Posts

Crime Classification Manual Part II Chapter 10 B 44

Image
Crime Classification Manual Part II Chapter 10 B 44 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   The provider refused to provide the requested access. Approximately ten minutes after the threat was made, the juvenile and others initiated a denial-of-service attack (classification 513) that succeeded in shutting down a significant portion of the telephone service provider’s Web operations.

Crime Classification Manual Part II Chapter 10 B 43

Image
  Crime Classification Manual Part II Chapter 10 B 43 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In June 2005, the juvenile called a second major telephone service provider because a phone that a friend had fraudulently activated had been shut off. In a recorded telephone call, he threatened that if the provider did not provide him access to its computer system, he would cause its Web service to collapse through a denial-of-service attack—that is, an attack designed to ensure that a Web site is so flooded with requests for information that legitimate users cannot access it.

Crime Classification Manual Part II Chapter 10 B 42

Image
  Crime Classification Manual Part II Chapter 10 B 42 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In the spring of 2005, the juvenile, using a portable wireless Internet access device, arranged with one or more associates to place a bomb threat to a school in Massachusetts and local emergency services, requiring the response of several emergency response units to the school on two occasions and the school’s evacuation on one.

Crime Classification Manual Part II Chapter 10 B 41

Image
  Crime Classification Manual Part II Chapter 10 B 41 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Also in January 2005, an associate of the juvenile set up accounts for the juvenile at a company that stores identity information concerning millions of individuals, allowing the juvenile to look at the identity information for numerous individuals, some of which he used for the purpose of looking up the account information for the victim whose personal information he posted on the Internet.

Crime Classification Manual Part II Chapter 10 B 40

Image
Crime Classification Manual Part II Chapter 10 B 40 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   He accessed the information stored on this individual’s mobile telephone and posted the information on the Internet. During this same period, the juvenile used his access to the telephone company’s computer system to set up numerous telephone accounts for himself and his friends, without having to pay for the accounts.

Crime Classification Manual Part II Chapter 10 B 39

Image
  Crime Classification Manual Part II Chapter 10 B 39 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In January 2005, the juvenile gained access to the internal computer system of a major telephone service provider that allowed him to look up ac- count information of the provider’s customers. He used this system to discover key information about an individual who had an account with the telephone service.

Crime Classification Manual Part II Chapter 10 B 38

Image
Crime Classification Manual Part II Chapter 10 B 38 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   In August, he logged into the Internet computer system of a major Inter- net service provider (ISP) using a program he had installed on an employee’s computer. This program allowed the juvenile to use the employee’s computer remotely to access other computers on the internal network of the ISP and gain access to portions of the ISP’s operational information.