Telephone/Computer Crimes Flashcards

(40 cards)

1
Q

Venue for Computer Crimes (Where can the case be tried?)

A
  • Where any act was performed
  • Where the owner has their principal place of business
  • Where the offender has control/possession of proceeds
  • Where access was made
  • Where the offender resides
  • Where the computer used was located at the time of the offense
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Venue for Telephone Crimes (Where can the case be tried?)

A

Where the call was placed
OR where the call was received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crime: Computer Fraud

A

Using a computer without authority (or exceeding authority) to:
* Obtain property or services by false pretenses
* Embezzle or commit larceny
* Convert the property of another .

Requires using the computer as a computer (not just as a physical object). Ex: Logging into someone’s account to transfer money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition: “Person” (Computer Crimes)

A

Individual, partnership, association, corporation, or joint venture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition: “Computer” (Computer Crimes)

A

A device that accepts digital/similar info and manipulates it based on instructions. Includes phones, gaming systems, smart devices. Excludes: simple calculators, typewriters, fax machines, highly specialized single-task devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Definition: “Property” (Computer Fraud)

A

Includes real property, computer services, and computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transmission of Unsolicited Commercial Electronic Mail (SPAM

A

Using a computer with intent to falsify or forge email transmission info (e.g., false routing, concealing identity) OR selling software for that purpose.

Key elements:
* Must be commercial/business related (intent to profit).
* Must involve deceit about the origin/sender.
* Doesn’t apply if there’s an existing business/personal relationship (e.g., emails after signing up).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Trespass (Hacking Statute)

A

Requires malicious intent or intentional deception to unlawfully:
* Remove, disable, erase, or alter computer data/programs.
* Cause a computer to malfunction.
* Cause physical injury to property via computer.
* Make unauthorized copies.
* Track keystrokes.
* Install software to take control or disrupt data sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Invasion of Privacy (“Nosey Nelly” Statute)

A

Intentionally using a computer to examine without authority specific types of personal information: employment, financial, medical, or identifying info (SSN, DL#, bank acct#, CC#, passwords).

“Examines” means reviewing info after knowing you lack authority. Common Ex: Snooping in official databases like VCIN or eMag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using a Computer to Gather Identifying Information

A

A non-law enforcement officer using trickery or deception via computer specifically to obtain identifying information about someone. Focus is on the acquisition of info through deceit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Theft of Computer Services

A

Willfully obtaining computer services without authority. Classic Ex: Using a neighbor’s unsecured WiFi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personal Trespass by Computer

A

Using a computer to cause physical injury to a person. Ex: Hacking a medical device like a pacemaker or hospital equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Harassment By Computer

A
  • Using a computer to communicate:
  • Obscene, vulgar, profane, lewd language.
  • Suggestions/proposals of an obscene nature.
  • Threats of any illegal or immoral act.

Focus is on obscenity (high bar) or threat of an illegal act. Distinguish threats from mere insults (see notes for examples).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Obscenity/Threat By Telephone (18.2-427)

A

Using a telephone to communicate:
* Obscene, vulgar, profane, lewd language.
* Suggestions/proposals of an obscene nature.
* Threats of any illegal or immoral act. Focus is on obscenity (high bar) or threat of an illegal act. Similar language to Harassment by Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Giving False Information to Another by Telephone (18.2-428)

A

Maliciously advising or informing someone about the death, accident, injury, illness, or disappearance of a third person, knowing the information is false.

  • Must be about a person, not property or a pet.
  • Requires malicious intent (not an honest mistake).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intent to Annoy/Harass by Telephone (18.2-429)

A

Causing a telephone, pager, or other device to ring or signal with the specific intent to annoy.

  • Intent is key; repeated calls can establish intent.
  • Allowing use of one’s phone knowing it’s for this purpose also violates.
  • Not a violation if calling for legitimate help (e.g., 911) as intent is not to annoy.
  • Enhanced penalty (jailable) for harassing emergency personnel (e.g., repeated false 911 calls).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

False Caller ID (Number Spoofing)

A

Displaying false caller ID information with the intent to defraud, intimidate, or harass.

  • Must prove who made the call (voice ID, etc.), not just rely on the spoofed number.
  • Simply blocking a number is NOT a violation.

Exceptions exist for law enforcement, federal agencies, etc.

18
Q

Threats in Writing (18.2-60) - General

A

Knowingly communicating in writing a threat to kill or do bodily harm to a specific person or their family, placing them in reasonable apprehension of death or bodily injury.

  • Threat must be specific to kill/harm, not just any crime or insult.
  • Doesn’t require direct communication (e.g., a public post can count if it communicates the threat to the victim).
  • Victim must reasonably fear the threat.
19
Q

Threats in Writing (18.2-60) - Act of Terrorism Enhancement

A

Enhanced penalty if the written threat is an act of violence intended to:

  1. Intimidate the civilian population at large, OR
  2. Influence government conduct/activities through intimidation. Ex: Written threat to shoot up a courthouse.
20
Q

Threats in Writing (18.2-60) - School Grounds Enhancement

A

Enhanced penalty if an adult (18+) makes a written threat (to kill/harm) intended to intimidate civilians, influence government, or compel evacuation, related to school grounds or school activities.

21
Q

Oral Threats on School Grounds / Against Health Care Provider

A
  • A school employee while on school property or at a school-sponsored activity.
  • A health care provider engaged in their duties. (Note: This addresses oral threats in specific contexts, distinct from the general written threat statute 18.2-60).
22
Q

“Knowingly Exceeded Authority” (Computer Fraud)

A

A key element in Computer Fraud. This applies when a person has some level of legitimate access to a computer or system, but intentionally goes beyond that authorized level to commit fraud, embezzle, or convert property. (Think: An employee using their work login to access files they aren’t permitted to see and transferring funds, not just an outside hacker)

23
Q

Distinction: Computer Fraud vs. Computer Trespass

A

Computer Fraud: Focus is on the outcome of dishonestly obtaining property or services using a computer (false pretenses, embezzlement, conversion).

Computer Trespass (Hacking): Focus is on the act of maliciously interfering with a computer, program, or data (deleting, altering, causing malfunction, unauthorized copying, installing malware, etc.), regardless of whether property was obtained.

24
Q

Distinction: Specificity of Threats Required

A

Threats in Writing (18.2-60): Requires a specific threat to KILL or DO BODILY HARM. Focus is narrow, on serious physical violence.

Harassment by Computer / Obscenity/Threat by Telephone: Prohibit broader threats of ANY ILLEGAL OR IMMORAL ACT. Can include threats beyond physical violence.

25
"Reasonable Apprehension" (Threats in Writing - 18.2-60)
Essential element for written threats to kill/harm. Means the prosecution must show the threat caused the victim to genuinely fear death or bodily injury, AND that this fear was *objectively* *reasonable* under the circumstances (considering the threat's nature, context, and any knowledge about the sender). It's about the threat's perceived credibility to the victim.
26
Scenario: Communication states, "Puss pussy squat to pee in ladies room grow a set of ball." Is this likely a chargeable threat under Obscenity/Threat statutes?
No. While vulgar and insulting, it doesn't contain a clear threat of an illegal or immoral act by the sender, nor a threat to kill or do bodily harm. It falls into the category of offensive language.
27
Fucking cunt, fucking bitch, you fucking suck. Is this likely a chargeable threat under Obscecity/Threat statutes?
No. This is vulgar abuse and insulting language. It does not contain a threat of an illegal or immoral act by the sender or a specific threat to kill or do bodily harm.
28
Scenario: Communication includes phrases like "Sex with anonymous strangers, risky gutter sex, vacuum baby to death, Coke whore baby killing prostitute. Is this likely a chargeable threat under Obscenity/Threat statutes?
No. This is vulgar abuse and insulting language. It does not contain a threat of an illegal or immoral act by the sender or a specific threat to kill or do bodily harm.
29
Scenario: Communication includes phrases like "Sex with anonymous strangers, risky gutter sex, vacuum baby to death, Coke whore baby killing prostitute. Is this likely a chargeable threat under Obscenity/Threat statutes?
No, though "close". While extremely offensive, vulgar, and potentially suggesting immoral acts, it may not clearly convey a threat by the sender to commit an illegal act against the recipient or a threat to kill/harm. It's highly offensive language rather than a direct threat from the speaker.
30
Scenario: Communication states, "Hey bitch! You want to wonder why you don’t have any friends bitch! Im going to fuck you in the worst fucking way. You understand me? Hope youre having a good time with this shit. And whats going to happen is not going to be pretty." Is this likely a chargeable threat under Obscenity/Threat statutes?
Yes. This contains a direct threat ("Im going to fuck you in the worst fucking way," "whats going to happen is not going to be pretty"). It implies severe harm or an illegal act by the sender against the recipient, meeting the criteria for a threat.
31
Scenario: Communication states, "I have some fireworks for you. Bring all three down. All you are gonna fall." Is this likely a chargeable threat under Obscenity/Threat statutes?
Yes. This language strongly implies impending violence or attack ("fireworks," "bring all three down," "gonna fall"), constituting a threat of an illegal act or bodily harm.
32
Fucking punk ass bitch mf going to get everything coming to you. Is this likely a chargeable threat under Obscenity/Threat statutes?
Yes. This implies impending retribution or harm ("going to get everything coming to you"), which qualifies as a threat of an illegal act or potential bodily harm.
33
Scenario: Someone posts rap lyrics online containing specific threats against a person mentioned in the lyrics. The victim sees the post. Is this considered "communicated" for a Threats in Writing charge?
Yes, this likely counts as communication. The threat doesn't have to be sent directly to the victim (like a private message or letter). Making it publicly available where the victim can (and does) see it is generally sufficient communication for the statute.
34
When evaluating a threat in writing ("I'm going to X to you"), evidence shows the accused has actually done X to others previously or bragged about doing similar things they actually carried out.
This strongly supports the element of Reasonable Apprehension. The fact that the accused has a history of carrying out similar actions makes the current threat much more credible, thus making the victim's fear objectively reasonable UNLESS victim states not in fear
35
Scenario: You sign up for a Costco membership and begin receiving their promotional emails. Separately, you receive an unsolicited email from an unknown company with a disguised sender address trying to sell you diet pills. ## Footnote Which of these scenarios illustrates unlawful SPAM (Transmission of Unsolicited Commercial Electronic Mail) and why?
Answer: The email selling diet pills with a disguised sender address. Key Elements for SPAM: It's commercial, and there's intent to falsify/forge/deceive about the origin. The Costco emails are permissible due to the existing business relationship established when you signed up.
36
Scenario: An employee with authorized access to a restricted database (like VCIN or eMag for law enforcement) uses that access to look up personal information about their neighbor purely out of curiosity. ## Footnote What computer crime concept does this snooping illustrate?
Answer: Computer Invasion of Privacy. This involves intentionally examining without authority employment, financial, or personal information stored on a computer system. The access might be generally authorized for work, but using it for personal curiosity is "without authority" for that specific search.
37
Scenario: You discover your neighbor's home WiFi network is not password-protected, so you connect your laptop to it daily to browse the web without asking them. What computer crime concept does using the neighbor's unsecured WiFi illustrate?
Theft of Computer Services. This involves willfully obtaining computer services (in this case, internet access provided via their network) without authority.
38
39
Scenario: A malicious actor remotely hacks into a medical device connected to a patient, such as an insulin pump or pacemaker, and alters its settings, causing direct physical harm to the patient. What specific computer crime concept does hacking a medical device to harm someone illustrate?
Answer: Personal Trespass by Computer. This crime specifically involves using a computer to cause physical injury to a person.
40