LAWE 1600 Chapter 3 Computer Crime

vicinage

Traditionally, criminal statutes were predicated on the ________ of the criminal act.

interjurisdictional communication

The promise of anonymity coupled with the dearth of ________ encourages deviant activity.

traditional statutes

Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.

means

In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.

Morris worm

The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.

Legion of Doom (LoD

Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.

Phreaking

________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.

call-sell

Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.

Hacking

________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.

Insiders

________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.

Cyberpunks

________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.

Black market dealers

________ are the most organized groups trafficking in stolen computer components.

Data piracy

________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.