Craigslist Killer Case and Cybercrime History Quiz
35 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the origin of the word 'virus' in the context of computer crimes?

  • Latin, meaning poison (correct)
  • Arabic, meaning infection
  • Greek, meaning technology
  • Sanskrit, meaning destruction
  • How does a computer virus spread?

  • By directly infecting computer users' personal information
  • By exploiting network security vulnerabilities
  • By manipulating computer software to malfunction
  • By attacking major system resources including data and sometimes hardware (correct)
  • What is required for hacking to take place?

  • High processing power
  • Specific programming knowledge
  • Interconnection between computers and communication devices (correct)
  • Physical access to the targeted computer
  • What contributed to the sharp growth in reported incidents of computer attacks between 1980 and 2001?

    <p>The growth of the Internet and massive news coverage of virus incidents</p> Signup and view all the answers

    What is one common argument supporting AI, as mentioned in the text?

    <p>AI could be used to fight cybercrime and defend us online</p> Signup and view all the answers

    What is one common argument against AI, as mentioned in the text?

    <p>Lack of safeguards in place to ensure the control of ‘runaway’ computer systems</p> Signup and view all the answers

    What is a concern mentioned in the text about the intelligence that could be achieved by artificially intelligent computers?

    <p>They could surpass the most intelligent human being</p> Signup and view all the answers

    What is a potential impact of AI on the agriculture industry, as mentioned in the text?

    <p>Revolutionize the agriculture industry</p> Signup and view all the answers

    What is a concern mentioned in the text about AI's impact on workplace responsibility and accountability?

    <p>Computers taking over in the workplace reduces the responsibility and accountability of the average human worker</p> Signup and view all the answers

    What is a concern mentioned in the text about AI's privacy limits for those they serve?

    <p>Computers currently don’t have any privacy limits for those they serve</p> Signup and view all the answers

    What is a common argument supporting AI, as mentioned in the text?

    <p>AI could improve health care for humans – more accurate diagnosis and faster lab processing</p> Signup and view all the answers

    What is a concern mentioned in the text about society's attitude towards automated objects?

    <p>There is already a lot of reluctance in society towards automated objects</p> Signup and view all the answers

    What technology did investigators use to trace emails between the Craigslist Killer's victims and himself?

    <p>IP address ownership information</p> Signup and view all the answers

    What technology did Philip Markoff use to find his victims?

    <p>Craigslist ads</p> Signup and view all the answers

    What technology did the police use to track Philip Markoff to the hotel where Julissa Brisman was murdered?

    <p>Surveillance video</p> Signup and view all the answers

    What led to Philip Markoff's arrest six days after the murder?

    <p>Police stake-out of his apartment</p> Signup and view all the answers

    What technology is Sophia the Robot an advanced form of?

    <p>Artificial Intelligence</p> Signup and view all the answers

    What are weak AI designed for?

    <p>Specific tasks</p> Signup and view all the answers

    What do frequent human actions lead to, according to the text?

    <p>Moral decay</p> Signup and view all the answers

    What have headline-making e-attacks led to, according to the text?

    <p>Resurgence in the need for quick solutions</p> Signup and view all the answers

    What do e-attacks cause a loss of, according to the text?

    <p>Trust in individuals and businesses</p> Signup and view all the answers

    What do common uses of AI include, according to the text?

    <p>Machine learning and predictive technology</p> Signup and view all the answers

    What is strong AI designed with, according to the text?

    <p>Human cognitive abilities</p> Signup and view all the answers

    What are the psychological effects of attacks mentioned in the text?

    <p>Long-lasting effects such as hate and reclusion</p> Signup and view all the answers

    What did the passing of the Computer Fraud and Abuse Act by the US Congress coincide with?

    <p>The launch of hacker magazines like '2600: The Hacker Quarterly' and 'Phrack'</p> Signup and view all the answers

    What was the impact of the 'Killer Resume' virus in the year 2000?

    <p>It led to costly and powerful computer network attacks</p> Signup and view all the answers

    What is a role of a computer crime investigator?

    <p>Recovering file systems on hacked or damaged computers</p> Signup and view all the answers

    Where can digital evidence be found on computer systems?

    <p>Bad blocks, steganography utilities, and slack space</p> Signup and view all the answers

    Why can deleted files on Windows-based systems often be manually recovered?

    <p>They still exist on the hard drive but are listed as not to be displayed to the user</p> Signup and view all the answers

    What makes hidden files difficult to find on computer systems?

    <p>They can be difficult to find and may require special software to expose them</p> Signup and view all the answers

    What methods are used to hide data on computer systems?

    <p>All of the above</p> Signup and view all the answers

    What crucial role do digital forensics examiners play?

    <p>Investigating intrusions, gathering evidence of crimes, and uncovering fraud</p> Signup and view all the answers

    What can be analyzed and exposed by skilled technologists on computer systems?

    <p>All of the above</p> Signup and view all the answers

    What is the role of digital forensics examiners in investigating crimes?

    <p>Gathering evidence of crimes and uncovering fraud</p> Signup and view all the answers

    What is the impact of skilled technologists' analysis on hidden data on computer systems?

    <p>It can be analyzed and exposed by skilled technologists</p> Signup and view all the answers

    Study Notes

    The Craigslist Killer and Digital Forensics

    • Julissa Brisman was murdered in 2009 in a Boston hotel, and Philip Markoff, dubbed the Craigslist Killer, found his victims through Craigslist ads.
    • Investigators traced emails between victims and Markoff, leading to his arrest after submitting subpoenas for IP address ownership information.
    • Surveillance video captured Markoff entering and exiting the hotel around the time of Brisman’s murder.
    • Markoff was engaged to Megan McAllister, and police staked-out their apartment, leading to his arrest six days after the murder.
    • Markoff died after his fourth suicide attempt in prison.
    • Psychological effects of attacks may lead to long-lasting effects such as hate, reclusion, and isolation, impacting individuals and society.
    • Frequent human actions can lead to moral decay and acceptance of formerly immoral actions as normal, which can be seen in e-attacks.
    • Headline-making e-attacks have led to a resurgence in the need for quick solutions to the problem, such as patches and intrusion detection tools.
    • E-attacks cause a loss of privacy and trust in individuals and businesses, leading to a loss of society's innocence.
    • Artificial Intelligence (AI) includes weak AI designed for specific tasks and strong AI with human cognitive abilities to find solutions without human intervention.
    • Common uses of AI include Siri, Alexa, Tesla, Amazon.com, and Netflix, which utilize machine learning and predictive technology for various purposes.
    • Sophia the Robot, created by Hanson Robotics, is an advanced form of AI with visual data processing, facial and voice recognition capabilities.

    History of Computer Crimes and Digital Forensics

    • The 414-Club, named after the San Francisco area code, launched national news-making computer intrusion attacks from a Stanford University computer in the mid-1980s.
    • The years 1984-1987 saw the launch of hacker magazines like "2600: The Hacker Quarterly" and "Phrack," and the passing of the Computer Fraud and Abuse Act by the US Congress.
    • In 1988, a Cornell University graduate student created a computer virus that crashed 6,000 computers, causing a 2-day internet shutdown.
    • The 1990s witnessed heightened hacking activities and the anticipation of the "Michelangelo" virus in 1991, which did not cause the expected widespread computer crashes.
    • In 1999, President Bill Clinton announced a $1.46 billion initiative to improve government computer security. The year 2000 saw costly and powerful computer network attacks, including the "Melissa," "Love Bug," and "Killer Resume" viruses.
    • In 2001, the elusive "Code Red" virus was released, adding to the history of computer crimes.
    • A computer crime investigator's role includes recovering file systems on hacked or damaged computers, investigating crimes against children, and retrieving data for prosecuting crimes.
    • Digital evidence can be found in deleted files, hidden files, slack space, bad blocks, steganography utilities, compressed and coded files, encrypted files, and password-protected files on computer systems.
    • Deleted files on Windows-based systems can often be manually recovered as they still exist on the hard drive but are listed as not to be displayed to the user.
    • Hidden files can be difficult to find and may require special software to expose them.
    • Slack space, bad blocks, steganography utilities, and compression or coding methods are used to hide data on computer systems, which can be analyzed and exposed by skilled technologists.
    • Digital forensics examiners play a crucial role in investigating intrusions, gathering evidence of crimes, and uncovering fraud by analyzing computer storage devices and digital media to track down hackers.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Week 9 Lecture 1 (2).pptx

    Description

    Test your knowledge of the Craigslist Killer case and the history of computer crimes and digital forensics with this quiz. Learn about the investigative techniques used in high-profile criminal cases and the evolution of cybercrime, digital evidence recovery, and the role of digital forensics examiners.

    Use Quizgecko on...
    Browser
    Browser