Essay
Adam is fired from a publishing company for sexual harassment. In retaliation, Adam forces entry into the company warehouse and set numerous pipe bombs rigged on small propane tanks to ensure rapid spreading of flames. Each bomb has a timer set to go off at midnight. One of the warehouse employees is working late in a back room of the warehouse, but does not see Adam setting the bombs. Adam leaves the warehouse and drives to the airport where he boards a plane to develop a cover to enable him to claim that he was not in the area at the time of the fire. At midnight each bomb explodes igniting the propane tanks. Within minutes the entire structure is engulfed in flames. The warehouse employee never had a chance as he succumbed to the flames and noxious fumes. Additionally, the explosives created a power outage through a neighborhood including 5000 homes and business. Five other people died because of the lack of electricity required to keep life-saving equipment in operation. Investigators are able to identify Adam as the suspect based on recreation of the crime scene and piecing together all of the explosives, timers, and propane tanks. What charges will be filed against Adam? Since he was unaware that anyone was in the warehouse, will that influence his charges? What about the five people who died because of the power outage? Will Adam be charged with those deaths?
Correct Answer:

Verified
Arson, arson at comm...View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q50: Surreptitious remaining<br>A)Breaking into computer systems with the
Q51: What is the practice of posing as
Q52: Compare the crimes of criminal mischief and
Q53: What was once called malicious mischief and
Q54: The Model Penal Code defines the actus
Q56: One primary example of cybercrime comes from
Q57: What term applies to the act of
Q58: The <i>mens rea</i> of arson varies by
Q59: Sam has the ability to hack into
Q60: Cybercriminals may seek to corrupt data; disrupt