12/27/2023 0 Comments Ubs to buy paine webber![]() The fact that several people can use the same user ID and password to get into the system at the same time was a great disadvantage for the organization. All computers were taken from the house before the forensic image was made, which gave the team an opportunity to put the code on the computer. ![]() Moreover, there was an unknown fingerprint on the copy of the code, which means that someone could have put it in Duronio’s house. Except for that, the experts were former hackers, and Adams wanted to prove that they are not reliable. In this way, one could have had biased views (Easttom, 2014). First of all, the expert witness whose words proved that the suspect was guilty represented the company that was paid for conducting the forensic analysis. He might have also wanted to prove that the evidence was planned, and it could not be used during the trial because the suspect was set up.Ĭhris Adams received an opportunity to reveal such an argument because of the inefficient forensic procedure. As a result, Adams increased the chances of facing the situation when the jury fails to come to the common decision or at least could have more time to find and reveal mitigating factors to commute a sentence (Fulero & Wrightsman, 2008). In this way, the members of the jury would be likely to spend some time discussing the defense attorney’s words. ![]() His words lacked evidence and authoritativeness but made others consider such possibility and distracted attention from Duronio. Adams wanted to implant doubts in the minds of the jury. still, they had a particular influence on the situation. Of course, such claims did not allow Chris Adams to prove the guilt of CISCO and Inc. Trying to prove his client’s innocence, Duronio’s defense attorney gave the hint during the trial, mentioning that another company could have caused the damage and presupposing that the forensic team made a mistake when assessing the situation. The CFAA does not allow individuals to access the computer without authorization, steal financial data, commit computer fraud, create and use a code that can affect the system adversely, share passwords to influence commerce and to extort (Legal Information Institute, 2016). 7).Īccording to this act, the criminal can be put in prison for up to 20 years and can be made to pay a fine even though the action was not intentional but done recklessly. The legislation that is appropriate for this situation is “The Computer Fraud and Abuse Act (CFAA), which makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss” ( Computer crime laws, 2016, p. As a result, the man was charged with “securities fraud (count 1), mail fraud (counts 2 and 3), and fraud and related activity in connection with computers (count 4)” (DeFranco, 2014, p. Except for that, there was a hardcopy printout in his bedroom (Gaudin, 2006). Both of his computers had this information. With the course of time, the parts of the code that was utilized in the logic bomb were found when examining the suspect’s home. As a result, the man got an opportunity to obtain a part of the company’s shares while UBS-PW lost $3 million. As he fired, UBS-PW suffered from the logic bomb execution. At that moment Duronio was already ready to quit and had his things packed. Even though his boss tried to have the full bonus awarded, he failed. He was already dissatisfied with his wage, and this situation made him angrier. Still, one of the workers, Roger Duronio, started complaining.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |