Reference no: EM133681723
Bjorn Daniel Sundin and Shaileshkumar P. Jain, along with others, owned and operated Innovative Marketing, Inc. (IM), a company that sold antivirus and related software to customers in 60 countries. The headquarters was based in Belize with another location in Kiev, Ukraine. IM quickly grew in response to the great demand by customers who contacted IM because their computer had shown a message indicating a malware infection. Between 2006 and 2008, IM made hundreds of millions of dollars in profits and continually grew its organization and number of employees. In 2008, the Federal Trade Commission began investigating IM after having received more than 1,000 complaints from customers. To their surprise, IM's computers were not password protected. The investigation showed that the customers of IM were in fact their victims, as IM itself had infected the computers with a malware. The malware showed a fake warning message about a virus infection and then prompted the victims to click on a link to IM to buy virus removal software for $30 to $70. The computers never had a virus, and the sole purpose of the company was the development and use of "scareware" as a means of defrauding individuals and companies. In 2008, the FBI indicted Sundin and Jain on 24 counts of wire fraud, conspiracy to commit computer fraud, and computer fraud. They are on the FBI's Most Wanted list. They continue to be fugitives, hiding in countries that do not pursue cybercriminals.
Refer to Project Overview for an overall picture of the project.
- Discuss the role that technology plays as a landscape for cybercrime.
- Drawing on the above case, and making appropriate assumptions as you see fit, explain ways that IM took advantage of its client's trust in committing crimes. For example, remember to include IM's unauthorized access to its clients' data, breaking into their privacy.
- Research a federal act that may be used in a court proceeding to prosecute IM's executives.
- Construct a hypothetical case against these individuals based on the steps for data preservation and evidence integrity.