Accounting Fraud Questions

Assignment Requirements

1.
For the list of organizations given below, search their websites for information regarding
1. What are their roles in fighting computer and Internet fraud?
2. What type/form of report can be filed with them?
3. What follow-up action/activity do they provide?

(Please answer 4-5 sentences.)

1. National Fraud Information Center- Online Complaint Form https://www.fraud.org/welcome.htm
Role:
Report:
Follow-up:

2. Federal Trade Commission (FTC)- Consumer Complaint Form 
https://www.ftccomplaintassistant.gov/#crnt&panel1-1 
Click “About Us”
Role:
Report:
Follow-up:

3. Department of Justice- Computer Crime and Intellectual Property Section (CCIPS) 
https://www.justice.gov/criminal-ccips
Role:
Report:
Follow-up:

4.Carnegie Mellon’s CERT Coordination Center- Vulnerabilities and Fixes Report
https://www.cert.org/index.cfm 
Click “About Us”
Role:
Report:
Follow-up:

5. Securities and Exchange Commission(SEC)- Center for Complaints and Enforcement Tips
https://www.sec.gov/complaint.shtml
Role:
Report:
Follow-up:

6. Department of Homeland Security- Electronic Crime
https://www.dhs.gov/combat-cyber-crime
https://www.dhs.gov/how-do-i/report-cyber-incidents
Role:
Report:
Follow-up:

EX) Internet Crime Complain Center (IC3) https://www.ic3.gov/
Role: A partnership between the FBI and the NW3C to serve as a means to receive Internet related criminal complaints and to further research, develop and refer the criminal complaints to federal, state, local, or international law enforcement and/or regulatory agencies for any investigation they deem to be appropriate. The IC3 continues to serve the broader law enforcement community to include federal, as well as state, local, and international agencies, which are combating Internet crime and, in many cases, to participate in Cyber Crime Task Forces.

Report: The IC3 accepts online Internet crime complaints filed by a person who believes was defrauded or filed by a third party to the complainant. After a complaint is filed with the IC3, the filer will receive an email containing the complaint id and password. This email will contain a link to an area on the IC3 website where the filer can view, download an adobe pdf version of the complaint, and also provide additional information to be added to the complaint

Follow-up: The IC3 thoroughly reviews and evaluates each complaint so that it may refer the complaint to the appropriate federal, state, local, or international law enforcement or regulatory agency. Every reviewed complaint is sent to one or more law enforcement or regulatory agencies that have jurisdiction over the matter. Once the IC3 refers a complaint to the appropriate agency, it may then be assigned to an investigator. The IC3 does not guarantee that the complaint will be investigated.

2. A Sophisticated Hacker with an Overblown Ego?

Kevin Mitnick, “America’s Most Wanted Computer Outlaw,” eluded the police, US Marshalls, and FBI for over two years after vanishing while on probation for his 1989 conviction for computer and access device fraud. His downfall was his Christmas 1994 break-in to Tsutomu Shimomura’scomputers in San Diego, California. Less than two months later, Tsutomu had tracked him down after a cross-country electronic pursuit. Mitnick was arrested by the FBI in Raleigh, North Carolina, on February 15th, 1995. 
While he was on the run, he broke into countless computers, intercepted private electronic communications, and copied off personal and confidential materials. Among the materials he copied off and stashed in readily accessible locations around the Net were personal electronic mail, stolen passwords, and proprietary software. Much of the stolen software was the trade secret source code to key products in which companies has invested many millions of dollars of development effort in order to maintain their competitive edge. His activities on the systems he broke in to, often altering information, corrupting system software, and eavesdropping on users, sometimes prevented or impeded legitimate use. He tried to stay a step ahead of the law by using cloned cellular telephones and stolen cellular and internet service for many of his intrusions. 
Mitnick was charged in North Carolina with 23 counts of access device fraud for his activities shortly before his arrest. In order to expedite his return to California, he agreed to plead guilty to one count and have his case consolidated in Los Angeles. In California, he was charged with an additional 25 counts of access device, wire, and computer fraud. On March 16, 1999, Mitnick plead guilty to five of these counts and two additional counts from the Northern District of California. He was sentenced to 46 months and three years probation, to be served in addition to eight months for his North Carolina plea and 14 months for his probation violation. He was released from prison on January 21, 2000, being eligible for early release after serving almost 60 months of his 68 month sentence. 
(Please answer 4-5 sentences.)
a. who is Kevin Minick?
b. How did he elude the law enforcement agents for so long?
c. Who is Tsutomu Shimomura?
d. How did he take down Kevin Mitchick?
e. Base on your knowledge of this case, write a short summary of what you have learned about hackers and computer fraud?

 

Order Now

YOU CAN ALSO PLACE OTHER SIMILAR ORDERS ON OUR WEBSITE AND GET AMAZING DISCOUNTS!!!