Question

Cybercrimes are being actively investigated at the federal, state and local levels and many are reported in the local and national press.
The Department of Justice maintains a log of recent press releases about cases , sorted by each year.
This should be the starting point for each of your reports on a suspected or convicted cybercriminal listed in the 2014 reports. You should also browse the Internet for news releases about the incident or the court case. Information is also available from other government sources such as the Federal Bureau of Investigations and the Federal Trade Commission.
For the case you are assigned, make a report that includes the following information:
1. Name of the assigned suspect.
2. Any pseudonyms by which they are known.
3. Date and title of the press release and a link to it.
4. A short description of the case (one or two paragraphs in your own words).
5. The actual dates and places of the incident.
6. Whether individual or group activity, if worked with a group or for a company, list any other suspects involved in the case
7. What was the motivation for the attack, and if there was monetary gain, how much?
8. Who was the target of the attack: a private company, a public company, individuals etc.?
9. Which of the cybersecurity principles was violated: confidentiality, integrity, or availability?
Briefly justify your answer.
10. Demographics of suspect: age, gender, ethnicity (if known).
11. Whether they plead guilty or not?
12. Location of suspect (if US, give city and state, if overseas, give the country name).
13. The stage of the case: indictment, prosecution, sentenced etc. If sentenced then describe the sentence given.
14. What law was broken?
15. Include at least three references.
Your report should list each question and your response. Your responses should be full sentences
when appropriate.
Your suspect is assigned below:
CASE: Audrey Elaine Elrod

Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

The studied articles summarize a case of Nigerian wired fraud scheme that took place between March 2012 and July 2013 in US. The only proved suspect was a 47 female called Audrey Elaine Elrod who had received an amount of $446,927.59 from individuals (by committing wire fraud) and afterwards attempted to structure transactions of $411,411.20 for avoiding reporting requirements....

This is only a preview of the solution. Please use the purchase button to see the entire solution

Assisting Tutor

Related Homework Solutions

Cell Site Analysis
Homework Solution
$18.00
Cell
Site
Analysis
Phone
Forensic
Map
Tower
Geographical
Time
Call
SMS
Service
Law
Enforcement
Suspect
Crime
Expert
Witness
Court
Company
Equipment
CAMP
CDR
Record
Cellular
Technology & Product Review for an SIEM Solution (1060 words)
Homework Solution
$35.00
SIEM
Gartner
Magic
Quadrant
Security
Information
Event
Monitoring
Product
Real-time
Threat
Analytics
Management
Reporting
Attack
Log
File
Data
Vulnerability
Technology
Vendor
Cybersecurity
Risk
Solution
Laws and Regulations from Cybercrime and Security
Homework Solution
$50.00
Law
Regulation
Cybercrime
Security
PET
Privacy
Enhancing
Technogloy
PII
Breach
Notification
Letter
European
Union
Data
Protection
Directive
Principle
Personal
Disclosure
NIST
Identifiable
Information
Social
Media
Concept
User
Fa
Presentation on Computer Emergency Response Team - CERT (5 slides)
Homework Solution
$23.00
CERT
Computer
Emergency
Response
Team
Incident
Security
IT
Vulnerability
Assessment
Service
Quality
Management
Proactive
Penetration
Testing
Audit
Maintenance
Reactive
Application
Infrastructure
Get help from a qualified tutor
Live Chats