CRJ 460/560
FSC 430/530
Case Scenarios

Case One:
A young lady has come into your office complaining that her child has received sexually suggestive materials from a stranger on the Internet.  She insists that the materials are being sent by someone claiming that they are “FRND2U.”  As the chief investigator you have been tasked with the responsibility of explaining to this woman exactly how the Internet is being used by potential pedophiles and why the technology is used as it is currently employed.

 

Case Two:
The bank at which you are employed has been experiencing a problem with hackers attempting to infiltrate the bank’s record system.  The IT manager insists that these attacks are attempts to shut down the United States Banking system in a measured cyber terrorist attack because that is the only type of hacker there is – the cyber terrorist.  The Bank Manager, however, feels that there is nothing to worry about as hackers have no real power and can only look at data they gain access to.  You are to respond to both of these individuals, explaining to both why they are wrong and that hacking can be dangerous, both physically and financially.

 

Case Three:
As a newly hired attorney with the local defense firm in Cleveland, Mississippi, you have been assigned the task of handling the case of one of the firm’s biggest customers.  Their son has been arrested in an online sting operation conducted by the Cleveland Police Department.  You are to discuss in detail any possible legal defenses that the client has, as well as the potential pros and cons of each defense. 

 

Case Four:
You have just been granted a search warrant to seize two computers from the local Internet Service Provider’s office.  This company is responsible for maintaining the Internet connections for 70% of the city.  However, the computers that you are seizing are not used in the day-to-day network operations.  Instead, these computers are used by the design team to ensure that customers’ personal web pages are up to date.  Additionally, these computers are used to prepare web pages for Silver and Platinum level customers.  Discuss in detail the procedures associated with executing the search warrant for these computers.  Be sure to address any serious considerations that are necessary in this endeavor.

 

Case Five:
A woman enters your office at work today and requests your help.  She has received a threatening e-mail and would like your assistance in determining who sent the e-mail and why.  She indicates to you that the local police department in Ruleville, Mississippi, will only perform the execution of the necessary legal materials and cannot provide any technical assistance.  You are presented with a copy of the following e-mail.  Detail the steps of identifying and locating the suspect associated with the following e-mail:

	Return-Path: <eperson@deltastate.edu>
	Received: from mcvs1.dsu.deltastate.edu ([209.147.241.10])
           by mail.yahoo.com (8.12.11/8.12.11) with ESMTP id j1GG1J4B032086
           for <bmoore@deltastate.edu>; Thur, 17 Feb 2005 14:14:19 -0600
	Received: from ([135.95.94.34])
           by mcvs1.yahoo.com (8.12.11/8.12.11) with ESMTP id j1GFwAfV014846
           for <bmoore@deltastate.edu>; Thur, 17 Feb 2005 14:11:25 -0600
	Received: from forgottenone.com ([205.95.94.40])
           by (8.12.6/8.12.6) with SMTP id j1GFoGKq017056
           for bmoore@deltastate.edu; Thur, 17 Feb 2005 14:08:08 -0600
	Date: Wed, 16 Feb 2005 09:50:16 -0600
	From: eperson@deltastate.edu
	Message-Id: <200502172550.j1GFoGKq017056@dsu.deltastate.edu>
X-	DSU-EDU-MailScanner-Information: Please contact the helpdesk for more information
X-	DSU-EDU-MailScanner: Found to be clean
X-	DSU-EDU-MailScanner-SpamCheck: not spam
X-	MailScanner-From: eperson@deltastate.edu

 

You have been attempting to avoid me for too long.  Your time has come.  Love, your admirer.