Identify the computer trespass and computer hacking crimes


Assignment:

Criminal Justice

Discussion

Part 1: "Computer Trespass and Computer Hacking" Please respond to the following:

• Discuss the key elements of identifying computer trespass and computer hacking crimes. Next, use the Internet or the Strayer Online Library (https://research.strayer.edu) to research articles on computer trespass or computer hacking cases from within the past three years. Next, argue your support for or against the decision of the court in your selected case. Justify your position and respond to no less than one of your peers.

Part 2: Student Response

Discussion

Hello Professor and Classmates,

One of the primary key elements of computer trespass and computer hacking is that the act is unlawful, unauthorized, and with the intent to commit a crime. Additionally, the intrusion was with malicious intent such as alteration, destruction, or theft of the data stored in a system.
One of the most well know hacking groups "hacktivists" are called Anonymous. In 2012, a member of Anonymous, Deric Lostutter hacked into the Steubenville High School fan website of the school's football team and defaced the website by leaving messages regarding a rape that was being covered up by school officials of a young girl at a party. The rape was committed by at least two of the school's football players and was recorded on video. Anonymous made good on their threats, leading two of the assailants to be charged and convicted. One of them sentenced to one year in prison, and the other given a two-year sentence.

Deric Lostutter and an accomplice was also charged with hacking crimes, initially facing a sixteen-year prison sentence. Both parties eventually entered plea deals, the accomplice serving eight months and Lostutter sentenced to two years; the same as the rapists.

I have to say I do not support the decision of the courts in this case. In my opinion, I believe that the intent behind the hacking should have been taken into consideration. I certainly do not support and equal prison term as that of the rapists. I am certain in my own mind that if Lostutter and McHugh had not used the computer to make this incident and the, the cover up, and perpetrators public they would have never been exposed or brought to justice. I am not saying that there should not have been any consequences for their actions. However, I am saying that the punishment should fit the crime.

Thanks,

Vikki

https://www.rollingstone.com/culture/culture-news/anonymous-vs-steubenville-57875/.

https://www.bleepingcomputer.com/news/security/anonymous-hacker-who-exposed-steubenville-rape-case-gets-two-years-in-prison/.

Part 3: Bonus Question:

Discussion- How to Spot a Liar

Since we are discussing White Collar crime this week, it's a good time to view the video How to Spot a Liar. It's short (14 mins) but I wish it were longer, it's that good. Students always find it revealing.

To ensure you earn the full 10 points, be sure to discuss the video's content and what surprised you most when you watched it.

Enjoy!

Lynn

P.S. I promise this link works!

How To Spot a Liar

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Identify the computer trespass and computer hacking crimes
Reference No:- TGS03007890

Now Priced at $35 (50% Discount)

Recommended (98%)

Rated (4.3/5)