Extra Info - CJ and the WWW Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Another way to combat revenge porn is through _________ law, suing for emotional distress (one firm in Pittsburgh, K&L Gates, did pro bono work with 50 attorneys to combat this through copyright protection law)

civil

Many behaviors that have been identified as cybercrimes are not actually crimes but instead invoke ______________ remedies

civil

Along with criminal statutes in some states, some states are allowing victims of sexting to seek out financial punishment through:

civil penalties

Means of stealing telephone services are diverse, including the ____________ of cell phones and counterfeiting of phone cards

cloning

A crime is understood when the offender's _____________ is revealed

motivation

_______________ engineering is a method in which cybercriminals make a direct contact with you through phone calls, emails, or even in person. Basically, they will also act like a legitimate company as well. They will befriend you to earn your trust until you will provide your important information and personal data.

social

When a cybercriminal makes direct contact with you through phone calls, emails or even in person, and trick you into revealing information by earning your trust, they have engaged in:

social engineering

______________ _______________ involves illegal duplication of original content, including songs, books, movies, albums, and software. This is a crime as it translates to copyright infringement. Due to this, companies and developers encounter huge cut down in their income because their products are illegally reproduced.

software piracy

Electronic impersonation, aka ________________, involves fraud, criminal conspiracy, harassment and vandalism

spoofing

The government and law enforcement have become more proactive about revenge porn, classifying it as cyber bulling, cyber harassment, and cyber _________

stalking

In what three ways has the Internet impacted criminal/harmful activity?

1. As a vehicle for commnication for harmful activity (ex. drugs trafficking, hate speech, stalkingetc.) 2. As a transnational environment which presents new opportunities for illegal activities 3. Through the nature of the digital environment, which acts independently of time and space, it has engendered unbounded forms of harmful activity (ex. unauthorized imagery, software, etc.)

What are the two related strands of cyber piracy in re intellectual property/Internet real estate?

1. Counterfeiting products and merchandise and using the web as a distribution network 2. [blurs the lines between criminal and civil law] When owners' interest in their properties are threatened by theft or by their release into the public domain

Which case partially overturned the Communications Decency Act?

ACLU et al. v. Reno, 1997

The Child Online Protection Act was struck down in the case:

Ashcroft v. American Civil Liberties Union

From early 2011, Ross Ulbricht, aka ______________, administered the hidden services website Silk Road as a massive illegal marketplace. This proved the viability of a large-scale TOR-based online marketplace for illegal goods.

Dread Pirate Roberts

Companies can do the following to be secure from digital extortion attacks:

Educate employees and officers on how to recognize digital extortion attempts. Have contingency communication channels and plans for official financial transactions in case of staff unavailability. Always verify identities of business contacts through trusted secondary sources. Deploy security solutions for all online technologies used in business. Apply critical patch updates to all software as soon as they are available. Adopt security strategies and solutions to comply with global data protection initiatives and regulations.

A Snuff film has never been found by the

FBI

Macchione met his victim, Pratt, or at least introduced himself as which of the following?

Fellow student from college class

What is a general term used to described a cybercrime that intends to deceive a person in order to gain info?

Fraud

Cyber punks

Hackers who are anti-establishment and intentionally cause harm to targets that offend them

Utopians

Hackers who naively believe that they are contributing to society by demonstrating its vulnerabilities

What involves the partial or complete acquisition of certain functions within a system, network, or website?

Hacking

________________ compile personal information about targets such as police officers from the internet or government record breaches and post it online, which is called "doxing" (a derivative of "docs," slang for documents)

Hacktivists

Correlation analysis

Identifying top features having a strong relationship with the target variable

__________________ _______________ is a specific form of fraud in which cybercriminals steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information.

Identity theft

Under existing law which of the following charges might be pursued in cases in which subjects encourage someone to commit suicide through text.

Involuntary Manslaughter

Billow v. AL, Diachenco v. DA in Mass.

Michelle Carter

Students at a school in _________________ were punished for wearing "I (heart) Boobies!" bracelets as part of a breast cancer awareness campaign when they were told to take the bracelets off, they refused and their parents sued

Pennsylvania

The first legislation to address the prohibition on child pornography was the:

Protection of Children against Sexual Exploitation Act

In which case did hackers illegally obtain access to Scotland Yard's phone network and made 620k euros worth of international calls for which the above-referenced was responsible?

Tender and Nutall, 1996

When Pratt initially went to the police they seemed to dismiss her claims because she said that:

That he did not know where she lived

In the presentation on "How Eurpose Censors What Americans Say Online" an example is used showing how ____________ used terms of service and DMCA violation claims to shut down 4000 critics.

The Church of Scientology

Which of the following is true according to the week's readings as the law relates to obscene materials.

The law does not protect obscene materials as Free Speech

Outlier detection and fixation

The top 1% were identified for having outliers or extreme values

Sexting could perhaps best be described as which of the following:

the transfer of images and videos of nudity or sexual provocative activity between teens

Cybercrime, specifically hacking, roughly started in the

1960s

Telecomics is not

Anonymous

______% of Americans are believed to use social media as a means of obtaining their news.

68

In 2016 the top-related crimes were non-payment/delivery, personal data breach, and ___________

payment scams

Data audit

comprehensive first look at the raw data for initial data exploration

What has shaped the public debate over cybercrime and heightened its overall newsworthiness?

media sensitization of the Internet

Conservative estimates put the cost of cybercrime at approximately _______ billion annually. With more than 60 million residents in North America having online banking facilities, the cost to the USA alone of cyber crimes is estimated not in the million, but billions (latest estimates put this cost as high as $5 billion annually).

$50

Why do cybercrimes present a significant challenge for criminologists?

​cybercrimes defy long-held assumptions about the cause of crime

Approximately ____ percent of all cyber crimes are reported; and of those that are actually reported, less than two percent end up in some form of conviction on the part of the cyber criminal.

10

Sexting can lead to a jail sentence of up to ____ years and a place on the sex offender registry

10

According to chapter three in the course textbook copyright infringement (digital piracy) costs American industry more than _________ in 1996 alone.

10 billion dollars

According to this week's materials more than ____ states now have laws against revenge porn.

12

More than ____ states now have laws against revenge porn (about 15 have made it a crime)

12

According to the video "Internet Watch Foundation 20th Anniversary" the IWF is working with more than ______ international members from the Internet Industry across the world.

130

Only about ____ percent of fraud victims report the crime to law enforcement

15

In ______ Pope Paul IV provided the Roman Catholic Church's first list of banned books, several of which were banned for depictions of pornography.

1557

According to Dr. Warner there are _____ numbers of victims of cybercrime every second:

18

The first softcore pornographic film was released in:

1899

Tech Model Railroad Club is founded at the Massachusetts Institute ofTechnology in _________. The word "hack" was originally used at MIT to describe elaborate college pranks.

1946

In texting suicide case, Michelle Carter was sentenced to _____ years but allowed to stay free on probation while she appealed the case

2.5

The Internet Crime Complaint Center (1C3)was established in __________ to receive public complaints of internet crime

2000

The Internet Crime Complaint Center (IC3) was established in _____ to receive reports of Internet crime from the public:

2000

In 2017 Germany passed a law that required Facebook and other social media websites responsible to remove hate speech within _____ hours of notification or face civil fines.

24 hours

Since 2011, the IC3 has received about ______ reports annually

280k

Calkin said his group tracked 65 hacktivist incidents involving state and local governments in 2015; the number jumped to 160 last year. And a 2014 survey of state information technology security officials listed hacktivism as one of their top _____ cyber concerns.

3

Since its establishment, the IC3 has received over ___ million complaints

4

For his behavior Macchione was convicted and sentenced to ________ years for cyber stalking.

4 years

The US receives an estimate of ____B robocalls yearly

48

The history of pornography shows that the first example of pornographic art appears to have come from:

5200 BCE

One Superior Court judge, when tasked with uncovering an answer to the question of technology, discovered some compelling results. After surveying jurors over several months of complex criminal trials, the judge found that ____________ responded positively to the inclusion of technology.

72% or greater

In 2010 Anon. protested Motion Picture __________ of America

?

What eventually led to Macchione's arrest?

An officer spotted him with a backpack and camera

Cyberpiracy

Appropriation of new forms of intellectual property that have been created or popularized within cyberspace

Intellectual property such as trademarks, domain names and character merchandise have become the intellectual _______ _______ of the web

real estate

Between the years of 2009 and 2016 the cybercrime network ___________ grew into one of the world's most sophisticated syndicates of criminals who specialized in a variety of cyberfrauds.

Avalanche

According to Dr. Gary Warner in his TedTalk he was the victim of which of the following crimes:

Bank Account Fraud/Theft

Which case explored the issue that although some cyber violates is equated with hate speech, the fact that it is "speech" guarantees protection in the US and Canada?

Becker et. al, 2000

It is difficult to prosecute and control Internet pornography because:

​federal legislation has been successfully challenged in the courts under the First Amendment.

[Federal legislation] The ___________________ deals with spam unsolicited e-mailing, in particular fraud related activities

CAN-SPAM Act

SNA based model on these factors

Caller number, called number, call duration, target variable (list of churned subscribers)

The first legislation to address the transportation, distribution or receiving of child pornography via computer was the:

Child Protection and Obscenity Enforcement Act

Child sexual abuse images is another term now used for:

Child pornography

Supreme Court child porn law

Child pornography, a form of sexual expression often involving the depiction of children engaged in sexually explicit conduct, is not entitled to First Amendment protection. It is similar to obscenity in that it represents a category of sexual expression lacking First Amendment protection, but it covers material that does not meet the legal definition of obscenity.

According to the data released by the Ministry of Public Security, during the decade between 2006 and 2016, telecommunication fraud cases in ____________ have been growing at a rapid rate of 20% to 30% every year, which have been grown rapidly especially in the past 5 years. According

China

In 2008 Anonymous started to prank and hack the

Church of Scientology

Marjorie Heins was part of the ACLU team which overturned part of the _________________ Decency Act of 1996

Communications (CDA)

The now-discredited Carnegie Mellon survey which stated that as much as half of web use may be related to porn steered the debate which led to the passage of the _____________ act (47 USC xs.223)

Communications Decency Act

The primary federal statute that regulates the abuse of computer systems is known as the:

Computer Fraud and Abuse Act

[Federal legislation] _________________- as the name suggests, the act provides against computer fraud and abuse

Computer Fraud and Abuse Act

________________ is one of the most popular methods of hacking. It temporarily or completely interrupts servers and networks that are successfully running. When the system is offline, they compromise certain functions to make the website unavailable for users. The main goal is for users to pay attention to the attack, giving hackers the chance to hack the system.

DDoS or the Distributed Denial of Service

There is a Convention on _____________ that a number of nations have become signatories to. Questions do, however, remain over whether or not this is toothless in the fight against cybercrime.

Cybercrime

Cyber deceptions/thefts

Different types of acquisitive harm that can take place within cyberspace

____________ ______________ is the act of coercing an individual or organization to pay in exchange for gaining back access to stolen cyber assets. The assets may be anything that directly ties in to the victim's personal information, business operations, or financial interests. Examples of these include document files, database files, access to servers, etc.

Digital extortion

On February 9, 2017 President Trump issued an executive order on ____________________________ that reaffirms the commitment of the US to address the scourge of transnational organized crime and protect communities from its influence.

Enforcing Federal Law with Respect to Transnational Criminal Organizations and Preventing International Trafficking

When the Supreme Court has been asked to consider issues of legality as it relates to obscene matter the ______ Amendment has been the one they referred to most often.

First

Prior to the Miller decision the Supreme Court decided the _______ decision, which upheld a law forbidding the sale of pornographic materials to minors.

Ginsberg v. New York

Anonymous hacked BART system after BART shut down the internet and subway systems, and ___________ talked about Anonymous

Gabriella Coleman

In the Jacobellis v. Ohio decision the Supreme Court Justice Potter Stewart claimed __________ when he was discussing identification of hard-core pornography.

I know it when I see it

The _________________ (IWF) is an independent non-profit organization that works to stop the revictimization of child sexual abuse victims.

Internet Watch Foundation

What is a hindrance to the study of cybercrime?

Lack of officially recorded statistics

Churn prediction model initially evaluated traditional

algorithms

The ________ test is used to determine obscene materials.

Miller test

Missing values

Missing values were replaced with 0s

Edward Snowden's effort to warn the public about the _____________ is discussed within the context of espionage but could be included as governmental cyberspying.

NSA spying program

In the 1982 court case ________ the courts held that child pornography can be prohibited - both production and distribution - because of their direct link to the sexual abuse of minors.

New York v. Ferber

The German law passed in 2017 forced Facebook, Twitter and Twitter remove the following within a certain time frame or receive civil fines:

all of the above defamatory/fake news hate speech "illegal content"

The Internet Watch Foundation fights child sexual abuse images by working with which of the following?

all of the above law enforcement governments online industry

_________ ________ allow thieves to nearly build their own criminal telecim infrastructure and route it across various phones, because people implicitly trust their ________ ________. This allows fraud to be executed against a carrier in another country

SIM cards

Data balancing

Random selection of entries from active customers; balance ratio of subscribers for churn v. active subscribers

In which cases were the investigations passed from the US to UK police because the former believed the latter were more likely to gain a conviction?

R. v. Arnold and R. v. Fellows, 1996

In which case did Vladimir Levin use a computer in his employer's office in St. Petersburg, Russia, to authorize transfers of funds from Citibank?

R. v. Governor of Brixton Prison; Ex parte Levin, 1996

Hate speech in re specific social, political, or religious groups was addressed in the case ____________

R. v. Zundel (1992)

Which case dealt with Holocaust denial?

R. v. Zundel, 1997

Users and public individuals can mitigate most digital extortion attacks by doing the following:

Refrain from posting too many details on social media. Avoid taking compromising or embarrassing pictures and saving them in an online archive or storage service, as these may be hacked by cybercriminals. Secure devices, accounts, and computers with strong passwords and security software. Report all instances of digital extortion to the proper authorities. Refuse to cooperate with the extortionist's demands. Seek the help of social network staff for harassment and smear campaigns on social media.

__________________ is a veteran ethical hacker with already a decade of experience, hacking the likes of Marktplaats, Linkedin, Indigogo and more

Ruben van Vreeland

Churn

Subscriber who leaves a phone service and goes somewhere else

Cyber stalking

The persistent tracking and harassment of an individual by another

Cyber trespass/hacking/cracking

The unauthorized crossing of the boundaries of computer systems into spaces where rights of ownership or title have already been established

Cyber violence

The violent impact of the cyberactivities of another upon an individual or a social or political grouping (ex. stalking, hate speech, tech talk?)

Snuff film

When someone films and eventually kills a person

In the I <3 Boobies case, Judge Marjorie Rendell of the U.S. Court of Appeals for the Third Circuit likened the freedom of speech issue to the _____________ protest. We have the kind of speech on the issue of public concern

Vietnam

_______ conceals a user's location from surveillance or analysis by directing internet traffic through a network of servers.

Tor Browsers

Which case showed the flexibility of the borderline between threat and nuisance in re stalking? (Jake Baker)

US v. Alkhabaz, 1997

In which case did prosecutors "forum-shop" for a site they felt a conviction would be best secured and chose TN rather than CA?

US v. Robert A. Thomas and Carleen Thomas, 1996

In 2010 Anonymous hit Paypal and Mastercard after they stopped accepting donations to ___________

Wikileaks

Peter Fein -- programmer and hacktivist said that he stumbled upon Anyonymous and helped organize protests for __________

Wikileaks

According to the author of chapter three in the course textbook, much digital crime takes place simply because of the absence of:

a capable guardian

In Chapter Two of the text provides several recommendations for dealing with the everchanging nature of cybercrime. The first recommendation is:

a dedicated funding stream be established to focus science and technology on crime reduction

Child pornography is often defined as:

a form of sexual expression often involving the depiction of children engaged in sexually explicit conduct

Which of the following must be present for something to be considered as obscene according to Miller v. California (1973):

all of the above must be present the average person in the community would find the work's predominant theme "prurient" it depicts sexual conduct in a patently offensive way when taken as a whole the item "lacks serious literary, artistic, political, or scientific value"

Given the diversity of digital crime, it is said that it is not surprising that the motives are as old as human society such as:

all of the above: greed, lust and curiosity

According to the textbook the term cybercrime means nothing more than:

any harmful behavior that is somehow related to a computer

A crime is solved when someone to ____________ is found

blame

Jobs and Wozniak were known to sell ______, which were illegal devices used to generate the tones telephones once used to switch long distance calls; these devices allowed user to make free long distance calls.

blue boxes

Which of the following is not considered to be a form of cyber trespasser (also referred to as a hacker/cracker)?

both a cyber-spy and cyber-terrorist are examples

According to the article "How Courtroom Technology has Revolutionized Criminal Cases" which of the following were discussed as the explanation for people having a greater understanding of how technology is involved in the use of collecting evidence.

both of these were discussed popular culture's obsession with true crime longstanding interest in crime and investigation tv shows

According to the Supreme Court decision that prohibited banning certain forms of "virtual child pornography" allowing such prohibitions would make which of the following illegal when it does not meet the requirements to do so:

both the movie American Beauty and the movie (and book) Romeo and Juliet would be banned

One of the techniques the Avalanche group employed was the use of _________ to cripple competitors by flooding their websites with data requests; often without the owners of the compromised systems even realizing their machines were involved.

botnets

_______________ are controlled by remote attackers called "bot herders" in order to attack computers by sending spams or malware. They usually attack businesses and governments as botnets specifically attack the information technology infrastructure.

botnets

Scientists assert that this is a promising technique for determining a suspect's guilt, as it can detect when a person is lying with 70 to 90 percent accuracy?

brain imaging

Sexting has long been linked to the controversial legal issue of:

child porn

The Internet Watch Foundation (IWF) uses the term _______ in places of child pornography.

child sexual abuse images

Revenge porn is defined as an image or video that is intimate that has been posted with malicious intent without the victim's _____________

consent

According to Stanford Law Professor and former Google attorney Daphne Keller tech giants are facing increased pressure to clamp down on:

content

At the time of the Michelle Carter case, no other internet case had resulted in a homicide ____________

conviction

Cyber piracy or spying/terrorism is typically directed toward the ____________ entity

corporate

International telecommunications fraud is a broad category which encompasses everything from consumer scams to ______________ rip offs and costs over $____ billion per year

corporate, 33

In the video concerning Patrick Macchione clips were shown that would best be described as:

cyber stalking

_______________ - where criminal gangs threatened to close down internet-based businesses if protection money was not paid. Worse still, threats can also be made to infiltrate the businesses security system to access financial or personal information stored therein that may then be used for financial gain

cyber-extortion

___________________ is a term of language used to describe "criminal activity that utilizes an element of a computer or computer network".

cybercrime

_______________ involves following a person online anonymously

cyberstalking

The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:

cyberterrorism.

The _______ consists of areas of the web that are accessible only through the use of specialized browsers, such as a TOR browser, and utilize non-recognizable web addresses that are readable only by those browsers:

dark web

A ________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent user access to the service.

denial-of-service attack

"The struggle around the definition of crime and _____________ is located within the field of action that is constituted by plural and even conflicting efforts at producing control"

deviance

_______ is the act of coercing an individual or organization to pay in exchange for gaining back access to stolen cyber assets

digital extortion

The term ________________ is used in intellectual property law to describe the reduction in value caused by unrestricted use

dilutionTh

In I <3 Boobies, there was also the issue of _______________ in the schools and whether the phrase was potentially lewd (judges in the court of appeals disagreed on this)

disruption

In one of your assigned readings the Supreme Court was asked to consider the legality of a Kentucky law on ________, which made it a crime to speak to a school employee in a way that interferes with school functions.

disruptive speech

"State of Surveillance" examines new technologies police departments are using to fight crime and the civil liberties concerns raised by these tools. Law enforcement agencies say that many of the technologies make it easier to solve and, in some cases, even prevent crime. But privacy advocates warn that expanded databases could become ________ that are increasingly populated with information about law-abiding citizens.

dragnets

Shoplisting is a type of ___ fraud that involves purchasing or finding legitimate retail receipts, stealing the products listed on the receipts, returning the items to the retailer for store credit or a gift card, and then selling the gift card on the Internet at a discount for quick cash.

e-tailing

Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.

economic

On the Social Network Analysis graph, caller and called number were presented as nodes duration of calls as the weights of the

edges

Courts that have begun to include the use of interactive flat screen displays, webcasted testimony, use of dual screens that present several documents to the jury at once and even personal screens for each juror in the jury box, are being referred to as:

electronic courtrooms

Digital ________________ is one of the most profitable ways a cybercriminal can profit

extortion

Of the 16 Most Common Types of Cybercrime Acts Discussed, which was listed first (and perhaps most common):

fraud

____________ has many guises on the internet, from the famous e-mails promising millions in advance fees to the sale of unmarketable quality goods. What is usually fairly consistent is an unsolicited e-mail approach by the fraudster to their victim.

fraud

A ______________ is a principled tresspasser while a cracker is an _________________ tresspasser

hacker, unprincipled

_______ is the blending of hacking and activism.

hacktivism

A _____________________, or ethical hacker. has resurrected the original ethods of hacking in order to resist global capitalism

hacktivist

Prepaid church

high diversification in segments; customers generate outgoing revenue activity for limited time; subscribers resumed services after extensive promo offers

______________ ___________ is where the cyber criminal steals their victims identity and then transacts, usually via the Internet in the name of the victim. More often than not this will include and element of credit card fraud.

identity theft

Cases involving stalking or theft are focused on the ___________ while cyberpiracy or cyberspying/terrorism are typically directed toward a corporate entity

individual

Subscriber church was largely affected by __________ __________

influential peers

__________________ - no prior approach is made to try and extort protection money and a computer network is infiltrated with the purpose of obtaining information relating to the users, whether they be an individual user of business

information theft

In parallel to the growth of the Internet, there has been an increase in the number, complexity, and application of ___________ ____________ laws relating to trademarks, copyright, patents and (USA) privacy and publicity laws

intellectual property

Currently there is little or no _____________ legislation that contains criminal defense mechanisms against cyber crimes. There are, however, a few multi-jurisdictional legislations, such as those in found within European Union law.

international

Nearly 50% of adults have used their mobile device to share or receive ______________ content

intimate

Cyberspace abounds with ________________ opportunities such as stocks and bonds to coconut farming, the sale and leaseback of automatic teller machines and worldwide telephone lotteries

investment

Michelle Carter (boyfriend's suicide case) was found guilty of

involuntary manslaughter

The trans-_______________ nature of cybercrime creates many problems for law enforcement

jurisdictional

In the Miller decision the court ruled that a jury in an obscenity case should be held to a ____________ standard and not a ___________ standard

local; national

__________________ is the method of filling websites with advertisements carrying malicious codes. Users will click these advertisements, thinking they are legitimate. Once they click these ads, they will be redirected to fake websites or a file carrying viruses and malware will automatically be downloaded.

maladvertising

Traditional clustering algorithms are used as based

models

There is no ______________ revenge porn law

national

Routine activity theory suggests that crime will occur when a motivated ______________ and suitable victim coincide in the absence of a capable ______________

offender, guardian

Loverspy is known as:

one of the most damaging cyberspying programs ever.

Given the fact that naked photos could appear innocently, such as a breastfeeding woman or pictures in literature, a national revenge porn law would be _______________ and end up offending the First Amendment

overbroad

_________________ act like a legitimate company or organization. They use "email spoofing" to extract confidential information such as credit card numbers, social security number, passwords, etc. They send out thousands of phishing emails carrying links to fake websites. Users will believe these are legitimate, thus entering their personal information.

phishers

Both ____________ and the more recent ______________ is obtaining financial information, such as bank account records or credit card details, by sending what look like authentic messages to the recipient informing them they need to comply with certain procedures to reactivate their account. Once the information has been obtained, the criminal then defrauds the victim.

phishing, vishing

The "_____________ phreakers" of three decades ago set a precedent for what has become a major criminal industry, and the market for stolen communications services is now large

phone

Individuals who engage in the theft of phone services are referred to as:

phone phreakers

According to the readings in week two the term hack originally referred to a:

practical joke

Early churn/fraud detection

pre-processing deduced that 670k or 18 percent of subscribers had 0 activity during first week; identified after preprocessing of data

Carter case - court considered a balance between rehabilitation and a promise of its success and a

punishment

Currently, the bulk of digital extortion is done with ___________________ attacks.

ransomware

_____________ is one of the most destructive malware-based attacks. It enters your computer network and encrypts files and information through public-key encryption.

ransomware

Admin of sites with revenge porn commit extortion by contacting the people whose pictures are on the site and asking them for money to

remove them

LULSECZ (offshoot of Anonymous) went on a 50 day rampage where they hacked many corporate and gov websites, then

retired

In cyberspace, ____________________ can be done by offering computer repair, network troubleshooting, and IT support services, forcing users to shell out hundreds of money for cyber problems that do not even exist. Any illegal plans to make money falls to _________________ (same word)

scamming

________________ uses electronic messaging systems, most commonly emails in sending messages that host malware, fake links of websites, and other malicious programs. It is very popular through email. Unsolicited bulk messages from unfamiliar organizations, companies, and groups are sent to large numbers of users. It offers deals, promos, and other attractive components to deceive users.

scamming

In order to avoid digital extortion companies are encouraged to:

secure devices, accounts, and computers with strong passwords

Computer worms are similar to viruses except that they use computer networks or the Internet to:

self-replicate.

Dr. Gary Warner closes his presentation by saying that he wants us to change the way that we handle cybercrime but in the meantime you can:

send the evidence to him to connect the dots

Post paid churn

subscribers have high outgoing call revenue with high total recharge but network age days are low; these subscribers were not part of the general postpaid base

The new phenomenon or form of cyber "entertainment" called ______ involves the use of spoofing technology to call 911 in order to fake a critical emergency, such as a hostage situation, that draws a real-life response from law enforcement.

swatting

According to your assigned readings most telecom crime is addressed by ________, which creates a sense of isolation and fewer arrests and investigations.

telecom companies themselves

Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?

the Counterfeit Access Device and Computer Fraud and Abuse Law of 1984

The basis of Dr. Warner's presentation is that many cybercrimes may be difficult to investigate and prosecute because:

the crimes travel across state lines making prosecution expensive and time consuming

In cases that revolved around encouraging someone to commit suicide which of the following has been raised as a strong defense:

the idea of causation and lack of proof of causation

Following the Pope decision the courts now generally use a ______ standard when determining whether an otherwise obscene work has erious literary of political value.

the reasonable person standard

The Internet Watch Foundation (IWF) does not use the term child pornography because:

the term acts to legitimize sexual abuse of children and not pornography

Cyberterrorism is more efficient and less dangerous than more traditional forms of terrorist activity because:

there is no need to infiltrate enemy territory.

One example provided of how attempts to regulate terrorist speech have gone astray was the discussion of how tech companies deleted evidence of ________ in Syria while using a hash database of terrorist-related terms.

war crimes

T/F According to Daphne Keller users of social media in the United States may be unconstitutionally constrained in their posting because of European rules that require stricter speech regulation on social media platforms.

true

T/F The European Union is experimenting with having online social media companies remove hate speech under the provisions of their Terms of Service agreements.

true

T/F The author of chapter two in the text claims that the thinking on crime reduction must be incorporated into the mainstream of central government decision-making.

true

T/F Under the Pope decision juries are instructed to consider whether comic books (or other works) have merit in society that values the First Amendment

true

Macchione disputes his conviction to this day and claims that he was not a cyber stalker but instead he was guilty of:

typing under the influence

Guardianship against conventional crime involves preventative efforts on the part of prospective ____________, contributions by members of the general public or commercial third parties, and the activities of law enforcement agencies

victims

Many consider hactivists to be equivalent to _________ because they are looking to disrupt but often have a sense of purpose associated with their attacks.

vigilantes

______________ infect and destroy computers, networks, and systems and can spread through removable devices and the internet.

viruses

Large scale voice phishing is referred to as:

vishing

Voice phishing is considered _________, and a hacker will call you and attempt to get you to provide information that they use to engage in criminal or delinquent acts.

vishing

There are two separate and distinct elements to cybercrime. On the one hand you have an element of exploiting _________________ in the computer operating system or computer network. On the other hand you have an element of exploiting ____________ __________ of a computer network, whereby a criminal makes use of the computer network to infiltrate the trust of other users of that computer network for profit or gain.

weaknesses, social fabric

Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?

when it causes serious harm to a computer or network

Two problems arise in the prosecution of telecommunications offenses which have an inter-jurisdictional aspect: the determination of ____________ the offense occurred and obtaining _______________ and ensuring the offender can be located and tried

where, evidence

In State of Surveillance: Police Privacy and Technology, the presenters talk about technology that allows them to record activity throughout an entire city and then later review that footage for possible evidence of crime; they refer to this approach as:

wide area surveillance


Ensembles d'études connexes

Absolutism and Constitutionalism

View Set

§99 KFG -Beleuchtung, §101 KFG -Beladung, §106 KFG -Personsbeförderung

View Set

NP Ch 38 Oxygenation and Perfusion

View Set

Chapter 17 Plate Tectonics Review

View Set

Saunders NCLEX Review Pharmacology Musculoskeletal Medications

View Set

Chap:5 How do neurons used electrochemical signals to communicate and adapt?

View Set

ATI questions cardiovascular system

View Set