Explain how the Internet has become a tool for fraud. Provide a specific example
What will be an ideal response?
• Terrorists use online activity in identity theft and gaining access to bank and credit card accounts.
• They also sell items at Internet auctions.
• Security fraud is another method of raising funds.
• For example, a group might buy a large amount of stock in a company that is fairly inactive.
• They then fill the Web with stories of new products, new technology, or some other item that will cause the company's stock to increase.
• As the stock value increases, terrorists sell the stock at an inflated price even though the company had no real increase in value.
• Before the stock drops back to its normal level, the terrorists make a huge profit.
• This process is known as "pump and dump," and it is frequently used by dishonest stock speculators and other criminals
You might also like to view...
What aspect of a fingerprint forms the basis for primary classification under the FBI system? What is the main drawback of the FBI system?
What will be an ideal response?
What is a downside to mitochondrial DNA?
a. It can be extracted from teeth. b. It requires a large sample. c. Small samples can be used for analysis. d. It is sensitive to contamination.
Under the doctrine of respondeat superior, a public entity is liable for the wrongful acts or omissions of its employees who are acting within the scope of their employment. This is the essence of:
a. Superior liability b. Voracious liability c. Special liability d. Vicarious liability
Explain the different types of weapons of mass destruction
What will be an ideal response?