney's Office should be directed to Assistant U.S. Attorney Christopher P. Sonderby, Chief of the CHIP Unit, at (408) 535-5037, or Luke Macaulay at (415) 436-6757 or by email at Luke.Macaulay3@usdoj.gov.
SOURCE: http://www.usdoj.gov/criminal/cybercrime/cccases.html
The indictment charges Roman Meydbray, 27, of San Jose, California, with two counts of unlawful access to stored communications and one count each of intentionally causing damage to a computer and unauthorized access to a computer, recklessly causing damage. An affidavit filed in support of a search warrant alleges that Mr. Meydbray deleted a domain page of Creative Explosions and made configuration changes to email servers that caused e-mail to be rejected.
According to the indictment, Mr. Meydbray was employed by Creative Explosions from November 2001 to November 7, 2003, originally as Information Technology Manager and then as Network Manager. Creative Explosions is a software development company that produces and sells software programs that enable users to create high quality multimedia websites. The indictment alleges that less than two weeks after the company terminated his employment, Mr. Meydbray gained unauthorized access into Creative Explosions' computer system to change passwords on email accounts, read email of its president, and intentionally and recklessly cause damage.
The maximum statutory penalty for the counts of unlawful access to stored communications and causing reckless damage on a computer is five years in prison. The maximum penalty for intentionally causing damage to a computer is ten years in prison. Each offense also carries a maximum fine of $250,000 or twice the gross gain or loss whichever is greater; a three year term of supervised release; and $100 mandatory special assessment. An indictment simply contains allegations against an individual and, as with all defendants, Mr. Meydbray must be presumed innocent unless and until convicted.
Mr. Meydbray is expected to make his initial appearance in February 2005 before a U.S. Magistrate Judge in San Jose, but a date has not been set yet.
The prosecution is the result of an investigation by the Federal Bureau of Investigation's Cyber Crime Squad in Oakland. The investigation was overseen by the Computer Hacking and Intellectual Property (CHIP) Unit of the United States Attorney's Office for the Northern District of California. Mark L. Krotoski is the Assistant U.S. Attorney from the CHIP Unit who is prosecuting the case.
A copy of this press release may be found on the U.S. Attorney's Office's website at www.usdoj.gov/usao/can. Related court documents and information may be found on the District Court website at www.cand.uscourts.gov or on http://pacer.cand.uscourts.gov.
All press inquiries to the U.S. Attorney's Office should be directed to Assistant U.S. Attorney Christopher P. Sonderby, Chief of the CHIP Unit, at (408) 535-5037, or Luke Macaulay at (415) 436-6757 or by email at Luke.Macaulay3@usdoj.gov.
SOURCE: http://www.usdoj.gov/criminal/cybercrime/cccases.html
Example#2:
Internet Hoax
From: "Ruben"
To:voelardo@yahoo.com
Subject:The Best Choice in Life
Date:Sun, 6 Mar 2005 07:54:03 +0800
HELLO,Are you ready for some good news???Wanting to have your own business? How bout having your own onlinebusiness? Imagine this! My upline earned $1000 in 2 months time and is now averaging a thousand dollars a month!!! Amazing ? Because it's doneonline, you have the WORLD as your potential market. This is what you call real "OPPORTUNITY" So don't delay... the sooner you act, the sooner you can start enjoying the kind of financial reward that many Internet marketers are now experiencing. Don't miss this GREAT opportunity of being part of the ONE POWERLINESYSTEM!!!! You currently have 2 choices now, Its EITHER YOU go on with your normallife now, OR discover a new life while achieving your financial goals with just a click of the link below. It's your choice! It's your life… "Register for a free demo" (see details below) and discover the answers To the questions that are starting to build up in your mind now. PS. what's good about this is that it offers 30-day money back as long As you have not use their service. For complete details about this incredible offer, please SEND email toaddincome1@lycos.com with the subject "MORE INFO..." in the subject line with your personal info below.
First Name:
Last Name:
Country:
Thank you.Ruben If you have no need of owning online business or wish to not receivefurther emails, simply replies to this email with remove in the subjectline.
Example#3:
Internet Hoax
Date: ed, 19 Jan 2005 01:11:56 -0800 (PST)
From:"VICKY ELARDO" View Contact Details
Subject: will cry with laughter! Lol
To: "Roda Lopez" ohda19@yahoo.com
[This is a joke that is really funny and it works!]
An old lady walked into a Grocery Store.
She wanted to buy the best dog food in the world for her little puppy.
She went up to the cash register to buy the food.
The sales-lady told her that the store did not allow old ladies to buy animal food unless they show the actual animal because a lot of old ladies like to eat the animal food themselves.
So the old lady went home, got her dog and went back to the store to buy her dog food.
The next day she came back to buy the best cat food around But the Saleslady told her the same thing, so the old lady went back home and brought her cat to the Grocery Store to buy the cat food.
The next day the old lady went to the Grocery Store again carrying a big container. She went up to the sales lady and said, "Put your hand inside here". The Saleslady shook her head.. "NO", she said, "there is probably something in there that will bite me!" "I promise you that there is nothing in here that will bite you". the old lady said. So the Saleslady stuck her hand inside the container and screamed.
To find out what was inside the container you must send this to at least 10 people, when it says, your mail has been sent...instead of clicking OK, hit ALT-8 and the container will pop up on your screen.
From:"VICKY ELARDO"
Subject: will cry with laughter! Lol
To: "Roda Lopez" ohda19@yahoo.com
[This is a joke that is really funny and it works!]
An old lady walked into a Grocery Store.
She wanted to buy the best dog food in the world for her little puppy.
She went up to the cash register to buy the food.
The sales-lady told her that the store did not allow old ladies to buy animal food unless they show the actual animal because a lot of old ladies like to eat the animal food themselves.
So the old lady went home, got her dog and went back to the store to buy her dog food.
The next day she came back to buy the best cat food around But the Saleslady told her the same thing, so the old lady went back home and brought her cat to the Grocery Store to buy the cat food.
The next day the old lady went to the Grocery Store again carrying a big container. She went up to the sales lady and said, "Put your hand inside here". The Saleslady shook her head.. "NO", she said, "there is probably something in there that will bite me!" "I promise you that there is nothing in here that will bite you". the old lady said. So the Saleslady stuck her hand inside the container and screamed.
To find out what was inside the container you must send this to at least 10 people, when it says, your mail has been sent...instead of clicking OK, hit ALT-8 and the container will pop up on your screen.
8 Comments:
At February 18, 2013 at 9:01 PM,
Anonymous said…
Greetings! I've been reading your web site for some time now and finally got the bravery to go ahead and give you a shout out from Atascocita Tx! Just wanted to tell you keep up the fantastic work!
Also visit my weblog okamiworld.com
At February 25, 2013 at 7:00 AM,
Anonymous said…
Hi to every body, it's my first pay a visit of this blog; this weblog contains amazing and really excellent material for readers.
my weblog best hemorrhoid treatment
Also see my page :: hemorrhoid treatment
At May 12, 2013 at 6:26 AM,
Anonymous said…
Wе aге a grouρ of volunteers and stаrting a new ѕchеmе іn our communіty.
Your site provided uѕ wіth valuable informаtion to worκ on.
You've done an impressive job and our entire community will be thankful to you.
my web site ... chatroulette series
At May 12, 2013 at 8:45 PM,
Anonymous said…
I don't even know how I ended up here, but I thought this post was good. I do not know who you are but definitely you are going to a famous blogger if you are not already ;) Cheers!
My web page; ejaculation training
At May 24, 2013 at 9:15 PM,
Anonymous said…
I think that everything posted was actually very reasonable.
However, think about this, what if you composed a catchier
post title? I ain't suggesting your content is not good., but suppose you added a title that makes people desire more? I mean "MODULE 12 Activity 1 & 2" is a little boring. You ought to look at Yahoo's front page and
watch how they create article titles to grab viewers to open the links.
You might add a video or a picture or two to
grab people excited about what you've written. Just my opinion, it would bring your blog a little bit more interesting.
Look into my web page: Virility Ex Affiliate Program
At May 26, 2013 at 2:57 AM,
Anonymous said…
At this time I am going to do my breakfast, later than having my
breakfast coming yet again to read more news.
Have a look at my website male enhancement method
At May 26, 2013 at 5:58 AM,
Anonymous said…
Hello! This post couldn't be written any better! Reading through this post reminds me of my previous room mate! He always kept chatting about this. I will forward this post to him. Pretty sure he will have a good read. Many thanks for sharing!
Here is my page :: puercas.es0.net
At May 26, 2013 at 11:30 PM,
Anonymous said…
Hurrah, that's what I was looking for, what a information! existing here at this webpage, thanks admin of this site.
Have a look at my webpage buy meratol
Post a Comment
<< Home