Question 1
In United States v. Morris (1991), the First Circuit held that to establish a violation of 18 U.S.C. § 1030 (a)(5), the government must prove which of the following? A The defendant intended both the access and the resulting damage B The defendant intentionally accessed the computer without authorization, and damage resulted from that access — regardless of whether damage was intended C The defendant's tool was designed specifically to cause harm D The damage exceeded $10,000 in a single calendar year
Question 3
What does the $5,000 threshold in 18 U.S.C. § 1030 (c)(4)(A)(i)(I) determine? A The minimum restitution the government will seek in a CFAA prosecution B The line between a civil and criminal CFAA claim C When unauthorized access causing damage becomes a felony (loss exceeding $5,000 in a one-year period) D The cap on fines for a first-time CFAA offender
Question 4
The Kevin Mitnick prosecution established which lasting legal precedent regarding sentencing? A Social engineering is not covered by any federal criminal statute B Supervised release conditions restricting internet access are a legitimate and judicially upheld sentencing tool C Pre-trial detention without bail is unconstitutional for computer crime defendants D Theft of source code is protected speech under the First Amendment
Question 8
How did federal prosecutors identify Ross Ulbricht's personal Bitcoin wallets? A Ulbricht disclosed them voluntarily during a cooperation interview B A foreign government provided wallet addresses under an MLAT request C Blockchain analysis correlating his wallet addresses with identifiable transactions on the public ledger, combined with subpoenaed exchange records D The FBI broke the Bitcoin cryptographic hash to reverse-engineer his private keys
Question 9
In United States v. Jeremy Hammond , the court rejected the entrapment defense on what grounds? A The Sixth Amendment does not apply to computer crime prosecutions B An FBI-directed informant cannot legally constitute government inducement C Hammond was predisposed to commit the offenses, as demonstrated by his documented history of prior computer intrusions and enthusiastic AntiSec participation D Entrapment is only available as a defense if the defendant is charged with a violent crime