Explain how the Internet has become a tool for fraud. Provide a specific example
What will be an ideal response?
• Terrorists use online activity in identity theft and gaining access to bank and credit card accounts.
• They also sell items at Internet auctions.
• Security fraud is another method of raising funds.
• For example, a group might buy a large amount of stock in a company that is fairly inactive.
• They then fill the Web with stories of new products, new technology, or some other item that will cause the company's stock to increase.
• As the stock value increases, terrorists sell the stock at an inflated price even though the company had no real increase in value.
• Before the stock drops back to its normal level, the terrorists make a huge profit.
• This process is known as "pump and dump," and it is frequently used by dishonest stock speculators and other criminals
You might also like to view...
What is a downside to mitochondrial DNA?
a. It can be extracted from teeth. b. It requires a large sample. c. Small samples can be used for analysis. d. It is sensitive to contamination.
Under the doctrine of respondeat superior, a public entity is liable for the wrongful acts or omissions of its employees who are acting within the scope of their employment. This is the essence of:
a. Superior liability b. Voracious liability c. Special liability d. Vicarious liability
What aspect of a fingerprint forms the basis for primary classification under the FBI system? What is the main drawback of the FBI system?
What will be an ideal response?
Explain the different types of weapons of mass destruction
What will be an ideal response?