NAME_______ SECTION:____001__________ Activity #2 “Criminals in Cyberspace” Video Questions Write complete sentences for credit! 1. What is “Michelangelo”? ANS/ Where did it hit the hardest? It is a nickname for a computer virus. It is described as a lowdown work of sabotage that could potentially wreck millions of computer programs and is considered a threat all around the world region. Was found to hit hard in South Africa. 2. What was the Hitachi/Mitsubishi scandal mentioned in the video? ANS/ 13 employees of Hitachi and five of Mistsubishi two of Japan’s biggest electronics firms. It was apparent computer crime was part of growing trend. The FBI calling this one possibly the biggest case of industrial espionage in history, but Japanese calling it a piece of political provocation Iaced with entrapment. Federal prosecutors say these tapes show to Hitachi executives buying stolen Ibm computer parts and programs to keep their company competitive. 3. Who is Markus Hess? ANS/ A German hacker and computer programmer whose age mentioned in video to be 28-years-old. Why was he significant? ANS/ He managed to hack into networks of military and industrial computers based in the United States, Europe and East Asia, and sold the information to Soviet KGB. His record shows the numbers of the U.S. military computers that he hacked into which equals to 400 computers. 4. What on the black market was more valuable than drugs? ANS/ Computer Chips found to be the biggest hit during this time. Chips were targeted in big numbers. One of the most lucrative markets for stolen chips is in Asia, in places like Hong Kong or Taiwan. 5. Who is David Lamacchia? ANS/ He is a junior at MIT and a computer whiz. LaMacchia used computers to set up his own electronic bulletin board, where computers users pass messages. The government claims at the time he allowed copies of $1 million worth of commercial software programs to be put on his bulletin board where they could be copied for free. A process best described as burglarizing a software storoe and then inviting everybody else in it. 6. What went wrong with the release of the DeScribe software program? ANS/ James Lennane found out that the software program was hacked after he had received a phone call from a customer advising him that the software is available worldwide on the internet, free of charge to anyone who wanted it. The software was hacked by hackers, and as mentioned it was no way for it to be recovered. 7. What is the estimated loss from stolen Intellectual Property each year? ANS/ The total lost amount was found to be approximately between $5 to $25 billion a year from the software industry alone. 8. What happened to the National Weather Service? ANS/ Over couple of months, using the internet, hackers have managed to penetrate the US National Weather Service. The circumstances would’ve been disastrous if it weren’t for the service’s backup system 9. What is “Innocent Images”? ANS/ It is described to be major investigation of computer kiddie porn which was launched by the FBI following to the 10-year-old junior case. This launch led to at least 12 arrests and raids on more than 120 homes nationwide. 10. What is the Communication Decency Act? ANS/ What year was it implemented? It was the first notable attempt by the United States Congress to regulate pornographic material on the Internet. It was implemented in 1996. Making it illegal to transmit so-called indecent material over the internet. By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited. NAME_______ SECTION:____001__________ Activity #2 11. Why did computer investigations start out as a federal duty? ANS/ 12. What is CERT? What does it do? ANS/ Computer Emergency Response Team, it was founded by the US government. It’s task is to help prevent break-ins on the internet by advising how to block them. And it’s a taught job, where now it’s managed by Dain Gary. 13. Who is in charge of the internet? ANS/ There is no one known to be in charge of the internet. 14. What is the Information Warfare Center? ANS/ The capability to shut down entire nation-states, societies, and economies, and it can inflict a new form of mass destruction 15. What computer related laws were added in 1996? ANS/ In fall of 1996 Congress acted to strengthen federal laws governing computer crime, imposing criminal penalties for economic espionage and adding electronic blackmail and other crimes to federal computer crime laws. By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited.