Craigslist Killer Case and Cybercrime History Quiz

UnmatchedLight avatar
UnmatchedLight
·
·
Download

Start Quiz

Study Flashcards

35 Questions

What is the origin of the word 'virus' in the context of computer crimes?

Latin, meaning poison

How does a computer virus spread?

By attacking major system resources including data and sometimes hardware

What is required for hacking to take place?

Interconnection between computers and communication devices

What contributed to the sharp growth in reported incidents of computer attacks between 1980 and 2001?

The growth of the Internet and massive news coverage of virus incidents

What is one common argument supporting AI, as mentioned in the text?

AI could be used to fight cybercrime and defend us online

What is one common argument against AI, as mentioned in the text?

Lack of safeguards in place to ensure the control of ‘runaway’ computer systems

What is a concern mentioned in the text about the intelligence that could be achieved by artificially intelligent computers?

They could surpass the most intelligent human being

What is a potential impact of AI on the agriculture industry, as mentioned in the text?

Revolutionize the agriculture industry

What is a concern mentioned in the text about AI's impact on workplace responsibility and accountability?

Computers taking over in the workplace reduces the responsibility and accountability of the average human worker

What is a concern mentioned in the text about AI's privacy limits for those they serve?

Computers currently don’t have any privacy limits for those they serve

What is a common argument supporting AI, as mentioned in the text?

AI could improve health care for humans – more accurate diagnosis and faster lab processing

What is a concern mentioned in the text about society's attitude towards automated objects?

There is already a lot of reluctance in society towards automated objects

What technology did investigators use to trace emails between the Craigslist Killer's victims and himself?

IP address ownership information

What technology did Philip Markoff use to find his victims?

Craigslist ads

What technology did the police use to track Philip Markoff to the hotel where Julissa Brisman was murdered?

Surveillance video

What led to Philip Markoff's arrest six days after the murder?

Police stake-out of his apartment

What technology is Sophia the Robot an advanced form of?

Artificial Intelligence

What are weak AI designed for?

Specific tasks

What do frequent human actions lead to, according to the text?

Moral decay

What have headline-making e-attacks led to, according to the text?

Resurgence in the need for quick solutions

What do e-attacks cause a loss of, according to the text?

Trust in individuals and businesses

What do common uses of AI include, according to the text?

Machine learning and predictive technology

What is strong AI designed with, according to the text?

Human cognitive abilities

What are the psychological effects of attacks mentioned in the text?

Long-lasting effects such as hate and reclusion

What did the passing of the Computer Fraud and Abuse Act by the US Congress coincide with?

The launch of hacker magazines like '2600: The Hacker Quarterly' and 'Phrack'

What was the impact of the 'Killer Resume' virus in the year 2000?

It led to costly and powerful computer network attacks

What is a role of a computer crime investigator?

Recovering file systems on hacked or damaged computers

Where can digital evidence be found on computer systems?

Bad blocks, steganography utilities, and slack space

Why can deleted files on Windows-based systems often be manually recovered?

They still exist on the hard drive but are listed as not to be displayed to the user

What makes hidden files difficult to find on computer systems?

They can be difficult to find and may require special software to expose them

What methods are used to hide data on computer systems?

All of the above

What crucial role do digital forensics examiners play?

Investigating intrusions, gathering evidence of crimes, and uncovering fraud

What can be analyzed and exposed by skilled technologists on computer systems?

All of the above

What is the role of digital forensics examiners in investigating crimes?

Gathering evidence of crimes and uncovering fraud

What is the impact of skilled technologists' analysis on hidden data on computer systems?

It can be analyzed and exposed by skilled technologists

Study Notes

The Craigslist Killer and Digital Forensics

  • Julissa Brisman was murdered in 2009 in a Boston hotel, and Philip Markoff, dubbed the Craigslist Killer, found his victims through Craigslist ads.
  • Investigators traced emails between victims and Markoff, leading to his arrest after submitting subpoenas for IP address ownership information.
  • Surveillance video captured Markoff entering and exiting the hotel around the time of Brisman’s murder.
  • Markoff was engaged to Megan McAllister, and police staked-out their apartment, leading to his arrest six days after the murder.
  • Markoff died after his fourth suicide attempt in prison.
  • Psychological effects of attacks may lead to long-lasting effects such as hate, reclusion, and isolation, impacting individuals and society.
  • Frequent human actions can lead to moral decay and acceptance of formerly immoral actions as normal, which can be seen in e-attacks.
  • Headline-making e-attacks have led to a resurgence in the need for quick solutions to the problem, such as patches and intrusion detection tools.
  • E-attacks cause a loss of privacy and trust in individuals and businesses, leading to a loss of society's innocence.
  • Artificial Intelligence (AI) includes weak AI designed for specific tasks and strong AI with human cognitive abilities to find solutions without human intervention.
  • Common uses of AI include Siri, Alexa, Tesla, Amazon.com, and Netflix, which utilize machine learning and predictive technology for various purposes.
  • Sophia the Robot, created by Hanson Robotics, is an advanced form of AI with visual data processing, facial and voice recognition capabilities.

History of Computer Crimes and Digital Forensics

  • The 414-Club, named after the San Francisco area code, launched national news-making computer intrusion attacks from a Stanford University computer in the mid-1980s.
  • The years 1984-1987 saw the launch of hacker magazines like "2600: The Hacker Quarterly" and "Phrack," and the passing of the Computer Fraud and Abuse Act by the US Congress.
  • In 1988, a Cornell University graduate student created a computer virus that crashed 6,000 computers, causing a 2-day internet shutdown.
  • The 1990s witnessed heightened hacking activities and the anticipation of the "Michelangelo" virus in 1991, which did not cause the expected widespread computer crashes.
  • In 1999, President Bill Clinton announced a $1.46 billion initiative to improve government computer security. The year 2000 saw costly and powerful computer network attacks, including the "Melissa," "Love Bug," and "Killer Resume" viruses.
  • In 2001, the elusive "Code Red" virus was released, adding to the history of computer crimes.
  • A computer crime investigator's role includes recovering file systems on hacked or damaged computers, investigating crimes against children, and retrieving data for prosecuting crimes.
  • Digital evidence can be found in deleted files, hidden files, slack space, bad blocks, steganography utilities, compressed and coded files, encrypted files, and password-protected files on computer systems.
  • Deleted files on Windows-based systems can often be manually recovered as they still exist on the hard drive but are listed as not to be displayed to the user.
  • Hidden files can be difficult to find and may require special software to expose them.
  • Slack space, bad blocks, steganography utilities, and compression or coding methods are used to hide data on computer systems, which can be analyzed and exposed by skilled technologists.
  • Digital forensics examiners play a crucial role in investigating intrusions, gathering evidence of crimes, and uncovering fraud by analyzing computer storage devices and digital media to track down hackers.

Test your knowledge of the Craigslist Killer case and the history of computer crimes and digital forensics with this quiz. Learn about the investigative techniques used in high-profile criminal cases and the evolution of cybercrime, digital evidence recovery, and the role of digital forensics examiners.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser