Discussion:
1. Describe the jurisdictional issues that challenge Law Enforcement in dealing with computer crime
2. Describe the hierarchy of cyber criminals as discussed in the lecture notes.
3. Discuss the different motivations that inspire people to hack into computers.
4. Describe the three different types of hackers listed in the lecture notes.