vicinage
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
interjurisdictional communication
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
traditional statutes
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
means
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
Morris worm
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
Legion of Doom (LoD
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
Phreaking
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
call-sell
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
Hacking
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
Insiders
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
Cyberpunks
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
Black market dealers
________ are the most organized groups trafficking in stolen computer components.
Data piracy
________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.