Posts

Crime Classification Manual Part II Chapter 10 B 42

Image
  Crime Classification Manual Part II Chapter 10 B 42 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In the spring of 2005, the juvenile, using a portable wireless Internet access device, arranged with one or more associates to place a bomb threat to a school in Massachusetts and local emergency services, requiring the response of several emergency response units to the school on two occasions and the school’s evacuation on one.

Crime Classification Manual Part II Chapter 10 B 41

Image
  Crime Classification Manual Part II Chapter 10 B 41 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Also in January 2005, an associate of the juvenile set up accounts for the juvenile at a company that stores identity information concerning millions of individuals, allowing the juvenile to look at the identity information for numerous individuals, some of which he used for the purpose of looking up the account information for the victim whose personal information he posted on the Internet.

Crime Classification Manual Part II Chapter 10 B 40

Image
Crime Classification Manual Part II Chapter 10 B 40 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   He accessed the information stored on this individual’s mobile telephone and posted the information on the Internet. During this same period, the juvenile used his access to the telephone company’s computer system to set up numerous telephone accounts for himself and his friends, without having to pay for the accounts.

Crime Classification Manual Part II Chapter 10 B 39

Image
  Crime Classification Manual Part II Chapter 10 B 39 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In January 2005, the juvenile gained access to the internal computer system of a major telephone service provider that allowed him to look up ac- count information of the provider’s customers. He used this system to discover key information about an individual who had an account with the telephone service.

Crime Classification Manual Part II Chapter 10 B 38

Image
Crime Classification Manual Part II Chapter 10 B 38 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In August, he logged into the Internet computer system of a major Inter- net service provider (ISP) using a program he had installed on an employee’s computer. This program allowed the juvenile to use the employee’s computer remotely to access other computers on the internal network of the ISP and gain access to portions of the ISP’s operational information.  

Crime Classification Manual Part II Chapter 10 B 37

Image
  Crime Classification Manual Part II Chapter 10 B 37 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Investigation The offender’s criminal conduct began in March 2004 when he sent a bomb threat to a Florida school. As a result of this threat, the school was closed for two days, while a bomb squad, a canine team, the fire department, and emergency medical services were called in.

Crime Classification Manual Part II Chapter 10 B 36

Image
  Crime Classification Manual Part II Chapter 10 B 36 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Victimology The victims were a Florida school, a major telephone service provider, a school in Massachusetts, and local emergency services, requiring the response of several emergency response units to the school. The victims suffered approximately $1 million in damages.