Cyber Crime Spring Part 3
Cyber Crime Spring Part 3
Fall 2015
18 USC 1343
having devised or intending to devise any
scheme or artifice to defraud, or for obtaining
money or property by means of false or
fraudulent pretenses, representations, or
promises, transmits or causes to be transmitted
by means of wire, radio, or television
communication in interstate or foreign commerce,
any writings, signs, signals, pictures, or sounds for
the purpose of executing such scheme or artifice
Third
intentionally accesses a protected computer
without authorization, and as a result of such
conduct, causes damage and loss.
At trial, Carlson admitted a flood of bad emails would impair ability to find/open good
e-mails (but only a few minutes)
He did not intend flooding spoofed senders
account with auto-replies
Court focused on his significant computer
savvy, said consequences of his actions
could be reasonably foreseen, upheld
conviction
availability of data
Fairly straightforward destruction of data,
encrypting data, taking a computer offline (either
directly or for repairs) DoS attacks, viruses, etc.
integrity of data
Computer security industry focuses on 1) content
and 2) source/authentication (bears on the
accuracy and credibility of the information)
Newspaper example paper prints correct story but
attributes it to the wrong source the CONTENT is
credible, but the SOURCE is incorrect