Chapter 9 - 1" problem (10 points) Identify the specific computer fraud and abuse technique used in each the following actual examples of computer wrongdoing. Your answer should be the specific type of fraud. (Do NOT give the general categories of hacking, social engineering, or malware) Description of Fraud Name of Fraud and Abuse Technique a. Daniel Baas was the systems administrator for a company that did business with Acxiom, who manages customer information for companies. Baas exceeded his authorized access and downloaded a file with 300 encrypted passwords, decrypted the password file, and downloaded Acxiom customer files containing personal information. The intrusion cost Acxiom more than $5.8 million b. Cyber-attacks left high-profile sites such as Amazon.com, eBay, Buy.com, and CNN Interactive staggering under the weight of tens of thousands of bogus messages that tied up the retail sites computers and slowed the news site's operations for hours c. Susan Gilmour-Latham got a call asking why she was sending the caller multiple adult text messages per day. Her account records proved the calls were not coming from her phone. Neither she nor her mobile company could explain how the messages were sent After finding no way to block the unsavory messages, she changed her mobile number to avoid further embarrassment by association d. A federal grand jury in Fort Lauderdale claimed that four executives of a rental car franchise modified a computer-billing program to add five gallons to the actual gas tank capacity of their vehicles. Over three years, 47.000 customers who retumed a car without topping it off ended up paying an extra $2 to SIS for gasoline e. MicroPatent, an intellectual property firm, was notified that their proprietary information would be broadcast on the Internet if they did not pay a S17 million fee. The hacker/blackmailer was caught by the FBI before any damage was done