|Perfect Number of Pages to Order||5-10 Pages|
Using the Computer for Good Discussion
Week 9: Using Technology for Good
A cyber predator using Tor technology brags that he has downloaded and encrypted child pornography. He is not concerned about being identified because his IT skills, he claims, are superior to those of the FBI. Another cyber offender hacks into the U.S. Department of Defense to gather intelligence that he can pass on to foreign governments. A disgruntled employee steals paper files of other employees that include financial information and PIN numbers and sells them to a foreign contact. On the same day, a cybercriminal in Europe hacks into a victim’s personal information, steals his identity, and uses his credit card information to buy merchandise.
Criminals—particularly those who commit offenses online—can be difficult to identify and locate, but Internet resources that can help with this are becoming more prevalent. Can you identify resources to track and apprehend these criminals? Consider the increasing presence of agencies worldwide dedicated to the investigation, apprehension, and prosecution of these offenders. Are these agencies successful in reducing victimization?
This week, you will take a look at how crime is addressed locally and internationally. You will also identify online resources used by investigators to apprehend offenders.
Kloess, J. A., Beech, A. R., & Harkins, L. (2014). Online child sexual exploitation: Prevalence, process, and offender characteristics. Trauma, Violence & Abuse, 15(2), 126–139. doi:10.1177/1524838013511543
Wexler, C. (2014). Critical issues in policing series: The role of local law enforcement agencies in preventing and investigating cybercrime. Retrieved from http://www.policeforum.org/assets/docs/Critical_Is…
International Fraternity of Cybercrime Investigators. (n.d.-b). Chinese hacker profiles [Video file]. Retrieved December 14, 2016, from https://www.cybercrimeinvestigators.com/videos/vid…
Note: The approximate length of this media piece is 3 minutes.
Assignment: Using the Computer for Good
Computers have become an excellent tool in locating and arresting criminals. Most offenders leave a digital footprint wherever they travel, even if they are not using computers to commit crimes. Consider how you may use the Internet to track down an offender. What agencies or resources would be helpful in searching? As a forensic psychology professional, having knowledge of these resources could prove useful as you work on cases.
In this Assignment, you will assume the role of an investigator and analyze the Internet resources that could be helpful in tracking down criminals.
To prepare for this Assignment:
Scenario: You are an investigator who has been contracted to track down a criminal who works in multiple countries.
Write a 2- to 3-page paper that includes the following:
BY DAY 7
Complete and submit the activity.
SUBMISSION AND GRADING INFORMATION
To submit your completed Assignment for review and grading, do the following:
To access your rubric:
Check Your Assignment Draft for Authenticity
To check your Assignment draft for authenticity:
Submit your Week 9 Assignment draft and review the originality report.
Submit Your Assignment by Day 7
To submit your Assignment:
Week 9 Assignment
This week, you identified resources and agencies that could help with locating a criminal in an international arena. You also considered how the Internet and technology, in general, could be used as a tool for good as opposed to criminal activity.
Next week, you will consider scenarios in which a threat is posed. You will analyze the threat, consider strategies to prevent its progress, and form a plan to respond if the threat were carried out.
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER