Maplewood Career Center
7075 
State Route 88  Ravenna, Ohio
Electronic Crime in Today's Society
    
 
Syllabus
Fall 2017
Class Meeting Times and Dates (16 three-hour class sessions)
6:00 pm to 9:00pm
Monday, September 25; Wednesday, September 27; Monday, October 2; Wednesday, 
October 4; Monday, October 9; Wednesday, October 11; Monday, October 16; 
Wednesday, October 18; Monday, 
October 23; Wednesday, October 25; Monday, 
October 30; Wednesday, November 1; Monday, November 6; Wednesday, November 8; 
Monday, November 13; Wednesday, November 15 
 Abbreviated Course Syllabus
 Technologies, Social Media, and Society - 13/14 Edition or the Twentieth Edition
Managing The Risk of Fraud and Misconduct 
	  - McGraw Hill
After completing this course 
	you should be able to...
	...understand the principles of stolen identity, credit card fraud, slander 
	on Facebook, email flaming, etc
...be aware of the changes in corporate 
	cultures that provide opportunities for internal crime and the employee 
	stress that encourages such activity in addition to developing affective 
	anti-fraud measures
...explain how induction and magnetic provide an 
	opportunity for electronic secrets to be intercepted and stolen
...detail  the 
	history and modern-day electronics involved as hackers, phreakers, and telephone 
	criminals go about their trade stealing information in this digital age.
	...discuss various forms of electronic occurring in corporations, various governments, different 
	branches of our military, several
...research and development firms, social 
	media, and political arenas.
...understand what motivates people to commit corporate crime, what kinds of behavior and personalities indicate potential criminals, which personality 
	characteristics are indicative of anti-
   social behavior, and what 
	cultures may even encourage crime.
...help protect their vulnerability to 
	hackers intercepting their email, cell phone messages, texts, WI-FI, 
	Bluetooth signals, Ransomeware attacks, phishing, and cybersquatting,
Introduction:
Class topics, areas covered, scope of course, rules 
at Maplewood
Electricity:
Atoms and magnetic fields
Management:
Understanding Fraud
Hacking History: Telephone Fraud - The Invisible 
Criminal
Current Events: The Five Things We 
Need to Know about Technology
Vocabulary: 
words assigned
Other:
S
Management: Asset Misappropriation
Hacking History:
Current Events: 
Vocabulary: None
Other:
Management: Reporting Financial Fraud, the Fraud 
Triangle
Hacking History: RFID Wallets and 
Readers (Radio Frequency Identification)
Current Events:
Facebook and Google
Vocabulary:
words assigned
Other:
Management: 
		Falsifying Government Claims and Insider 
Trading 
Hacking History: Kevin Mitnik
Current Events: Creating Safe Passwords
Vocabulary: None
Other:
Management: 
Phishing and cybersquatting
Hacking History: Video: 
Hackers
Current Events:
Discussion 
- How Modern 
						Technology Has Negatively Impacted Your Life
Vocabulary: words assigned
Other:
Management: 
Building an Integrated and Comprehensive Compliance Program for Sustainable 
Value
Hacking 
History: 
				
				Mitnick, Wozniak, and Draper (Captain Crunch)  The 
Captain Crunch cereal-box whistle that shut down AT&T.
Current Events:
The Pringles can WI-FI antenna for intercepting 
corporate secrets and utilizing others' software
Vocabulary: None
Other:
Management:
Risk Assessment
Hacking History: 
Video: Microsoft vs. Apple - 
Pirates of Silicon Valley
Current Events: Zombie Computers
Vocabulary: words assigned
Other:
Management: 
					
					Managing Antifraud Programs and Controls
Hacking History: 60 Minutes: The Internet is Infected
Current Events: Hacking vending 
machines
Vocabulary: None
Other:
Management: 
Codes of Conduct, Communication, and Training
Hacking History:
Hacking and Protecting Cell Phones
Current 
Events:
Vocabulary: words assigned
Other:
Management: Internet 
Article: Hacker Slang and Hacker Culture
Hacking History: 
Iran's Nuclear Centrifuges - Who Hacked them?
Current Events:
Political and Military Hacking
Vocabulary: 
None
Other:
Management:
Hacking History: Can 
Online Piracy Be Stopped by Laws?
Current Events:
Relationships, Community, and Identity in 
the New Virtual Society 
Vocabulary: words 
assigned
Other:
Management: Auditing and 
Monitoring
Hacking History: Video: Hackers 
are People Too (an introduction to the hacker's personality and thought 
process)
Current Events:
Hacking Banks - a Very Popular Pastime
Vocabulary: None
Other:
Management: Mechanisms for Reporting 
Fraud and Misconduct - Whistle Blower Policy
Hacking History: 
Operating and Hacking Government Drones
Current Events:
Is The United States Government Spying on You? Does the US Government Care More About Spying On 
Your Email Than Getting You A Job?
Vocabulary: words assigned
Other:
Management: Protecting Personal and 
Company Websites
Hacking History: The Ten 
Greatest Hacks of All Time - Part 1
Current Events:
The Latest Hacking Gadgets to Threaten your Identity and Property
Current Events:
Some video gadget fun
Vocabulary: None
Other:
Management: Me and My Data: How Much 
Do the Internet Giants Really Know?
Hacking History: The 
Ten Greatest Hacks of All Time - Part 2
Current Events:
Know Your Rights for Search and Seizure Laws for Data
Vocabulary: words assigned
Other:
Management: A Model for Managing 
Fraud and Misconduct
Management: Ransomware
Hacking History: 
Hacking Identity Theft
Vocabulary: None
Other:
Class Party
Electronic Crime in Today's Society
Fall 2017
Maplewood Career Center
Detailed Course Syllabus
	HELPFUL TOOLS: 
Hacker Dictionaries
	Hacker's Dictionary
	FOLDOC Dictionary
Enter your term on the 
	top and click search.
	The Jargon File
Click on "Glossary" in Section II on the left hand side.
POWERPOINT PRESENTATIONS
	Atoms, Energy, and 
	Electricity Part I
	Atoms, Energy, and Electricity 
	Part II
Atoms, Energy, 
  and Electricity Part III
	Atoms, Energy, 
  and Electricity Part IV
 Technologies, Social Media, and Society - 13/14 Edition or the Twentieth Edition
Managing The Risk of Fraud and Misconduct 
	  - McGraw Hill
Session
1 - 
Monday, September 25, 2017
- 
6:00 pm to 9:00 pm
Readings: First Assignment - Read 
	before coming to class: 
 
Technologies, Social Media, and Society – Read Article 1 in 13/14 
	edition; Article 1.1 in Unit 1  from the Twentieth Edition: Five Things 
	We Need to Know About Technology 
 There will be a class discussion on this important article. 
Class Lecture:
You will learn about what happens in our society when major technological 
advancements occur - who is benefited and who is harmed. You will be introduced 
to your first list of Electronic Crime vocabulary words and you will begin your 
study into the characteristics of electricity that allows criminals to steal 
money and data.
Telecommunications hacking, called phreaking - the introduction to hacking for 
many early criminals, will be reviewed.
Class Lecture: 
 
 Atoms, 
Energy, and Electricity - Part One
PowerPoint: 
 (PowerPoint Presentation -
	Atoms, Energy, and 
	Electricity Part I)
Videos: 
"MCI - The Invisible Criminals"
Vocabulary:
 
Virus
Worm
Hacker
Trojan Horse
Cracker
Social Engineering
	Phreaker
Firewall
Backdoor
Dumpster Diver
Session 2 -
Wednesday, September 27
Readings:
Technologies, Social Media and 
	Society,
"Five Things We Need to Know About Technology Change"
Class Lecture:
	Class Discussion from our last class: 
	Technologies, Social Media and 
	Society, "Five Things We Need to Know About Technology Change"
     The word processing, spell checking, grammar correcting PC was a blessing 
	to writers and students everywhere. However, typewriter companies went out 
	of business and our children are not learning how to spell. The hand-held 
	calculator was a God send over the slide rule. The calculator was small and 
	easy to carry, helped people calculate the best bargains at a grocery store, 
	helped engineers to do complex calculations on job sites, and made math 
	calculations a breeze for students increasing their accuracy. However, our 
	children's mathematics skills are shrinking.
     In the olden days oil was used in lamps to provide light for our homes. 
	When the electric light bulb was invented, it should have put the oil 
	companies out of business, but the invention of the oil furnace kept them 
	alive. When the natural gas furnace was invented the oil companies should 
	again have seen their demise, but the invention of the automobile and 
	airplane saved them again as gasoline provided a new demand. What will 
	happen to the oil companies when solar and electric cars are perfected?
     You are going to school on line using your PC for this course? A few 
	years ago the only school available was a classroom or a correspondence 
	course where individual lessons were delivered to you through the mail. 
	Correspondence course companies are now out of business. Some colleges are 
	closing their doors or offering on line courses and remote learning sites 
	to compete with the changing demand for education.
     Using any two of the Five Things We Need to Know About 
	Technology Change, describe a product or service in your life, family, 
	or job that illustrates a clear example of your two choices.
Class Lecture:
Management: You will be 
introduced to different types of insider crime occurring in corporations.
Part I –Understanding Fraud
Chapter 1-Asset Misappropriation
PowerPoint: 
Atoms, Energy, and Electricity - Part Two (PowerPoint Presentation -
	Atoms, Energy, and Electricity 
	Part II
Videos:
Vocabulary: None
Managing the Risk of Fraud and Misconduct – Read
Session 
3
- Monday, October 2
Readings: 
Big 
Brother is Here and His Name is Facebook
Read Article 5 in the 13/14 Edition, and Article 3.2 in 
					the Twentieth Edition. What Facebook Knows. 
Read Article 4 in the 13/14 Edition, and Article 5.2 in 
					the Twentieth Edition: How Google Dominates Us
Class Lecture:
 
     
    
 Find the section titled "Social Engineering" 
and described how Facebook was used to secretly increase organ donors and 
influence elections by getting more people to vote. Discuss how do you feel about the possibility of Facebook or 
				other social media being used to secretly influence your 
				choices? Do you feel you are being unknowingly manipulated if 
				this technique was used to sell products or influence your 
				social  or political decisions? Has this happened to you?
Class Lecture: 
 Management: Reporting Financial Fraud, the Fraud 
Triangle
      Corporate fraud will be explored again, but 
this time through financial reporting fraud. Can money be stolen from a 
corporation by minipulating expense and revenue figures? Since 80% of corporate 
fraud occurrs from employees, are top management as involved as other 
lower-stature employees?
     Asset Misuse
     Noncash Fraud
     Asset Requisition and 
	Transfer Fraud
     Larceny
     Lapping
     Fraudulent Billing
     Payroll Schemes
     Skimming
     Ponzi Schemes
  
Class 
Lecture:   
	
	
Ohm's Law: As we advance our way toward understanding how 
	magnetic signals carrying personal information are intercepted and stolen by 
	hackers, we will explore voltage, amperes, and resistance through Ohm's Law. 
	This involves only simple arithmetic like 6=12 / 2 or 12 = 6x2. For those of 
	you afraid of math, we go no further than Ohm's law.
Ohm's Law
Mysterious Magnetic Fields  1:38
Basic DC Series Circuit  4:23
Simple Series and 
Parallel Circuits  8:35
Class Lecture:   
Hacking History: RFID Wallets and 
Readers (Radio Frequency Identification)
   
PowerPoint:
 
Atoms, Energy, 
  and Electricity Part III
 
Videos:   
Magnitisim: view the following short 
	videos designed to help you understand this material.
AC & DC
Resistance
What is electricity
Ohm's Law
	 Vocabulary:
  
	
	
	
	
	ISP
Shoulder Surfing
Twitter - What is this 
				organization; what does it do?
Facebook - What is this 
				organization; what does it do?
Bit
Byte
Barf or 
				Barfulation
Code Police
CEO - See Chapter 2 in 
				Managing the Risk of Fraud and Misconduct
U.S. GAAP - 
				See Chapter 2 in Managing the Risk of Fraud and Misconduct
Session 4 -
Wednesday, October 4
	
	
	
	
	Readings: 
	
	
	
	
	Managing the Risk of Fraud and Misconduct
	
	
	
	
	
	
- Falsifying Government Claims and Insider 
Trading - Pages 83-88
	
	
	
	
	
	Class Lecture: 
	
	
	Discussion:   If you understood the presentation Atoms, Energy, and Electricity Part 
	III then you have a remarkable knowledge about an incredible phenomenon that 
	we use hundreds of times a day, but had no idea about its complexity.
     Thousands of electromagnetic waves are passing through our bodies from 
	all the radio and television signals, everyone's cell phone conversations, 
	everyone who is texting, all Wi-Fi locations, all police cars, fire trucks, 
	and ambulances, all aircraft, the military, gamma rays, ultraviolet, 
	infrared, and thousands of others.  It's very good we can't see these 
	electromagnetic waves because there are so many of them we wouldn't see much 
	of anything else.
     With much of our personal and proprietary information available through 
	the interception of electromagnetic waves, are you a little nervous about 
	your credit cards, bank accounts, securities, and other personal 
	information? Can your medical records be easily hacked? Can money from your 
	checking accounts be transferred in the middle of the night while you sleep?
     While your bank manager is at her desk entering bank account and credit 
	card numbers of customers into her computer, someone in a van stopped in the 
	bank's parking lot is busy intercepting these signals and stealing all this 
	data.  You see, every time the bank manager strikes a key on her 
	computer keyboard, it sends an electric signal to the computer and the 
	computer screen. Did I say an electrical signal was sent? Yes, and it 
	created a electromagnetic wave as all electrical signals do, and this 
	electromagnetic wave left the bank manager's key board and traveled through 
	space at the speed of light. Yes, the van in the parking lot has an antenna 
	(wire, conductor) that picks up these electromagnetic waves from the bank 
	manager's keyboard turning them into alternating currents that can be tuned 
	to duplicate each key stroke, each password, each bank account code, and 
	each credit card number.
     There are companies that do not have enough computer space to manage 
	their operations. Instead of spending thousands of dollars on more computer 
	memory and operating software, they intercept the computer Wi-Fi signals 
	from other companies and actually utilize their unused computer memory, 
	storage space, and even software. The best kind of antenna for intercepting 
	computer system Wi-Fi signals is made from an empty Pringles potato chip 
	can. The Pringles can has aluminum foil on the inside that creates 
	alternating electric currents when passed over by a company's Wi-Fi 
	electromagnetic waves traveling from their router through space at the speed 
	of light.  Feel safe?
     Discuss in class how 
understanding the electromagnetic wave phenomenon presented in my PowerPoint 
presentation Atoms, Energy, and Electricity Part III made you feel?  Is 
this a revelation to you? Did you already know this? Are you feeling nervous for 
your security? Are you worried about Identity theft? 
	
	
	
	
	
Class Lecture:
	
	
	
	
	
	
	
	Electromagnetic Spectrum  Source: Rocketboom.com
	
	Electrometric Waves and the Sun  Source: PBS Video
	
	The Earths Magnetic Lines of Flux Source: Youtube.com
	
	
Class Lecture:
	
	
	 Management: 
		Falsifying Government Claims and Insider 
Trading - Pages 83-88
	
	
	
Class Lecture:
	
	
	
	PowerPoint: 
	
	
	
	
	
	
	Atoms, Energy, 
  and Electricity Part IV
	Videos: 
	
Hacking History: Kevin Mitnik
	
	
	
	
	
	
	
								
								Kevin Mitnik from Takedown
								
								Live on the Web - Kevin Mitnik
	
Vocabulary: None
Session 5 -
Monday, October 9
	
	
	Readings: 
	
	
		Read the following articles from the Internet: 
Class Lecture: 
 Discussion 
- How Modern 
						Technology Has Negatively Impacted Your Life
						     Almost all of you have been 
exposed to the problems associated with electronics in the workplace.  This 
class deals with how electronics (computers, software, 
						pagers, cell phones, laptops, e-mail, Bloggs) improperly 
						implemented into the workplace causes stress, turnover, 
						poor moral, loss of efficiency and effectiveness, 
						undermined corporate structure, and encourages internal 
						crime. Your class discussion should involve your personal 
						experiences with this problem. By understanding how and 
						why these things occur, you will hopefully become better 
						managers.
     If you are a housewife or househusband and have never 
						experienced the negative aspects of electronics in the 
						workplace, perhaps your social contacts have unfavorably 
						changed for the same reason.  Many persons have 
						lost friends because of excessive participation with 
						American on Line (AOL).  Chatting on AOL, being 
						addicted to their garage sales, addicted to computer 
						games with partners in remote locations, or just surfing 
						the Internet have so involved some families that their 
						friends and other former social contacts have all but 
						been replaced with these new electronic acquaintances.  
						Have you ever been the victim of identity theft? 
						Children spending hours on the Web have altered family 
						social activities. Perhaps your children have had 
						unpleasant experiences associated with the total 
						proliferation of adult material.  Possibly you have 
						become the victim of computer fraud over the Internet. 
Perhaps electronics in your social circles have had a negative impact on your 
morale, self-esteem, or social standing.  Have you ever been the victim of 
bully texting? Perhaps an electronic dating service has exposed you to a less 
than desirable experience. 
Class Lecture:
				How Transformers Work  1:55
	
Class Lecture:  
	Current Events: Phishing and 
cybersquating
PowerPoint: None
Videos: 
	Hacking History: 
Hackers
Class Lecture: 
Discussion: 
	Towards the end of the movie Hackers, a war was 
	waged on the main frame computer designed to sink the oil tankers by 
	hundreds of computers from all over the world attacking simultaneously. What 
	is the hacker term for this type of an attack?  
You have been told in 
	this course that 80% of corporate electronic crime comes from insiders. How 
	does this fact pertain to the filmHackers? Do you see any similarity 
	between the movie Hackers and the Kevin Mitnik story?  
Vocabulary:
Botnets
Wall (as used on Facebook) Uploading
Downloading
	Uploading
Browser
Phishing
Spy ware or malicious software
	Cybersquatting or Typosquaters
Blog
Brain dump
Session 6 -
Wednesday, October 11
	Readings:
Class Lecture:
	
	
	
     
	
	
	When automation at the workplace 
started in the 1950s and 1960s, many people projected that the use of computers 
would allow a person to do one days work in only three or four hours. This would 
greatly increase the worker's leisure time. As it turns out, when computers did 
allow one worker to finish his/her tasks in a few hours, instead of going home, 
the worker was told to stay at work doing the tasks of two or three workers. 
This not only increased each worker's responsibility, but reduced jobs. 
Employers now had a better means to spy on employees through technology. This 
topic will gradually be covered throughout the rest of this course.
     
	What is Phishing? How can we detect it? What is Cybersquatting? What is 
Social Engineering? Are we ever personally exposed to these activities? Can 
these activities be spotted by us, the users, before and damage is done to our 
computers or bank accounts?
     The 
above topics will be studied this week along with getting closer to 
understanding how criminals intercept our computer and cell phone signals. Read the Hacker Newspapers listed 
	below. Are your cell phone 
conversations being recorded? Are your cell phone numbers being compared to 
those phone number called on terrerist's cell phone records?
	
Class Lecture: 
	
	
	
     
	
	
	
	
	
	
	
	This week we 
	will better understand how cyber criminals intercept proprietary 
	information like passwords, credit card numbers, and transferring money from 
	bank accounts. It is interesting to note that one rarely reads in the 
	newspapers or views on TV news programs stories about money being stolen 
	from banks through hackers and cyber criminals, yet this type of electronic 
	crime is very common. If you were the CEO of First National Bank and your 
	customers were having money stolen from their accounts by hackers, would you 
	want that published in a newspaper or on the TV news? Probably not, for many 
	of your customers would close their accounts. If the police located a cyber 
	criminal hacking into your customer's accounts, would you want that person 
	arrested and prosecuted so all the details about the trial would be in the 
	newspapers or on the evening news? Again, your bank would lose many 
	customers.
     
	
	
	
	
	
	People today are so use 
	to texting, using email, participating in chat rooms and other forms of data 
	communications that it is often difficult to tell if your friends or 
	associates are real people. Are these continuous cyber relationships harming 
	our social person-to-person interaction skills? Is the person we are 
	communicating with who they say they are or, possibly, even real?
     
	In order to protect our companies and employers we need to be familiar with 
	building or maintaining an 
	integrated and comprehensive 
	compliance program capable of assessing risks, preventing and detecting 
	misconduct, and evaluating its effectiveness. After all, being aware of 
	electronic crime, preventing and detecting it, and improving policies and 
	procedures to prevent its recurrence is probably why your are taking this 
	course.
	
	
	
	
	PowerPoint: 
Videos:
Vocabulary: None
Session 7 -
Monday, October 16
Readings: 
"How Zombie Computers Work" by Jonathan Strickland  
http://computer.howstuffworks.com/zombie-computer.htm
Class Lecture:
Class Lecture: 
Management:
Risk Assesment
Class Lecture: 
PowerPoint: None
 
Videos:  
Hacking History:  
Video: Microsoft vs. Apple 
-  
Pirates of Silicon Valley
We will explore the development of 
Microsoft Corporation and Apple Computer starting will Bill Gates and Steve Jobs 
in their college dorm rooms all the way up to the major corporations they 
created. How did they compete or cooperate? Were they ethical to each other? A 
surprising look at these two technological giants makes a fascinating study for 
this course. Discuss what you 
	thought of the apparent lack of open ethics between Steve Jobs and Bill 
	Gates as their businesses started to become major corporations?  Were 
	you surprised? Who did you think exercised fewer scruples, Steve Jobs or 
	Bill Gates? It is interesting to follow Steve Jobs and Steve Wozniak 
	from their hacking days with Captain Crunch to forming one of the most 
	profitable corporations in the United States. Did you notice how they 
	treated Xerox to obtain their secrets? Was that ethical in your opinion? Did 
	Bill Gates display similar questionable behavior in any of his dealings with 
	other companies?
Vocabulary:
Risk-Specific Compliance Managers - See Chapter 6 - Managing the Risk 
	of Fraud and Misconduct
Frequency
Wavelength 
	Virtual Reality or Virtual Society - Article: Relationships, Community, 
	and Itenity In the New Virtual Society in the text Technologies, 
	Social Media, and Society
Micro-Coordination -  Article: 
	Relationships, Community, and Itenity In the New Virtual Society in the 
	text - Technologies, Social Media, and Society
Gabriel
Gnarly
	Clone
Fried
Iron Box
Session 8 -
Wednesday, October 18
Readings:
Class Lecture:
	     Some hackers have threatened to take down the national power 
	grid in order to shut down the Internet and create havoc around the world.  
	Did you know that the national power grid can also be shut off by the solar 
	winds mixing with the earth's magnetic field? Did you also know that our 
	earth would be uninhabitable without the earth's magnetic field? This 
	magnetic field stuff is very important in addition to being fascinating.
     
	Preventing fraud from a manager's perspective through codes of conduct will 
	be introduced. This is probably one of the reason you took this course, not 
	only to learn about the many forms of electronic crime, but to finds ways of 
	reducing such activities to protect your company.
                   
			
			The Solar Winds and Our Magnetic Field  4:44    
			
                   
			The Earth's 
			Magnetic Field is Collapsing  3:39  
			
                   
			The Solar Winds 
			Effect on Earth 4:44 
Class Lecture: 
Management: 
 
					
					Managing Antifraud Programs and Controls
			
			Managing Antifraud Programs and Controls by the American 
			Institute of Certified Public Accountants, Inc. New York, NT.
PowerPoint: None
Videos: Hacking History:
60 Minutes: The Internet is Infected
             
                   
				Fraud in vending machine hacking
				                   
				Hacking a pop machine 0:54
 
Vocabulary: None
Session 9 -
Monday, October 23
Readings: Managing the Risk of 
Fraud and Misconduct - Chapter 8- Codes of Conduct, Communication, and 
					Training Pages 139 through 15
Class Lecture:
Management: 
Codes of Conduct, Communication, and Training
Class Lecture: 
PowerPoint:
None
Videos: 
60 Minutes - IPhone Hack
                    
Police crack mass-arrest cell phones during Trump campaign
                    
Has 
your smart phone been hacked?
                    
How easy is it to hack a smart phone?
                    
How safe is the Cloud?
 
Vocabulary:
   Many of the below terms were taken from articles in 
Technologies, 
			Social Media, and Society. Please understand the definition, 
not just what the letters stand for (like PDF).
Blue Box
Malware
Encryption 
Slammer Worm
U.S. Power 
			Grid
PDF Files
Denial of Service Attack
ESN / MSN
War 
			Dialer
USB
Session 10 -
Wednesday, October 25
Readings: 
Hacker Slang and 
Hacker Culture  Click to read article
Technologies, Social Media, and Society:
					
Class Lecture:
The earth's magnetic fields when struck by the solar 
					winds from the sun can shut down the power grids in many 
					countries. It sounds like the sun can perform some very 
					sophisticated hacking! What do you think of all this? 
					Protecting ourselves from hackers and cyber-criminals is 
					difficult enough, but how do we protect ourselves from the 
					solar winds? Many hackers have proclaimed, some testifying before 
					Congress, that the easiest way to shut down the Internet is 
					to hack into and disable the nations power grid. No electricity to 
					homes and business, no Internet. Are you seeing how mysterious and powerful 
					magnetic fields can be? 
                                           
The Solar Winds and Our Magnetic Field
                                           
The Earth's Magnetic Field
Class Lecture: 
Hacking History: 
Iran's Neucular Centrifuges - Who Hacked them?
Is it possible to hack a virus into Iran's nuclear program and cause severe physical damage to over 1,000 of their nuclear processing centrifuges? While these centrifuges are being ripped apart is it possible to send signals to all the monitoring and control stations that everything is operating normally? Well, this happened. In fact, finding who was responsible was on the news two weeks ago - June 2013. The virus is named Stuxnet, and it quickly spread to over 100,000 computers in Iran's nuclear program before it was stopped. Who did this? The United States? Israel? If Stuxnet appears to be a highly sophisticated virus, it's nothing compared to the one that hit Iran's oil industry in April 2013 called Flame. Are wars going to be fought this way in the future? Are bombs and soldiers going to be outdated?
Phreaker's hack into telephone systems. We are going to take a close look at yesterday when AT&T was most vulnerable and the three most famous phreakers of our time were driving Ma Bell and the FBI into distraction. Apple Compouter was founded by one of those phreakers.
Class Lecture:
PowerPoint: None
Videos: The 
					Hacker's Home Page (This site is provided to study the 
					hacker community and philosophy and to make you aware of 
					what tools are available.)
Vocabulary: None
Session 11 -
Monday, October 30
Readings:
Class Lecture:  
Electricity: Review Magnetic Waves
Class Lecture:
Hacking History: Can 
Online Piracy Be Stopped by Laws?
Class Lecture: 
Current Events: 
Relationships, Community, and Identity in 
the New Virtual Society 
PowerPoint: 
Videos:
Vocabulary:
	Fourth Amendment
File sharing
Domain name 
URL
First 
	Amendment 
ISP Memorandum
Time-shifting- 
Whistle 
	blower - Chapter 10
Exit Interviews - Chapter 10
Web-based 
	reporting system
Session 12 -
Wednesday, November 1
	Readings:
Class Lecture:
	
Management: Auditing and 
Monitoring
Your organization should establish auditing and monitoring of all company 
transactions to help insure that fraud and misconduct does not occur, or if it 
does, that it be detected. How does one set up such a auditing and monitoring 
system?
	
Class Lecture: 
	
	
	PowerPoint: None
Videos:
	
Hacking History: Video: Hackers are People Too (an 
introduction to the hacker's personality and thgougfht process)
     John T Draper, known as Captain Crunch, was the nickname of a 
			hacker in the 1970s who shut down the eastern half of AT&T's 
			telephone long distance switching system. He accomplished this task 
			by blowing a whistle found in a Captain Crunch cereal box into a 
			telephone. The frequency of the whistle was about 2600 cycles per second, or 
			as we now know, 2600 Hz. 2600 Hz is well within the range of human 
			hearing being between 20 Hz up to 20,000 Hz. Do you remember that one of the hacking organizations in New York 
			listed each week on our schedule is called 2600? I wonder why they 
			use that name?
     AT&T decided to save money by allowing their voice and data 
			signalling frequencies to be in the same frequency range. A 2600 Hz 
			tone is a little higher in pitch than a dial tone and was used by 
			AT&T's long distance switching stations to look for an open long 
			distance line. Empty or unused long distance lines would look for a 
			newly dialed long distance call that needed to be connected to the 
			long distance network. AT&T's equipment generated a 2600 Hz tone 
			when a long distance call was placed and the AT&T switching station 
			looked for lines generating this tone.  Once located, the 
			switching station connected the call generating the tone to the long 
			distance network and completed the call. It turns out that the Captain Crunch whistle found in the cereal 
			box generated an almost perfect 2600 Hz tone. Guess what happened?
     Go to the links below and learn about Captain Crunch. Learn about 
			the relationships of Captain Crunch (Draper) with Kevin Mitnick, 
			Steve Jobs and Steven Wozniak from Apple Computer (small world).
Discuss what do you think of a cereal whistle being used to shut 
			down AT&T?  In a previous week, I mentioned that an empty 
			Prinkle's Potato chip can was an excellent antenna for intercepting 
			corporate Wi-Fi signals and utilizing their computers.
			Cereal box whistles, 
			potato chip cans - what's going on here?
			
			
			
			
			
			Vocabulary: None
Session 13 -
Monday, November
Readings: 
Internet Readings
Class Lecture:
Management: Mechanisms for Reporting 
Fraud and Misconduct - Whistle Blower Policy
     An estimated 42% of million-dollar fraud cases were originally 
	discovered by whistle blowers. What kind of corporate culture and 
	environment feels safe for employees to turn in hackers and cybercriminals 
	working among their ranks? Is confidentiality and security a concern? What 
	about the harassment of co-workers after a whistle blower revealed to 
	management a fraudster among the ranks? How safe is middle management with 
	this information? Can they be trusted?
Class Lecture: 
Hacking History: 
Operating and Hacking Government Drones
Class Lecture: 
Current Events:
Is The United States Government Spying on You? Why Does the US Government Care More About Spying On 
Your Email Than Getting You A Job? Government agencies throughout the 
world are pushing for laws forcing third-party providers to collect far more 
personal data on individuals than the company requires for their business needs. 
In the contracts requiring the length of time this storage must be retained, 
there is usually provisions for the government to have access to all records 
expanding its surveillance capabilities on its citizens. (Sleep well, my 
friends)    
	
     Addressing your future privacy on the Internet I'm sure is a 
concern for everyone since there is very limited privacy 
	now. Should you use cloud, for example, by storing all your personal 
	information on the Internet instead of your hard drive? Is it safer than 
	using computer storage? Are governments creating laws that force companies 
	to collect far more personal data on customers than is necessary to run the 
	business? Are their provisions that all this data must be made available to 
	governments as an enhanced method for creating deepening surveillance on its 
	citizens? Who is the enemy here - the cybercriminals or the government? 
PowerPoint: None
Videos:
Vocabulary:
Tracking files
Third-party tracking files
Beacons
Flash 
			cookies
BlueKai (the company)
Flux
Ampere's Law
Solar 
			Winds
Cyberbullying
Code of Conduct
Session 14 -
Wednesday, November 8
Readings:
Class Lecture:
Management: Protecting Personal and 
Company Websites
Class Lecture: 
Hacking History: The Ten 
Greatest Hacks of All Time - Part 1
Class Lecture:  
Current Events:
The Latest Hacking Gadgets to Threaten your Idenity and Property
PowerPoint: None
Videos: 
Some Video Fun:
Electronic Gadgets     
Fun with Magnetism    
An Electric Motor   
A 
simpler motor     
A Blond 
Girl Motor
How to Hack a POP 
Machine   
Reprogram POP 
Machines    
Elevator Hack  
Inside 
a 9V Battery
Combination Lock Pick  
Locked out of your 
car? 
Car 
Lock Myth Busted
Vocabulary: None
For Next Class:
Session 15 -
Monday, November 13
Readings: 
The Hacker's News
Class Lecture:
Management: 
Me and My Data: How Much 
Do the Internet Giants Really Know?
Class Lecture: 
 Hacking History: The 
Ten Greatest Hacks of All Time - Part 2
                             
Top 5 Hackers Publications, Web Sites, Etc.
Class Lecture: 
Learning about hacking organizations
                              
Cult of the Dead Cow
                              
2600 - The Hacker Quarterly
                              
L0pht Heavy Industries
                              
Anonymous
                              
Lizard Squad
                              
The Level Seven Crew
                             
LulzSec
                              
The Syran Electronic Army
                              
Global Hell
                              
Team Poison
                              
The Chaos Computer Club
                              
End Note
PowerPoint:
Current Events:
Know Your Rights for search and seizure and copyright 
laws
	     Copyright 
infringements concern Web site owners, authors, music and video organizations, 
writers, and many other areas where the protected origin of works are of a 
concern. This is also of paramount importance to many corporations. The latest 
copyright laws will be visited as well as the right of law enforcement officers 
to search and seize your computers both at work and at home including the data 
contained therein.
Videos:
Vocabulary: 
Vocabulary from next week's reading 
 Best 
Practices - Ransomware
Deep Web
Ransomware
Virtual patching
Zero-day exploits
PowerShell
Least privilege
Sandbox
WannaCry
Petya
Session 16 -
Wednesday, November 15 
Readings: 
TrendMicro:
What is Ransomware?
                           
Best Practices - Ransomware
Class Lecture:
Management: A Model for Managing 
Fraud and Misconduct
Class Lecture: 
Hacking History: 
Hacking Identity Theft
Class Lecture: Hacking 
Conventions that you may attend held in the United States 
(taken from wicipedia.com)
CarolinaCon, in
North Carolina, is a regional technology and network security conference 
usually held during Spring.
CircleCityCon is a security and technology conference held annually in June 
in 
Indianapolis.
CypherCon, a
Milwaukee 
based hacker conference held late winter each year.
DEF CON, in
Las Vegas, 
Nevada, is the biggest hacker convention in the
United States held during summer (June–August).
DerbyCon, 
an annual hacker conference based in Louisville, KY.
GrrCon, an annual hacker conference hosted each September in Grand Rapids, 
Michigan.
Hack in the Box, an annual hacker conference.[55][56]
Hackers on Planet Earth (HOPE), in
New 
York City is held by
2600: The Hacker Quarterly in mid-summer (July/August) every other year.
HackMiami Conference, a hacker conference in Miami, Florida organized by the
HackMiami
hackerspace.
INFILTRATE, hosted by Immunity, Inc, is a deep technical security conference 
that focuses on offensive technical issues. The conference has been held 
annually in
Miami Beach, 
Florida since 2011.
LayerOne, 
held every spring in Los Angeles, California.
Notacon, in
Cleveland,
Ohio, is an art 
and technology conference held frequently in mid-April.
PhreakNIC, 
in
Nashville,
Tennessee, 
is held by Nashville 2600. around October.
Quahogcon, In
Providence,
Rhode 
Island is held at the end of April.
ShmooCon, 
a
Washington DC convention started in 2005 by
The Shmoo Group, and held annually in late winter (usually February).
SkyDogCon, A technology conference in Nashville, TN for the individual with 
the Renaissance Mind. SkyDogCon exists to facilitate learning, information 
sharing, and mingling with like-minded people in a relaxed atmosphere.
Summercon, 
one of the oldest hacker conventions, held during Summer (frequently in June). 
It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON.
T2 infosec conference, focuses on newly emerging information security 
research with a balance of topics on auditing and pen-testing, and security and 
defensive strategies. In general, presentations will address different aspects 
of information security—all presentations will include demos and be technically 
oriented and practical.
THOTCON, a
Chicago 
based hacker conference held in the Spring each year.
ToorCon, San 
Diego hacker convention that emerged from the 2600 user group frequently in late 
September.
WildWestHackinFest, a conference focused on training and development held in
Deadwood, South Dakota in October. Explore the
Black 
Hills and learn how to hack all the things, including the
IoT. 
 
 
Videos:
Final Class Party
Supplemental Course Study Material
Hacker Web Sites & Culture
Class PowerPoint
Presentations
Telecommunication's
Crime Presentation
Atom
& Electronics Presentation
Atoms, Energy, and Electricity
The Particle Adventure
http://particleadventure.org/particleadventure/index.html
The Story of Kevin Mitnik
Kevin Mitnik Site
http://www.takedown.com/bio/mitnick.html
The Story of the Captain Crunch Cereal Whistle
Captain Crunch
Hacker Manuals and Instruction Guides
http://www.spectre-press.com/
The Hackers' Home Page
http://www.hackershomepage.com/
Some Hacking Organizations
http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Hacking/Organizations/
Famous Hacked Web Sites
http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/Hacking/Hacked_Web_Sites/
Glossary of Computer and Internet Terms
http://foldoc.org/
The Hacker Dictionary
http://www.hacker-dictionary.com/
The Jargon File
http://www.catb.org/~esr/jargon/
QUIZZES IF APPLICABLE
	Electronic Crime
Fall – 2014 – LCCC and Tri-C
	Quiz One 
NAME (printed or typed) 
	_____________________________________________________________
	The Five Things We Need To Know About Technology 
	Change
1. All technology change and 
	advancement is a tradeoff. This means: (5 Points)
2. The advantages 
	and disadvantages of a new technology are never distributed evenly among the 
	population. This means: (5 Points)
3. Embedded in every technology 
	there is a powerful idea, perhaps two or three powerful ideas. These ideas 
	are often hidden from our view because they are of a somewhat abstract 
	nature. But this should not be taken to mean they do not have practical 
	consequences. This means: (5 Points)
4. Technology change is not 
	additive; it is ecological. This means: (5 Points)
	
	Managing the Risk of Fraud and Misconduct
	
5. Select the best answer: The sun will always rise 
	in the east and when it does we will call it morning. The sun will always 
	set in the west and when it does we will call it evening. This has always 
	been; it is part of nature - it is mythic. When a technology becomes mythic: 
	(3 Points)
Select one:
a. It is always dangerous because it is then 
	accepted as is 
b. It is not easily susceptible to modification or 
	control 
c. It is perceived to be part of the natural order of things 
	d. It tends to control more of our lives than is good for us 
e. All of 
	the above 
f. None of the above 
6. "The printing press 
	annihilated the oral story-telling tradition; telegraphy annihilated space, 
	television has humiliated the printed word; the computer, it seems, is 
	degrading family and community togetherness." Which of the Five Things We 
	Need To Know About Technology is this an example? (3 Points)
Select one:
	a. There is embedded in every great technology and epistemological, 
	political or social prejudice. 
b. There is always a price for technology
	
c. There are always winners and losers 
d. Technology change is not 
	additive; it is ecological; that is, it changes everything. 
e. 
	Technology tends to become mythic, that is, perceived as part of the natural 
	order of things. 
7. The three conditions that must be present for 
	fraud to occur are: Select one: (3 Points)
a. Opportunity, incentive, and 
	cooperation 
b. Cohering, pressure, and opportunity 
c. Opportunity, 
	incentive, and rationalization 
d. Rationalization, opportunity, and 
	collaboration 
e. None of the above 
8. Select the best answer. 
	The previous question dealt with three conditions to occur necessary for 
	fraud. These three conditions are known as: (3 Points)
Select one:
a. 
	The Fraud Triangle 
b. The Three Incentives for Crime 
c. The Triple 
	Paradigm of Fraud 
d. The Asset Misappropriation Trisector 
9. 
	Select the best answer: The American Institute of Certified Public 
	Accountants has labeled "what" as the Achilles' heel of fraud prevention? (3 
	Points)
Select one:
a. Computer password hackers 
b. Management 
	override 
c. Lack of accounting control supervision 
d. Computer 
	maintenance down time 
e. The constantly changing accounting policies 
	requiring software updates and opportunity for hackers 
10. Match the 
	best definition that most accurately applies to the term. Enter the letter 
	of the term in the blank preceding the definition. (3 Points each, total 27 
	Points)
I) ____The misappropriation of cash from an organization 
	prior to being recorded 
II) ____The misappropriation of cash from an 
	organization after it has been recorded 
III) ____Crediting one account 
	with the receipts intended for a different account 
IV) ____Where funds 
	are distributed under the guise of a legitimate payment for invoiced goods 
	or services. Personal purchase schemes, non-accomplish vendor schemes, 
	schemes involving shell companies 
V) ____Fraudulent disbursements that 
	are perpetrated through the creation of false documentation 
VI) 
	____Placing orders for inventory that exceed the amount actually needed to 
	complete the project 
VII) ____Fraudulent business ventures where 
	investors are paid from other investors' funds rather than operations 
	VIII) ____When an employee engages in the unauthorized use of company assets
	
IX) ____Inventory theft, Fictitious Sales, Purchasing and Receiving 
	Fraud
A. Asset Misuse
B. Noncash Fraud
C. Asset Requisition and 
	Transfer Fraud
D. Larceny
E. Lapping
F. Fraudulent Billing
G. 
	Payroll Schemes
H. Skimming
I. Ponzi Schemes
	PowerPoint Slides on Electricity
	
11. a. Like charges _____________ each other.
b. 
	Opposite charges ____________each other. (4 points)
12. a. Every time 
	there is an alternating electric current, an _______________ 
	_________________ is created. (2 Points)
b. Every time an alternating 
	magnetic field crosses a conductor, an _________________ ______________
	__________________ is created. (2 Points)
c. This 
	______________________ ______________________ leaves the conductor and 
	travels through space at the speed of light. (2 Points)
13. True or 
	False An atom is composed of a nucleus containing positively charged 
	protons, negatively charged neutrons, and is orbited by neutrally charged 
	electrons. (2 Points)
14. True or False The carrier particle foe the 
	electromagnetic force is the electron. (2 Points)
15. True or False 
	The flow of electrons in a wire, amperes, and current are basically the same 
	thing. (2 Points)
16. What is a wavelength (in your own words)? (5 
	Points)
17. What is a frequency (in your own words)? (5 Points)
	
ESSAY:
	18. In 500 words: How do you feel about the possibility of Facebook or other 
	social media being used to secretly influence your choices? Do you feel you 
	are being unknowingly manipulated if this technique was used to sell 
	products or influence your social or political decisions? Has this happened 
	to you? (12 points) 
	
	Electronic Crime
Quiz Two
	
	
Chapter 6 
	- Building an Integrated and Comprehensive Compliance Program for 
	Sustainable Value
Select the best answer.
1. 
	 Effective fraud and misconduct risk management should begin with:
      
	a. A well designed and properly executed ethics and compliance 
      
	b. A program that seeks to prevent, detect, and respond to fraud and 
	misconduct.
      c. The program should be 
	thoroughly integrated into the organization's overall guidance and 
	risk-management framework
      d. The program 
	should be thoroughly integrated into the company's business strategy and 
	operations
      e. The program should not be an 
	isolated set of activities within the organization
      
	f.  All of the above.
Chapter 6 - Building an Integrated and 
	Comprehensive Compliance Program for Sustainable Value
2. Select 
	the best answer. Because managers, officers, and CEOs of 
	corporations are frequently the ones committing electronic crime, the 
	success or failure of a compliance program will rest on the organization's 
	ability to embed a culture of ethics and integrity.
      
	Circle One: TRUE or FALSE
Chapter 6 - Building an Integrated and Comprehensive Compliance Program 
	for Sustainable Value
3. Select the best answer. An 
	affective GRC program is Government, Risk, and Compliance program that 
	protects, but does not enhance business values by fostering a risk-aware 
	culture.
      Circle One: TRUE or FALSE
Chapter 6 - Building an Integrated and Comprehensive Compliance Program 
	for Sustainable Value
Select the best answer. 
4. The 
	key attributes to an effective Compliance Function are:
     
	a. Authority, Responsibility, Competency, Objectivity and  Resources
     
	b. Authority, Responsibility, Due Diligence, Objectivity, and Coordination
     
	c. Authority, Coordination, Auditing, Responsibility, and Coordination
     
	d. Coordination, Responsibility, Authority, Auditing, and Cooperation
Chapter 6 - Building an Integrated and Comprehensive Compliance Program 
	for Sustainable Value
Select the best answer. 
5. An 
	effective Board of Directors overseeing a corporation's compliance program 
	needs information regarding:
     a. Aligning 
	oversight, assessing risk, preventing misconduct, detecting and responding 
	to misconduct, allow the CEO to evaluate the effectiveness of the program.
     
	b. Evaluate the effectiveness of the program by responding to the prevention 
	of misconduct and assigning managers to asses risking taking.
     
	c. Aligning oversight, assessing risk, preventing misconduct, detecting and 
	responding to misconduct, and evaluating effectiveness of the program.
     
	d. Aligning oversight, assessing risk, preventing misconduct, detecting and 
	responding to misconduct, and evaluating effectiveness of the program.
What is Alternating Current?
Matching:
	
6.  Match the best definition in column B with the most 
	appropriate answer in column A.
                    
	A                                            
	B
	
| A. Zero | 1. ____Cycles per second | 
| B. Remains constant | 2. ____Time interval between any two successive wave crests | 
| C. Constantly changing | 3. ____The mazimum positive amplitude of a wave in the opposite direction | 
| D. Crests | 4. ____Maximum positive amplitude of a wave | 
| E. Trough | 5. ____The amplitude of an AC current | 
| F. Period | 6. ____Amplitude of a DC voltage | 
| G. Frequency | 7. ____Any point along the time axis | 
 Article: Relationships, Community, and Identity in the New Virtual 
	Society
Select the best answer. 
7. In this 
	phenomenon, relationships for young people can be just as powerful and 
	meaningful as those in the real world.
     a. 
	Virtual Society or virtual space
     b. The the 
	Internet Only
     c. Chat Rooms Exclusively
     
	d. Emailting
     e. Texting above asll other mediums
Article: Relationships, Community, and Identity in the New Virtual 
	Society
Select the best answer.
 8.  When 
	the VCR was invented, many people predicted the demise of movie theaters; 
	after all, if you can watch a movie at home why would anyone pay to go out 
	to a theater? Today, movie theaters are doing a record business.
     
	When video conferencing was developed, some people predicted that many 
	airlines and hotels would go out of business; after all, why would 
	businessmen spend thousands of dollars on airfare, hotels, and meals to 
	attend a business conference when they could stay in the office and do it on 
	line? Well, airlines and hotels are busier than ever.
     
	The social turmoil of the 1970s was proclaimed by many to be the end of the 
	nuclear family. But the family is still here; it's just different.
     
	People are now predicting that texting, email, chat rooms, cell phones, 
	blogs, Facebook relationships, tweeting, on-line dating, and other social 
	media are going to diminish our person-to-person interactions and destroy 
	human personal interaction.
     What actually will 
	happen is some human relationships will become shallower through cyber space 
	relationship while others will become stronger. Things will change, but 
	still be meaningful. As stated in Article 1 - Technology giveth and 
	technology taketh away.
Circle One: TRUE or FALSE
Article: Relationships, Community, and Identity in 
	the New Virtual Society
Select the best answer. 
9.   
	Your 
	found identity is one created by your circumstances - who your 
	parents were, your ethnicity, your religion, your gender, your history and 
	education and past experiences.  Your made identity is...
     
	a. ...the style of clothes and jewelry you wear
     
	b. ...your chosen behaviors
     c. ...your selected 
	automobile, activities, and clubs you have joined
     
	d. ...how you want others to see you
     e. All of 
	the above
Article: Are U Friends 4 Real?
Select the best 
	answer.
10.  "Flaming" is a cyber term meaning text or 
	email that invokes anger or other high emotions resulting from the hostile 
	interpretation of such messages.  But texting, email, and Facebook are 
	void of the human voice, the voice tone indicating anger, sadness, or 
	frustration; the pauses between words indicating thought or concern, and the 
	speed of the speech possibly indicating anxiousness.
     
	The phrase "You can make a marketing plan," can be said many different ways 
	where one is a complement, the other is an insult, yet a third filled with 
	sarcasm. It depends on where the pauses are, where the voice volume 
	increases, and the voice tone.  Such communication is also void of body 
	language and facial expressions which often make up over 80% of our personal 
	communications.
      I once wrote what I 
	considered to be a very grateful email of thanks and appreciation to a 
	colleague for the effort he and his staff put into a wonderful weekend 
	wedding. Shortly after sending the letter, I  received a very defensive 
	phone call asking how I could be so unfair and insulting when he tried so 
	hard to make the event successful. Somewhat dismayed, I went to his office 
	and read to him my email with a kind voice tone, concerned inflections, 
	appreciative pauses, and accompanied by facial expressions showing happiness 
	and gratitude. What a difference! He was amazed!
      
	Friendships, romantic relationships, business memos, colleague 
	correspondence, and instructions to employees, spouses, and children are 
	often in the form of texts. Should care be taken in these messages to avoid 
	"flaming" interpretations?
     a. Yes, care should always be taken to avoid "flaming 
	interpretations" even though success is not guaranteed.
     
	b. No; flaming can't be avoided.
     c. No, if 50 
	people read the same message there will be 50 different interpretations. How 
	can one attempt to overcome that?
     d. No, email 
	and texting and other written forms of communication should always be 
	replaced with phone calls to avoid flaming.
Article: Hacking the Lights Out
Select the best 
	answer
11. The Stuxnet virus was planted into 
	Iran's nuclear program computers by:
     a. Internet 
	virus attack through email
     b. A back door attack 
	through a computer's firewall
     c. Through a USB 
	stick handed to an unsuspecting employee
     d. 
	Through the power grid at the local power station
     
	e. From a trojan horse implanted into a didigital procedures manual
Article: Hacking the Lights Out
Select the best 
	answer
12. When Iran's nuclear centrifuges were spinning out of 
	control at a dangerous RPM, why didn't the control personnel intervene 
	before the centrifuges were destroyed?
     a. The 
	virus hit the centrifuges in the middle of the night when the neclear plants 
	were closed
     b. The virus send false signals to 
	the supervising controllers indicating all operations were operating 
	normally
     c. The Stuxnet virus stopped the 
	control mechanisms sent to supervisory personnel.
     
	d. The Stuxnet virus struck Iran's nuclear facilities on a holy holiday and 
	the plants were closed
Article: Hacking the Lights Out
Select the best 
	answer
13. All electricity furnished for home and industrial use 
	in the United States uses 60-cycle alternating current. The power grid is 
	the electrical supply circuits of thousands of power companies in United 
	States all connected together. The 60 cycle AC current coming from any power 
	company must match (be in sync) with the 60 cycle timing on the grid. The 
	Aurora cyberattack in 2007 was staged by a pretend hacker working for the 
	Department of Homeland Security to bring down an electric generator in a 
	power company attached to the grid. How did this attack function?
     
	a.  The hacker created and out-of-sync 60 cycle current in opposition 
	to the generators 60 cycle output.
     b.  The 
	hacker planted a bomb under the generator
     c.  
	The hacker planted a bomb under the generator
     d.  
	The hacker pulled the generator's circuit breaker shutting the generator 
	down
Article: Hacking the Lights Out
Select the best 
	answer
14. Computers are subject to attack. 
	The nation's electric power grid is also subject to attack by cybercriminals 
	and it is much easier to hack than many protected computers.
      
	Circle One: TRUE or FALSE
Article The Bride of Stuxnet
Select the five answers 
	that apply.
15. Once the virus Flame infects a 
	computer, what happens?
     a. It records every 
	keystroke
     b. It creates a perfect log of all 
	activities
     c. It takes pictures of the monitor 
	screen every 60 seconds
     d. It sends out bogus 
	emails to everyone on the computer's email list
     
	e. It takes control of Bluetooth capability turning into a hub for a 
	wireless network
     f.  It copies documents 
	and files on the computer's hard drive
Article The Bride of Stuxnet
Select the besat answer
	16. Stuxnet was a virus designed to work quickly, and in doing so it can be 
	discovered quickly, so it must do its damage fast. Flame was a virus 
	concerned with stealth and patience, moving very slowing, and infecting 
	fewer machines.
     Circle OneL: TRUE or FALSE
Chapter 7 - Prevention: Risk Assessment
Select the best answer
	17. The definition of
	
	what is as follows: A step-by-step process for identifying the 
	quantitative and qualitative nature of potential integrity breakdown?
     
	a. Design considerations
     b. Risk Assessment
     
	c. Business goals and stategy
     d. Control 
	Optimazion
     e. Risk Taking
Chapter 7 - Prevention: Risk Assessment
Select the best answer
	18. What is the below procedure entitled?
(1) Identify Business Units, 
	locations, or processes to assets
(2) Inventory and categorize fraud and 
	misconduct risks
(3) Rate risks based on likelihood and significance of 
	occurrence
(4) Remediate risks through control optimization
     a.  The four fundamental steps of risk assessment
     
	b.  The four fundamental steps of risk assessment
     
	c.  The four levels of crime, fraud, and misconduct
     
	d.  The four basics of the fraud rectangle
     
	e.  The control optimization for risk procedures
Chapter 7 - Prevention: Risk Assessment
Select the best answer
	19. The first step is starting a risk assessment program is:
     
	a.  Putting someone responsible in charge
     
	b.  Deciding those aspects or parts of the organization that will be 
	subject to the risk assessment.
     c.  
	Establishing a focus group to evaluate the overall risk of the company
     
	d.  Review documentation from previous risk assessment groups
     
	e. Have the focus group consult with the risk assessment team.
Chapter 7 - Prevention: Risk Assessment
Select the best 
	answers - There are FOUR (4) correct answers
20. It is wise for 
	the risk assessment team to have a company document review take place in 
	order to determine company policies, procedures, and internal control.  
	These documents to be reviewed include: 
     a.  
	Code of Conduct
     b.  Applicable job 
	descriptions
     c.  Employee attendance 
	records
     d. Organizational charts
     
	e. Response and improvement systems
     f.  
	Competitor's violation records
     g. All of the 
	above
Chapter 7: Prevention: Risk Assessment
Select the best answer
	21. Once the assessment team has estimated risk likelihood and significance, 
	it is helpful to plot risks on an axis representing their significance and 
	likelihood of occurrence using a heat map.
       
	Circle One: TRUE or FALSE
Chapter 7
Secelct the best answer
22. The primary 
	coil of a transformer has 200 volts applied to it and 100 coils. The 
	secondary side of the transformer has 50 coils. What is the voltage output 
	on the secondary side?
     a. 50 volts
     
	b. 100 volts
     c. 200 Volts
     
	d. 100 amps
     e.  4 volts
Select the best answer
23. If you cut the resistance in half in an 
	electrical circuit with 100 volts, the the amperes will double.
     
	Circle One: TRUE or FALSE
Chapter 7
Select the best answer
24. If the primary input side of a 
	transformer has 500 turns and 100 volts, how many turns (coils) would you 
	need on the secondary output side for the output to be 20 volts?
     
	a.  100 coil turns
     b.  50 coil turns
     
	c.  200 coil turns
     d. 20 coil turns
     
	e. None of the above
All your Ohm's law formulas are listed in the above 
	wheel.
Refer to Chapter 3 on Electricity DeMystified if necessary.
     
	A spy for a competitive industry wants to listen to private conversations 
	being broadcast over a competitor's private walkie-talkie network where 
	management discuss test results in the field with engineers. The spy's 
	office is too far away to receive the competitor's walkie-talkie signals. 
	Somehow the spy needs to double the power output of the competitor's 
	walkie-talkie signal. In order to accomplish this, the spy visits the 
	competitor impersonating a communications walkie-talkie and radio company, J 
	& B Communications, offering a free introductory deal. The introductory 
	offer is to clean and tune all the competitor's walkie-talkies for free with 
	the understanding that J & B Communications would be considered for any 
	repair jobs in the future. The competitor agrees to the deal and give the 
	spy 10 walkiw talkies to be cleaned, reconditioned, and returned in the 
	morning. This is called social engineering.
The spy takes the walkie-talkies to his office and opens them up. The 
	circuit on the antenna looks like the one below.
Do not be discouraged 
	about this electronic circuit. Let's say it is the power output circuit to 
	each walkie-talkie's antenna. The power to the antenna is 2 watts.
I = 
	E/R  =  (Amps equals voltage divided by resistance)
I = 10/50 = 
	(Amps equals 10 volts divided by 50 ohms) = .2 amps
The 
	power output of the antenna is measured in watts. P = watts
P = EI (Power 
	equals voltage times amps)
P = 10 X .2 = 2 watts. The walkie-talkies currently 
	transmits a 2 watt signal.  The spy wants to double this power output 
	to 4 watts. This would make the walkie-talkies more powerful, transmitt a 
	longer distance, and allow the spy to monitor his competitor's 
	conversations.
The spy decided to change the 50 Ohm resistor R3 in each 
	walkie- talkie to a different value.  What value in ohms should the new 
	resistor be in order to double the output power of each walkie talkie?
I = E/R  =  (Amps equals voltage divided by resistance)
I = 
	10/? 
	= (Amps equals 10 volta divided by 
	? 
	ohms) = .4 amps
The power output of the antenna is 
	measured in watts. P = watts
P = EI (Power equals voltage times amps)
	P = 10 X .4 = 4 watts.
	
Do you see now why you learned 
	ohm's law? It is frequently used in electronic crime. (The actual circuit 
	above would require different formulas beyond the scope of this course.)
     a. 50 ohms 
     b. 200 ohms
     
	c. 35 ohms
     d. 25 ohms
     
	e. None of the above
Select the best answers from the matching table
26. Insert the best 
	answer from column A into Column B
| A. Captain Krunch | ___Steve Wozniak | 
| B. A Hacker who helped form Apple Compluter | ___ John DFraper | 
| C. A young teenager who became a phreaker and hacker | ___Kevin Mitnik | 
| D. One of the founders of Apple Computer and the CEO and chairman | ___Steve Jobs |