CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

Preview:

Citation preview

CptS 401, Spring2011 3/24/11

Chapter 5: Crime

See Dilbert cartoons about crime:http://dilbert.com/strips/comic/2009-09-18/

http://dilbert.com/strips/comic/2009-05-12/

1

CptS 401, Spring2011 3/24/11

Announcements

• Video scene assignment is posted• Tutorial on iMovie and Final Cut Pro will be

held a week from today (March 31) at 4:15 in Avery Microcomputer Lab– More info and sign-up sheet on Tuesday

• Midterm exam grades posted on Monday (will be curved)

2

CptS 401, Spring2011 3/24/11

Reading Quiz on Ch. 5

• Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6• Please put all materials away except for cheat

sheet.

3

CptS 401, Spring2011 3/24/11

Quiz Question 1

A hacker can be described asA. a programmer who writes clever or elegant

codeB. someone who breaks into computers without

authorizationC. someone who modifies web sites to make a

political statementD. All of the aboveE. None of the above

4

CptS 401, Spring2011 3/24/11

Quiz Question 1 Answer

D. All of the above

All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).

5

CptS 401, Spring2011 3/24/11

Quiz Question 2

In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site:A. Zombie attackB. Love Bug attackC. Denial-of-service attackD. None of the above

6

CptS 401, Spring2011 3/24/11

Quiz Question 2 Answer

C.

See p. 260.

7

CptS 401, Spring2011 3/24/11

Quiz Question 3

The Computer Fraud and Abuse Act (CFAA) of 1986A. applies to activities performed on computers

connected to the internetB. applies to activities performed on private

computers not connected to the internetC. applies to computers in foreign countriesD. None of the aboveE. All of the above

8

CptS 401, Spring2011 3/24/11

Quiz Question 3 Answer

A.

See p. 265

What does the CFAA address?

9

CptS 401, Spring2011 3/24/11

Quiz Question 4 (Extra Credit)

Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S.A. TrueB. False

10

CptS 401, Spring2011 3/24/11

Quiz Question 4 Answer

B. False

The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.

11

CptS 401, Spring2011 3/24/11

Quiz Question 5

In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites:A. PhishingB. PharmingC. SpywareD. All of the aboveE. None of the above

12

CptS 401, Spring2011 3/24/11

Quiz Question 5 Answer

B. Pharming

See pp. 274-275.

What is a DNS? Is Pharming easier than Phishing?

13

CptS 401, Spring2011 3/24/11

Quiz Question 6

Biometrics areA. the unique biological characteristics of a specific

group of people, such as blood type or hair colorB. the unique biological characteristics of a specific

individual, such as fingerprint, eye patterns, or DNA.C. the unique measurements of an individual, such as

height, weight, or arm length.D. All of the aboveE. None of the above

14

CptS 401, Spring2011 3/24/11

Quiz Question 6 Answer

B.

Can biometric scanning devices be tricked? Why or why not? (Discuss with team.)

15

CptS 401, Spring2011 3/24/11

Quiz Question 7

The purpose of the so-called Cyber-Crime Treaty is toA. help law enforcement agencies in different

countries cooperate in the prosecution of cyber crimes.

B. standardize the laws against cyber crimes in different U.S. states.

C. toughen existing international laws against cyber crimes.

D. None of the above

16

CptS 401, Spring2011 3/24/11

Quiz Question 7 Answer

A.

See p. 291.

What is a dual-criminality provision? What are arguments for and against such a provision?

17

CptS 401, Spring2011 3/24/11

Quiz Question 8

Providers of services and information must make sure that their material is not accessible in countries where it is illegal—this principle is known asA. “authority to prevent entry”B. “responsibility to prevent access”C. “responsibility to regulate content”D. “mandate to block access”E. None of the above

18

CptS 401, Spring2011 3/24/11

Quiz Question 8 Answer

B.

See p. 293

What prominent court case have we studied that assumed this principle?

19

CptS 401, Spring2011 3/24/11

Quiz Question 9

The “authority to prevent entry” principle states thatA. information providers must prevent their materials from

being accessible in countries where the materials are illegal.

B. individuals are solely responsible for blocking access to materials they find personally objectionable.

C. governments may block access to material that is illegal in their country, but may not prosecute the providers of such material if the material is legal in the country in which it is produced.

D. None of the above

20

CptS 401, Spring2011 3/24/11

Quiz Question 9 Answer

C.

See p. 299

Do you think“responsibility to block access” or “authority to prevent entry” is a better policy? Why?

21

CptS 401, Spring2011 3/24/11

Question 10

Whereas Ch. 5 of the book focuses mainly on , Mike Gaffney’s guest lecture focused

mainly on .A. Cybercrime, Computer-Aided DispatchB. Cybercrime, Crime detectionC. Cybercrime, Crime preventionD. Cybercrime, Use of technology to identify,

investigate and prosecute crimesE. None of the above

22

CptS 401, Spring2011 3/24/11

Quiz Question 10 Answer

C.

(I hope anyone who was here on Tuesday got this right. )

23

CptS 401, Spring2011 3/24/11

Update: Use of Lab Files Showed More than 100 Baseball Players Used Steroids

• On p. 289, the book mentions a well-known case involving the potential release of information on players who, according to lab files, used steroids

• The original search warrant was for 10 specific players, yet the law enforcement agents wanted to release info on 100 players who used steroids.

• How was the case settled? Let’s look:http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story

24

CptS 401, Spring2011 3/24/11

Discussion Exercise: Use of Car vs. Computer (Clicker)

5.8, p. 300: A friend logs on to your computer at night while you are asleep and uses some of your software. Another friend takes your car at night and drives it around for a while. (Neither has your permission; neither does damage.) List characteristics (ethics, legality, risks) of the two events that are similar and different. Which would offend you more?A: A friend using your computer softwareB: A friend driving your carC: Both would offend me equallyD: Neither would offend me

25

CptS 401, Spring2011 3/24/11

Discussion Exercise:Stance with Respect to Break-Ins (Clicker)

Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why?A: Young hackers’ positionB: Ken Thompson’s positionC: NeitherD: Not sure

26

CptS 401, Spring2011 3/24/11

Discussion Exercise:Surveillance Software to Monitor the Web (Clicker)

Ex. 5.22, p. 301: Commenting on constitutional objections to the SEC’s plan to use surveillance software to monitor the Web for possible fraud (Section 5.5.1), an SEC offical said “the Consitution doesn’t give people the right to use the Internet to commit fraud.” Evaluate this response. Is it a good argument?A: YesB: NoC: Not sure

27

CptS 401, Spring2011 3/24/11

Discussion Exercise:Computer Virus a Crime? (Clicker)

Ex. 5.15, p. 300: Evaluate arguments in favor of and against passage of a law making the writing and publication of a computer virus a crime. (See Section 5.2.4.) Would you support such a law? Why?A: Yes, I would support such a lawB: No, I wouldn’t support such a lawC: I’m not sure

28