Brian Mettenbrik Research Paper

Superior Essays
Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access requests to the point where the website either slows down to a crawl or goes offline. Prior to the cyber-attack, a video from 2004 depicting actor, Tom Cruise, preaching the churches strange and creepy sentiments was leaked online and viewed millions of times. …show more content…
When 29-year-old Deric Lostutter hacked into the fan website of his local football team, revealing pictures and information related to the rape of a 16-year-old girl that were previously unknown, he never suspected to be labeled a criminal but yet he is. Deric is now facing up to 16 years in a federal prison for violation of the Computer Fraud and Abuse Act, while the rapists (a felony) he helped to expose only served two years. Undoubtedly Deric’s potential sentence is absurd compared to the atrocities he helped to reveal, but regardless Deric broke the law. In similar cases of unreasonable search and seizure of cell phone text messages by law enforcement, officers can face the loss of critical evidence in the case, loss of employment, or even prosecution. In Riley v. California (2014), when the Defendant, Riley, had his cell phone searched without a warrant after the arrest took place the Supreme Court ruled this as being unconstitutional and the action required the use of a warrant. If Deric had a gun and a badge the same precedent would apply to him. Deric unlawfully entered into and searched a database. It was warrantless, but led to the resolution of a crime, as did occur in United States v. Wurie (2014) where the Defendant, Wuire’s cell phone was searched without a warrant, but lead to the discovery of further evidence for his …show more content…
Ken Westin, a security market specialist, views Anonymous attacks as a way to “actually force ISIS to be a little more security savvy… [driving] them to increase their capabilities when it comes to encrypting communication and securing their sites.” ISIS now knows how and where their websites and communication techniques are vulnerable to infiltration. In effect, Anonymous’s efforts are counterintuitive towards their actual goal and are only doing more harm than good. By having the government being able to monitor and track ISIS recruiting actions they can develop plans to effectively combat those activities. Now government agency effectiveness is decreased as ISIS operatives move towards other means of

Related Documents

  • Improved Essays

    Alomar phone should be excluded because the law that authorized the search itself was not reasonable. During the search of the cell phone Det. Colabello should not have opened the photo of the handgun due to the fact that it was not legally authorized nor was there any legal reasoning to open the photos. Legally, officers are permitted to search and gather evidence illegally when they suspect the evidence needed will be destroyed in the time need to apply and receive a warrant. Which is known as “Hot Pursuit”.…

    • 1144 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    What happened was that a cyberbully hacked into the school’s website and posted obscene photos of a student along with his face photoshopped onto other bodies, and racial slurs with gang slogans. The school’s admin tried to take it down as quickly as possible, but it wasn’t an easy task to accomplish. This cyberbully was caught, but he wasn’t tried (Haddock). A 17-year-old boy from North Carolina was tried and charged with cyberbullying on February 28, 2014. This was after he posted a nude photo of a 15-year-old girl on Instagram.…

    • 1172 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Bill Cosby was charged with indecent assaults of rape. These charges uprised from an incident over a decade ago in which Andrea Constand says Mr Cosby drugged her and raped her in his home. Mr Cosby agrees that he will fight this case, which no court has found him guilty as yet. The timing of the criminal charges set by Andrea Constand occurred on the fifteenth of January and waiting longer with a Statute of Limitation would resulted in a tolled. Most importantly, the Statute of Limitation in Pennsylvania for rape and sexual assaults are 12 years total.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Apple was resilient against the federal government for the protection of their users. The FBI unlawful overstepped boundaries as a government official. Vivek Wadhwa was quoted in “Apple-FBI battle over San Bernardino terror attack investigation: All the details” saying “Apple is obstructing law enforcement’s [investigation] and effectively aiding terrorists [since] they changed [their] technology” to purposely limit the access of the FBI. Apple has the right to change their intellectual property. Apple was enhancing their security to meet the growing demands of their users and to protect their information.…

    • 1293 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Their use of statecraft is entirely contingent on their ability to exist within a seam, maintain anonymity and remain mobile. For the state to defeat ISIS they must strategically identify their use of the vulnerable dimensions and collaboratively work to close them. This works to exhaust the options of ISIS to employ strategy while increasing the effectiveness of counter-terror operations (bremmer 259). States do this by utilizing statecraft beyond the traditional application to adjust to the asymmetry of power. Counter Terrorism is state action used to “ inhibit terrorist attacks or curtail their consequences” (Sandler 78).…

    • 1688 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    One direction of the cyber terrorism is to use the latest technology and methods to reveal the bad things done by the government and reveal the real facts to the general public. These groups of cyber-terrorist are commonly referred as hacktivist. The other direction is to use latest technology and methods to plan attacks on different countries to cause damage to countries economy and human life. Even though both are considered to be illegal by law, people have always supported the group of hacktivist who actually the government dark secret to the public. Recently in the media sector, Panama papers are creating sensational new.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In a series of self shot videos dubbed the “Basement Tapes,” both boys document their thoughts in the months leading up to the attack, as well as describing how they acquired so many weapons. The tapes have never been released, due to their inflammatory and disturbingly explanatory nature. Law enforcement feared the tapes could be glorified if used as an instructional tool for copycat killers. Klebold’s own mother even states the only time she was ever angry with her son was after viewing these provocative tapes (Keller). Despite the tapes never being released, a detailed report was supplied by Colorado law enforcement.…

    • 1776 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Frank Timmons Case Study

    • 853 Words
    • 4 Pages

    While on parole he moved in with his wife, Jenny, where his neighbors knew he was a previous inmate but did not care because he was so friendly. Once he started his job as a construction worker this is where the serial murders started. He had forced three teenage girls to go behind a church and molested two of the three girls, then believed to have committed his first murder a month after. After that, he committed many robberies, sexual assaults, and eight more murders during the course of 11 months. Family and friends stated that they arrested the wrong man for the crimes and maintaining his innocence though there is evidence saying otherwise with eye-witnesses and shell casings from a gun they found in his…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Social Therapy Case Study

    • 1251 Words
    • 6 Pages

    Ian mistakenly confessed to the crime because he hit his niece earlier with a toy. After an investigation, Ian’s brother-n-law was found guilty, and he is currently serving a 25-year prison term. Ian’s brother-n-law does not correspond with the family, and it was later determined he was…

    • 1251 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Applied to the events in Paris and other similar terror attacks, idealism tries to ask relatively simple questions like what are the reasons that push people to turn to terrorism. Why the majority of the world is horrified and considers these acts as criminal while terrorist are ready to give up their life to participate in violent actions? Finding the answer to these questions is only the first step. Addressing the influence of terrorism does not establish a solution but can help directing soft power actions to defuse the roots of terrorism. Investing in education and cooperation rather than military threat or retaliation will lead in the long term to de- radicalize terrorist and their potential…

    • 790 Words
    • 4 Pages
    Improved Essays

Related Topics