CRJ 460/560
FSC 430/530
Case Scenarios
Case One:
A young lady has come into your office complaining that her child has received
sexually suggestive materials from a stranger on the Internet. She
insists that the materials are being sent by someone claiming that they are
“FRND2U.” As the chief investigator you have been tasked with the
responsibility of explaining to this woman exactly how the Internet is being
used by potential pedophiles and why the technology is used as it is currently
employed.
Case Two:
The bank at which you are employed has been experiencing a problem with
hackers attempting to infiltrate the bank’s record system. The IT
manager insists that these attacks are attempts to shut down the United States
Banking system in a measured cyber terrorist attack because that is the only
type of hacker there is – the cyber terrorist. The Bank Manager,
however, feels that there is nothing to worry about as hackers have no real
power and can only look at data they gain access to. You are to respond
to both of these individuals, explaining to both why they are wrong and that
hacking can be dangerous, both physically and financially.
Case Three:
As a newly hired attorney with the local defense firm in Cleveland,
Mississippi, you have been assigned the task of handling the case of one of
the firm’s biggest customers. Their son has been arrested in an online
sting operation conducted by the Cleveland Police Department. You are to
discuss in detail any possible legal defenses that the client has, as well as
the potential pros and cons of each defense.
Case Four:
You have just been granted a search warrant to seize two computers from the
local Internet Service Provider’s office. This company is responsible
for maintaining the Internet connections for 70% of the city. However,
the computers that you are seizing are not used in the day-to-day network
operations. Instead, these computers are used by the design team to
ensure that customers’ personal web pages are up to date. Additionally,
these computers are used to prepare web pages for Silver and Platinum level
customers. Discuss in detail the procedures associated with executing
the search warrant for these computers. Be sure to address any serious
considerations that are necessary in this endeavor.
Case Five:
A woman enters your office at work today and requests your help. She has
received a threatening e-mail and would like your assistance in determining
who sent the e-mail and why. She indicates to you that the local police
department in Ruleville, Mississippi, will only perform the execution of the
necessary legal materials and cannot provide any technical assistance.
You are presented with a copy of the following e-mail. Detail the steps
of identifying and locating the suspect associated with the following e-mail:
Return-Path: <eperson@deltastate.edu>
Received: from mcvs1.dsu.deltastate.edu ([209.147.241.10])
by mail.yahoo.com (8.12.11/8.12.11) with ESMTP id j1GG1J4B032086
for <bmoore@deltastate.edu>; Thur, 17 Feb 2005 14:14:19 -0600
Received: from ([135.95.94.34])
by mcvs1.yahoo.com (8.12.11/8.12.11) with ESMTP id j1GFwAfV014846
for <bmoore@deltastate.edu>; Thur, 17 Feb 2005 14:11:25 -0600
Received: from forgottenone.com ([205.95.94.40])
by (8.12.6/8.12.6) with SMTP id j1GFoGKq017056
for bmoore@deltastate.edu; Thur, 17 Feb 2005 14:08:08 -0600
Date: Wed, 16 Feb 2005 09:50:16 -0600
From: eperson@deltastate.edu
Message-Id: <200502172550.j1GFoGKq017056@dsu.deltastate.edu>
X- DSU-EDU-MailScanner-Information: Please contact the helpdesk for more information
X- DSU-EDU-MailScanner: Found to be clean
X- DSU-EDU-MailScanner-SpamCheck: not spam
X- MailScanner-From: eperson@deltastate.edu
You have been attempting to avoid me for too long.
Your time has come. Love, your admirer.