Computer Crime WebQuest

Don't Fall Into the Cyber Crime Trap!

Introduction

Understanding computer crime, a web investigation.

Did you know that computer crime is becoming a HUGE problem in the world? It is Extremely important that you understand computer ethics (doing what is right) and computer crime, so you'll be sure to always do what is right!

Part 1

Vocabulary
Understanding computer crime, a web investigation.
To understand computer crime, we must first understand a few terms. Some of these terms are
ones that you are somewhat familiar with, others may be new.
Today, you will search the internet and answer questions relating to the following
computer crimes and internet security. To help answer the questions define the following terms:
• computer viruses • browser
• worms • search engine
• hoaxes • computer network
• trojan horses • hypertext
• copyright law • uniform resource locator
• internet fraud • browser
• keystroke loggers • cookies
• domain • router
• firewall • hacking
• wi-fi • internet cache
• internet protocol • cyber crime
You will also read, think, and write about computer security issues.

Part 2

Instructions

A computer crime web investigation.

• Today you will be working through an assignment on computer crimes.

• Rather than wasting your valuable time doing internet searches today, you should use the web site links provided.

Questions

Discussions Questions:

• Explain the difference between a computer virus, a worm, and a trojan horse. Go to http://computer.howstuffworks.com/virus.htm

• Using the same web page, determine how these viruses, worms, and trojan horses spread.

• Continuing to use HowStuffWorks.com, discover two ways to keep your computer safer from viruses.

• What is a "hoax"? Go to FreeDictionary.org.

• Have you ever received a computer hoax by e-mail? What did it suggest that you do, or how did it affect you? If you have not received one research one and answer the question based on it.

• Research 3 different internet scams or hoaxes. Describe each including how each is delivered, who is the main target of each scam, and how each tries to defraud the victims of their money, property, or personal information fraudulently. Describe three or four methods that one can use to protect themselves from these scams and hoaxes. One useful website is http://www.fbi.gov/scams-safety/e-scams

• You've probably heard about copyright, but did you know that you already have produced copyright work of your own? Read through the Copyright Basics page at the website http://www.copyrightkids.org/cbasicsframes.htm.

• Pretend that you are writing poetry in Language Arts class today. When will the poem that you write today enter public domain? (Use information from the copyright basics page.)

• Why is the date, March 1, 1989, an important day in copyright history?

• What types of works are protected by copyright?

• Are there any works that are not copyright protected? If the answer is yes, describe these things.

•What is the "fair use" doctrine?

• Describe a situation where YOU might need to request permission to use a copyrighted work.

• Read "The Ten Commandments for Computer Ethics" at the website http://cpsr.org/issues/ethics/cei/

While these commandments may seem simple, some of these rules summarize complicated laws that are in place in the United States. Others simply remind computer users of what is right and wrong.

• After reading the Ten Commandments for Computer Ethics, answer the following questions.

Do you believe that one of these commandments is more important, or more serious than the other? If so, which one(s)?

Which commandment do you feel is disregarded by many people?

Why do you feel so many people disregard it?

Part 3

Go the following website and read the sections indicated below:

http://www.fbi.gov/about-us/investigate/cyber

• Read COMPUTER AND NETWORK INTRUSIONS

• What is the yearly impact of repairing systems hit by computer attacks?

• Who is behind the computer attacks that take place each year?

• Describe three new ways that the FBI is trying to combat the new cyber threats

• Read IDENTITY THEFT

• How long has the FBI been dealing identity theft and criminals with fake ID’s?

• What has changed to make identity theft a much more serious issue?

• What are some things the FBI has done to combat identify theft?

• Click on the 2013 version of the INTERNET CRIMES REPORT. Answer the following questions using the report.

• How many reports were made in 2013?

• What year saw the highest number of computer crimes reported? How many were reported?

• What was the losses reported in 2013?

• What were the top five states in number of computer crimes reported?

• What are FBI Scams?

• Describe three scams that the FBI had complaints about in 2013. How many complaints were made about each?

• Read the following entries under PROTECTIONS: Get Educated on Internet Fraud and How to Protect Your Computer.

• What are some things you should know and do to protect yourself from internet fraud?

• What should you do to protect your computer from hackers and malware?

Part 4

Go the following website and read the sections indicated below:

http://www.fbi.gov/about-us/investigate/cyber

• Choose three cases in the CASES AND TAKEDOWNS section and write a summary of each case being sure to include dates, suspects, victims, locations, charges, name of the computer virus or scam used and how it worked, and estimated damages from the virus or scam.

Part 5

Final Activity

Read about a real computer crime committed by a High School Senior Class President!

The article below, first published in the South Florida Sun Sentinel describes the charges made in the arrest of a popular high school senior who was also the class president.

Imagine that you live in Cooper City and have been hearing about this crime, almost daily, on your local television news. You live across the city from the boy who was arrested and do not know him; therefore, you have an impartial opinion about the court decision. Because you have been learning about computer crime in your Business Computer Technology class, you understand the seriousness of the crime better than some of your friends. Your friends respect your knowledge and want to hear your opinion. Based on your research and knowledge, do you think that the charges made in the arrest are fair? Why or why not? Was the person who left the password on a note-pad also guilty? Why or why not?

Write a three to seven paragraph persuasive essay explaining your position regarding the fairness of the decision.

The Article

Class president at Cooper City High charged with changing grades of 19 students

By Douane D. James

South Florida Sun-Sentinel

Cooper City High School's senior class president was arrested Tuesday and charged in a grade-tampering scandal that has rocked the campus.

Ryan C. Shrouder, 18, of Cooper City, was taken to jail from school and charged with two counts of computer crime with intent to defraud, a second-degree felony, according to a Broward Sheriff's Office report. He was released from jail on bail, has been suspended from school and will be recommended for expulsion, said Joe Melita, head of the Broward County School District's investigative unit.

Shrouder serves as the alternate student advisor to the Broward School Board. He often sits in on board meetings and was issued a school district laptop computer. Sheriff's Office investigators say Shrouder took advantage of that access and used an employee password to access the district's network and change the grades of 19 students. It's unclear whether authorities think he changed his own grades.

Shrouder was considered the main suspect, but other students could be punished for being involved, Melita said.

Shrouder's attorney said his client will plead not guilty and that he is being unfairly singled out.

"To charge a kid with a computer crime is absurd," said Fort Lauderdale attorney Fred Haddad. "There's plenty of ways to handle this besides charging a felony."

Shrouder had been elected leader of his sophomore, junior and senior classes at Cooper City High and recently was voted "most likely to be president" of the United States.

Rumors of the arrest spread quickly at the school Tuesday. Administrators delayed the second-period bell so students would remain in class while deputies took Shrouder from the school.

Kara Olesky, student government president at Cooper City High, said Shrouder was well liked and appeared to be "headed in a positive direction."

"We were shocked," she said. "We would never have thought anyone would attempt something like that."

The report filed by the Sheriff's Office detailed the alleged grade-tampering as follows:

On Nov. 2, an assistant principal told authorities that the school had begun investigating unauthorized grade changes. Course grades from previous years for 19 students, mostly seniors, had been altered.

Cooper City High's bookkeeper told investigators that in the week before the grades were changed she witnessed Shrouder in the office of the computer technology specialist looking for a "sign-on" password to the district network. The technology specialist had left his passwords on a notepad in his desk, according to the report.

Investigators later determined that the employee's sign-on account was the same one used to access the grades program and modify the marks.

A Cooper City High student witness told authorities that on Oct. 30 he saw Shrouder use his laptop to access the computer application that manages pupil grades. Another student said Shrouder approached her at a party the next day and said he altered her grades, along with those of other students.

Sheriff's Office investigators reviewed video surveillance and forensic computer examinations to back up the witnesses' statements, according to the report.

Advisors to the School Board are given laptops that have access to the district network for e-mail purposes, but they don't have the security clearance to log into the application that manages grades, officials said.

Last year, a West Boca Raton High student used employee passwords to hack into the Palm Beach County district network and change transcripts for students at four high schools. He was ordered to pay restitution and complete a yearlong program to avoid being prosecuted for felony computer fraud.