Thursday, June 30, 2016

Shaka and the Swamp

Glassy eyes peered mysteriously through the haze of dark twilight

Hearing an owl hoot hoot Shaka shook her long braids of dreds

Crouching in the long grassy weeds she looked and watched them come

Smiling a smile of feral she summoned them to come deeper deeper

Thundering steps pounded in ears and mind driven beyond thought cascaded deep

Voice of Southern drawl hollered with horrendous appetite she came this way this way

Trepidation filled her heart of slight as she gauged her escapes in a mind of tired

Eyes wide she watched the whip flip flip as the sky thundered why why

Feeling the earth of moist cold sweet she cast a spell of protect

Flashing of teeth of whitest white showed vivid in dark of darkest blue of night

Feet of swift moved past grace as she darted in and out making a path of clear visible

Hearing the faltering of feet and cursing of blue profane she giggled quick deep

Hearing a hiss of silence of death she grasped the moccasin hard fast and propelled in bag of burlap with others sealed

Leaping fast she flew on feet of deadly silence as the wind turned South leaving a turn here and there

Seating aperch a tree she peered below listening intent with smile as they asked between them all where where where

Casting down snakes of hate she muffled a grin of mischievous glee delight as shriek after shriek ranted complaints through air of still

Watching them scramble scramble run away she smiled triumph of peace won until another day

By

Felicia McCaw

A Little Carrot

Eyes full of rain and sorrow

Cried to Lord God once, twice, thrice

Father help me please for my teeth are too long they say

Feeling warm caress on head of young sighed sweetly he and she

Fret not o’ sweet ones for all comes as what may

Rainbows of happy begin to dance in eyes of innocent

For God has devised all to his will

By

Felicia McCaw

Saturday, June 25, 2016

The End of AnnĂ¡

Sorrows cry deep in the soul
Makes me want to weep
Looking around she sees
Nobody to care for her
Working all her life
She gave and sweetly she pleaded
For mercy and kindness begged her
But for her none came
Until the end of life was her gift of same

By

Felicia McCaw

Tuesday, June 21, 2016

The Future of Digital Crimes and Digital Terrorism - ESSAY REPORT - CIS170

The Future of Digital Crimes and Digital Terrorism
1








The Future of Digital Crimes and Digital Terrorism
Strayer University
Felicia McCaw
Professor Sean Hord
CIS 170
Online Spring 2016
June 9, 2016


The Future of Digital Crimes and Digital Terrorism
2

Digital crimes also interchangeably referred to as computer crime is the violation and invasion of a computer or network with the intent of committing fraud, malicious damage or complete destruction. Not only is invasion as a concept of unwanted intrusion but the felonious use of a computer and network to commit these acts of criminality reflect the directional path of future criminal acts.

In result of the increased surveillance and increased security being regulated by cyber trained law enforcement the expected methodology of intrusion and criminal acts are expected to be changed and differentiated. Because the versatility and ease of using the computer, network and new technology in criminal acts these tools are more of a hinder than a plus for law enforcement. Further the escalating usage of computer and internet users signifies that the rate of internet crime will escalate because of the supposed status of not being able to be caught.

Another factor that encourages criminal activity is the ease of financial gain and with commitment, knowledge and newly learned technology this can be evidentially a plus in a criminal’s favor and a self-facilitator to act and commit. Crime as a state is not an inherent trait but a studied and learned behavior with full emulative ability that in turns acts as its own stimulus.

As with digital crime, digital terrorism is also a prevalent malady that is troubling the United States and its law enforcement agencies. Escalating attacks, intrusion, denial of service (DoS) are very costly and financial inhibitors to the businesses and governmental agencies under attacks. Further the increased use of wireless local area networks acts as temptation to invade, intrude and perpetuate a crime.

The Future of Digital Crimes and Digital Terrorism
3

Acts of digital terrorism can also be facilitated against private citizens with the use of network and social-psychological exploitative manipulation. The inducing of fear and intimidation is the goal of primary for criminals along with social alteration. Because of the state of anonymity this is a spiraling stimulus of the increase of attacks and the internalizing of fear.

In challenge to the levels of intimidation and threat against people and government the overall impact as far as economic is to circumvent the attacks against business, customers and alliances. By investigation, pursuit, prosecution and communicative acts between agencies these criminal acts are too flagant to ignore and with coordination between agencies the increase should be abled to be handled.

Preventing the effect on social aspects of life is to remove the overall impact and combat digital crime and digital terrorism to ensure no change in interactive daily usage of computers and internet. Because the entrepreneurial spirit is highly evident the safety of records, financial transactions and support of business continuality is primary along with personal safety for users of all computerized devices.

As such the examining of computer crimes and terrorism as it affects independent segments of law enforcement throughout the United States is phenomenally large. Some of the challenges law enforcement deal with is the preserving and sanctifying of evidential evidence for court to facilitate and assist with the closing of a case. Another challenge is the pinpointing the area where the act of criminality occurred and the jurisdiction that covers it. Interchangeable communication between the governmental agencies has to be coordinated with suggestive and with singular thought to win and close the case.

The Future of Digital Crimes and Digital Terrorism
4

Amazingly the coordination and cooperation between criminals is incredible and rather awesome and reflects a sophisticated approach and as legal enforcement the upgrading, honing and learning of technical skills is important. One way or strategy that the United States could use to mitigate some of the attacks or challenges is to regulate new security and firewall protection. Bridging the chasm between law enforcement and digital crime will require extensive education in the computerized arena to assist with updating security and protective measures.

Also, the capturing and organizing of information should be uniform per regulations and retained in a pattern to reflect co-agreement between agencies to allow ease and accessibility to all law enforcement agencies. Facilitating a uni-base which contains all records with full access to the secret services, FBI, and Department of Homeland Security should help stop the compromising of cases with immediate changes reflected.

Future trends in digital crime and digital terrorism will continue on its path of escalation with the use of new technology and innovative changes in the network and usage. Fraud and Identity Theft will continue to be the largest criminal offenses due to the ability of criminals who are attacking to stay anonymous and the lack of limitation of the Internet. Further the ease of committing crimes is pure simplicity with a minimum of cost that acts as charging stimulus and as such criminals see this as a “go” signal.

Strategy at its best works as an assistant, coordinator to facilitate a defensive stance against the ongoing surge of criminal behavior being used as a complement to digital crime and digital terrorism. One thought to keep in mind is that the law is the law and all have to obey the laws and treated same and with that thought in mind corrective study of actions, mannerisms,

The Future of Digital Crimes and Digital Terrorism
5

attitudes toward people, businesses and governmental agencies become a prior to help combat destructive behavior with the facilitation of psychological methodology and indicative studies.

One step at time is the strategy for the United States to combat digital crime and digital terrorism with the applying of penalties, criminal time with no probation and the treating of invasionary violations as a treasonal act with charges that applicably apply. Further because the criminal element has a lead the creation of departments to foil and circumvent these activities along with the installing of extreme security which would track and trace invaders would be an advisement to follow.




REFERENCES
Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.

Donnelly, M. (2015). Social Impacts of Cyber Crime. Research Starters: Sociology (Online Edition),

Kuehn, L. (2016). Threats from the digital underground. CCPA Monitor, 22(5), 52-53.

Gogolin, G. (2011). THE CHASM BETWEEN LAW ENFORCEMENT AND DIGITAL CRIME. Journal of Current Issues in Crime, Law & Law Enforcement, 4(4), 469-478

Saturday, June 18, 2016

Discussion Week 11 - Humanities 112

Reflection

Identify two (2) specific concepts you learned in the course that surprised or intrigued you, and explain why.

The specific concepts that I learned in this class is the realization that there are techniques that classify painting styles and building styles that are an attribution to culture. When I took this class I was pretty much ignorant of our cultural heritage and the influential background that helped serve as a catalyst in artistic explorations. I feel that in order to appreciate art this class will do so and will allow the creative spirit to be instilled and become internalized within the next generation. Because I too like art I also would like to pick up a paint brush and proceed from there.

Exquisite and refined is what I found in this book and class. This class was not a hardship but an adventuresome spirit or comrade to journey forever with me as a mentee and it my mentor. Further my entire view of life, art and anything that is conceptionally viewed as artistical has changed my perspective, mindset, analytical ability and acceptability.

I thank you for the privilege.

Write three or four (3-4) sentences about your cultural event experience for Assignment 3.

Assignment Three became an exciting seek and find adventure. Not only did I get to travel and ramble about in Detroit looking for the museum it also allowed me to peruse and see the changes in downtown and look at the people bustling around with business as usual. Because I was in a hurry I was a little nervous because I did not have a map. But when I saw the museum I was impressed with the sheer class of the building, paintings and cultural imprint and sheer overwhelming interior that houses some of the most famous artistical paintings on earth.

After taking this class, do you see any reason for learning about the history of societies -- did learning about societies change your view about the Humanities before taking this class?

Yes, after taking this class I am even more interested in the different races we have and the differing cultural explorations that are associative to social norms and rules. This class is very indicative and conclusive of arts affect on history, politics and the alternation of people’s behavior and it was my pleasure to learn how artistic outbursts could facilitate all of this.

My goal is to learn about people with the viewpoint of equality for all and as such the love of all has to be in my heart and I realize it so for others as well because of the inclusive nature of all race depictions in this book that represent them in a more or less tribute to all.

I was a little intimidated but became more comfortable after the first discussion and the next and the next and the next. Timidness left and then the adventure began.

Thank you so much again.

Felicia McCaw

Reply to co-student

I agree that the Harlem Renaissance was a phenomenon that occurred mostly due to the Great Migration Movement that was pretty much due to disappointment and disillusionment in the South. This in turn allowed a great conglomerate of monies to flow in Harlem because this is where everyone wanted to be. Fame and Money and Power ran through this ghetto and if a person is poor then what is it that put stars in people's eyes. The freedom to explore, unite and carve an identify for themselves is what Black people did...they became associated and considered human beings.

Further women have always had a hard time fitting in the work arena whether in art or general work. The two side street is too narrow for them to tread upon but they manage anyway (black, white, hispanic, etc.) it does not manner. They are gifted and should be allowed passage not oppression and rejection.

The museum visit sounds great...I will start to go to more when I have time.

I agree history takes you from a place you were and progressively helps you move forward to ensure no repeats of mistakes.

It's been nice communicating with you and others.

Thank you.

Felicia McCaw

Law Enforcement Challenges - ESSAY REPORT - CIS170

Law Enforcement Challenges
1








Law Enforcement Challenges
Strayer University
Felicia McCaw
Professor Sean Hord
CIS 170
Online Spring 2016
May 27, 2016

Law Enforcement Challenges
2
As a facet of criminology the primary focus of law enforcement is to counter and prevent criminal activity. In order to facilitate this preventative focus is kept on protecting the rights of citizens with the objective of administering, applying laws and punishment as needed when violated. With the changes and innovation of technology this has caused a tremendous change in the approach to deal with violations of the law that includes states of exploitation, cyber stalking and obscenity.

Law enforcement and exploitation is at a point where the escalating predatorial pattern is exhibiting an inordinate growth due to enormous profits that is causing a different approach by law enforcement to gain control. Because the nature of crimes are for a majority being committed online it causes a wider spectrum for the elusiveness of violators to escape without being punished.

The scope and increasing amount of online violations and its prevalency has caused an inability for law enforcers to keep up because they are understaffed and relatively ill-equipped. Further because online or internet usage has grown it is being used to perpetuate other criminal activities due to it being harder to pinpoint and circumvent all activities because they are using various methodology to commit more and more crimes.

Investigating exploitation, cyber stalking, and obscenity as a case these are three of the worst crimes on the internet that has intricacies woven in. Because establishing a point or position is almost impossible to prove it is apparent that the establishing of evidence can be next to impossible. Therefore, victimization is a process that is continuous with sometimes an end that is not preventable because of time consumption and the elusiveness of the predator. Further

Law Enforcement Challenges
3

because of imaginative tactics of preventing disclosure of author this too is a problem because of a predator using someone as a cloak and attacking this way. As analysis of situational scenario require it is a priority to be understanding when a staged attack is occurring and the level of preventative is upmost and upfront with the possibilities of trial and error as these are some of the considerations that are examined.

The elements of a crime is hard to conceptualize when there are so many variables and the possible preserving of electronic evidence is difficult to facilitate. Proving probable cause is also a perplexing task when dealing with exploitation, cyber stalking and obscenity because of the inability to establish a common cause and the multitude of users on the internet makes it very difficult to prove when an exploiter, cyber stalker or obscener can be located anywhere in the world. Further without good presentation of probable cause there is no case to pursue and no ability to warrant and search and seize. Therefore this scenario proves another problem for law enforcement and enforcers.

In consequence, the same issues that trouble law enforcers also parallel to the challenges that overlap in differing jurisdictions and are encountered in the fight against cyber crime. Establishing a point of criminality is also next to impossible even though attempts are made to correctly do so. Further since the location of crime is hard to determine the appropriate jurisdiction has to be designated based on the last criminal act done or discovered in either a segment or location to make the conviction hold.

In the fight against cyber crimes conductive sting investigative operations are done to halt, circumvent, arrest and prosecute offenders. Using specialized digital evidence recovery and

Law Enforcement Challenges
4

analysis as a complement and assistant in fixating the case and establishing protective support of evidence this is an operational must. In order to facilitate and keep evidence safe and fresh training has to be done and as well as have a supportive budget to collectively challenge the escalating criminal base.

Unfortunately, the widening gap between technological changes and enactive laws to deal with cyber crime is apparent because of the inability to keep pace and severe hampering of the lack of strident legal codes at the local level and disability to subpoena across state lines for evidence and conviction. Local levels dismissive of cyber crimes by allocating all as a misdemeanor charge is clear evidence that attempts are not being made to try to halt these crimes. Conflictive to the infrastructure provided this segment is a free will establishment to continue acts of criminality. Further due to inner corruption these overall challenges persist and grow even more despite the beginning amount of reports being made of crimes done against citizens it is still not enough to effect change and prevent.

Some solutions that may be utilized to deal with cyber crime that is done across state lines is to charge as proportion the criminal act done in one state and then the other. Establish the probable cause first and then pursue and proceed with the following legal procedures (warrant, search, seize and arrest). Trace and track until point of origin of criminal act or where misdeed was done and convict in state located despite crossing of state lines. Reinforce and support infrastructure established to reduce and prevent cyber crime and consider changing the punishment from a misdemeanor to felony. Further define and establish agreement of what

Law Enforcement Challenges
5

cyber crime as legal defensive in all criminal levels throughout all states to have a commoncy which reflects a sameness with higher punishment rates.

In order to facilitate a challenge to cyber crime an overhaul would have to be done in the approach that is currently being used to measurably halt, circumvent and prevent cyber crime. Irregardless of where the act of criminality occurred whether across state lines or in one state the ability of law enforcement to work together as a complemented whole should be allowed. When it all comes down to it crime is crime and justice is justice.




REFERENCES
Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.

Erbschloe, M. (2016). Computer and Internet Crime. Computer & Internet Crime - Research Starters Business, 1-5. doi:10-3331/ors_bus_1505
Donnelly, M. (2015). Social Impacts of Cyber Crime. Research Starters: Sociology (Online Edition),

Digital Crime Theories - Essay Report- CIS170

Digital Crime Theories
1







Digital Crime Theories
Strayer University
Felicia McCaw
Professor Sean Hord
CIS 170
Online Spring 2016
May 7, 2016

Digital Crime Theories
2

The study of criminology is a scientific procedure wherein the acts or nature of a crime and its extent, causes, control, consequences and preventative measures are done that involve both the individual and social levels in an interactive fashion to alleviate, control and dispel. Criminology involves a multitude of crimes that are committed on a daily basis ranging from white collar crimes to non-white collar crimes also known as “street crimes”.

Criminal behavior is learned behavior done by emulation or by association which includes the parallism of active participants in the initiation and culmination of the act. The acts of white crimes are inclusive of the intrusive invasion using computers and other internal information in businesses to complete acts of embezzlement, corporate espionage, money laundering, identity crimes and fraud. The crimes are offenses that would be included in the field of digital crimes of this nature and require a certain amount of knowledge and sophistication to pull off along with accomplices and are usually planned events synchronized carefully to prevent discovery.

As with all acts of crime the cause of digital crime is prevalent due to the ease, availability and expanded opportunities to invade and exploit a situation that is unable to control due to the overwhelming magnitude of the internet. Further criminals or offenders know that they have the advantage and unscrupulously take advantage for financial gain and acts of malice. Subsequently, the incentive and impetus involved is that the increase of computer users symbolizes a pigeon or an easy mark. Another motive for digital crime is the high tech ability to cause destruction speedily, effectively and as a facilitator to the overall criminal act. Not only is digital crime an enabler for criminal acts it is a tool for instigation of premeditated acts against individuals, companies and countries either for political or non-political reasons.

Digital Crime Theories
Page 3

Consequently, digital crime is like an accessory to information warfare and a tremendous financial enabler that helps facilitate additional criminal acts. As technology expands and evolves this allows the innovative usage of digital crime as a stabilizer in organized crime. Because digital crime is initiated and self-motivated the Rational Choice Theory is applicable in the labeling of this behavior because of cognitive choice. The ability of humans in decision making allows the assumption of acknowledgement that all are capable and motivated by self-interests, the act of weighing costs and the beneficial gain with the least amount of exertion to obtain the objective.

Theoretically, the difficulty of achieving the criminal objective is measured with the thought of preventatives to cause a modification in behavior. Modifying the behavior is an entitlement and advantage overall to the social structure with corrections. Founded in the Control Theory is the inexplicable assertion that the definitive nature of acts stems from self-interest or egoism.

An example of Rational Choice Theory going into effect would be the crime of Identity Theft. This crime allows the acknowledgment that the deed is wrong but gain overshadows the risk with the advantage of ease, lucrativeness and the lack of fear of getting apprehended. Therefore, supportive of this theory is this crime and the procedural steps taken to facilitate and complete the act.

Whereas Rational Choice Theory deals with the examination of digital crime theories and the manifestation and mechanics of self-interest and determent of action using the methodology of negative reinforcement. Strain Theory revolves around the level of economic distress and impoverishment that effectively modifies behavior and allows deviation in normal behavior.

Digital Crime Theories
Page 4

Structural weakness or vulnerability is unfortunately a factor of socio-economic distress which is a promoter of digital crimes and deviant behavior. Digital crime acts as a facilitator to allow monetary gains to live the life of success with a bypass of regulatory work and the ethic of work to be dismissed. Also, digital crime acts as an anomie where social regulation is a correlating element to the fragmentation of social order and a breakdown in legalistic norms further establishes a paradigm and posit for active deregulation.

The crime of Embezzlement would be a resultant of the Strain Theory due to the nature of these criminal acts being committed and as supportive of this theory these are acts of people from distressed socio-economies. Although, acknowledgment is there the need and desperation for money overshadows the risk and compels the offender to act and dismiss the fear of being caught.

As a collaborator of deeds and actions the Differential Association Theory is supportive of the fact, assertion and explanation of why people commit the act of digital crime. As a theory digital crime is a sociological phenomena that has spiraled upward with the increase of latitude and opportunity available. The theory reflects that influential associates are a major contributor to the acts of digital crime due to acts of emulation and modelization. Acting as a facilitator this level of crime is instigated through a none biological predisposition but is a resulting event from the social environment, surroundings, individuals and values sought and learned from those with adversion to following legalistic norms. Therefore, acts of digital crime are acts that allow opportunist avenues of proclivity and acts of association and a foundational base for criminality.

Although the Differential Association Theory supplies a supportive argument and base for understanding the escalation of digital crime it is still not overly inclusive to explain all manners of criminality. For example, the crime of drug dealing deals with associative interaction

Digital Crime Theories
Page 5

and a combined effort to distribute and as with all crimes a certain organization is needed and with the level of modernization and sophistication digital crimes is a supportive not an inhibitor to the act of dispensing of addictive substances with hidden messages throughout the internet.

In conclusion, Digital Crime Theories are based on theories that examine crime and the acts and nature of crime with the context of digital crime as its subject and base for explaining the why and if. Further, these theories are used as a preventative measure, inhibitor and support for the application of punishment to prevent.



REFERENCES

Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.
Holland, D. (2015). Differential Association Theory. Research Starters: Sociology (Online Edition),
Harbeck, K. (2016). Rational Choice Theory. Deviance & Social Control: Rational Choice Theory – Research Starters Sociology, 1-7.
Flynn, S. I. (2015). Social Movement Theory: Structural Strain Theory. Research Starters: Sociology (Online Edition),


Digital Computer Crime - ESSAY REPORT - CIS170

Digital Computer Crime
1








Digital Computer Crime
Strayer University
Felicia McCaw
Professor Sean Hord
CIS 170
Online Spring 2016
April 21, 2016

Digital Computer Crime
2

What exactly is criminology, criminal intent and its connection to digital computer crime? Crime and its pervasive state is a factor that demands study because of its interactive state to social factors that correlate to poverty, gender and unemployment and relative social norms. Because of this the affective ability of crime in society hurts all and criminology is a segment of scientific study used to gain information and overall find preventatives to discourage, deter and prevent reoccurrences.

One of the aspects of criminology being studied is digital computer crime because of its growth and technological changes involving the internet and public usage. These acts of criminality have various acts of crime that are committed using the World Wide Web in relation to the victim(s). Some of the acts of digital computer crime are identity theft, spread of computer viruses, spread of spam emails, Denial of Service (DoS) attacks, hacktivism, cyberstalking, cyberbullying, cyber pornography, internet gambling and cyberterrorism.

These acts of digital computer crime categorically fall in four major categories as follows: cyber-trespass, cyber-deceptions, cyber-pornography and cyber-violence. Cyber-trespass includes hacktivism which is the unwelcome intrusion and attack on certain businesses or electric websites using online graffiti. Cyber-deception is a category that includes identity theft which is one of the most prevalent acts of individual terrorism against an individual. Cyber-pornography is the act of distributing images and videos of underage children (under the age of 18). Cyber-violence encompasses two acts (cyberbullying and cyberstalking) that are psychologically intimidating. Both of these are dangerous to a person because both have ulterior motives and ultimately the predator means harm to the victim.

Digital Computer Crime
3

Further because of the need for study and preventative measures to counter these attacks “fighting fire with fire” is pretty much the agenda when faced with digital computer crime explained as follows:

1. Identity Theft – theft of personal information, invasion of e-mail
2. Spread of viruses – introduction of virus into computers
3. Spread of spam emails – sending of unwanted e-mails
4. Denial of Service Attacks (DoS) – attack by a hacker on computer networks or websites to close down system
5. Hacktivism – electronic attacks using a computer to attack certain businesses or websites
6. Cyberstalking – use of internet to stalk individuals
7. Cyberpornography – use of internet and web enabled devices to distribute and solicit sexual images
8. Internet Gambling – illegal gambling on the internet
9. Cyberterrorism – Use of internet and web enabled devices to plan terrorist activities

Criminal acts of this nature are not only costly to the victim but to businesses, organizations, universities and personal users of computers and ultimately you. Because of the increase of hacking and invasionary capabilities this has phenomenally induced additional attacks as computer usage has increased. The internet therefore is considered a new horizon to invade and conquer.

Although cyberterrorism is a threat overall the combined amount of digital crimes (e.g., identity theft, spread of viruses, spread of spam emails, Denial of Service Attacks (DoS), hacktivism, cyberstalking, cyberpornography, internet gambling, cyberterrorism) poses the greatest threat with an estimated astronomical cost of $400 billion to the global economy and theft of personal information costing a staggering amount of $800 million The acts of digital crimes are increasingly expanding, growing and evolving to more technical levels of threat, intrusion and intimidation.

Digital Computer Crime
4

These crimes commence with attack on the foundations of technological societies with increasing attacks on novices who basically are unfamiliar with all complexities of computing and internet surfing. Because of this predatorial attempts will continue and added steps (expansion of technology, security, trial and error scenarios) will have to be done to foil cyber criminals since digital crimes help facilitate and expand traditional crime which includes drug trafficking, theft, piracy, stalking, money laundering, fraud and espionage.

The role of the federal government consist of leading the attack against digital crime and works in conjunction with law enforcement to ensure the enforcing of justice for illegal activities. The Department of Justice (DOJ) has increased efforts to respond to cyber crime or cyber criminals. One of its main divisions is the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS). This unit was expanded to enable prosecutorial abilities to combat computer crimes. Housed within this segment are dozen of attorneys specializing in prosecuting crimes related to intellectual property crimes, e-commerce, encryption, electronic privacy laws, computer hacking investigation, search and seizure.

A subunit of CCIPS is called Computer Hacking and Intellectual Property (CHIPS)which primary deals with prosecution of computer hacking, fraud and intellectual property cases. In affiliation with CCIPS is the Intellectual Property Task Force that concentrates on ways to improve prosecution and focus against piracy and counterfeiting.

Digital Computer Crime
5

The Federal Bureau of Investigation (FBI) is a division that helps thwart cyber-based attacks and high technology crimes. One of its main function is to defend and protect the United States with the fighting of cyber crime its third priority. The FBI role consists of capture the criminal(s) who orchestrated computer intrusion, introduced malicious code, stop online sexual predators and promotion of the share of child pornography and exploitation of children, stop predators targeting U.S. intellectual property, disassemble national and transnational organized criminal groups involved in Internet fraud. Lastly, the FBI is the leader against digital crimes to investigate and prosecute.

The Federal Trade Commission also deals with criminal activities that occur online such as false marketing, credit card repair scams, financial pyramid schemes and business opportunities that don’t exist. The National Cyber Security Division (NCSD) is significant in the fight against digital crime with the duties to build and maintain national cyberspace response system and the implementation of a cyber risk program to protect the infrastructure. Another agency (U.S. Immigration and customs Enforcement (ICE)) has responsibility of investigation of weaknesses with the nation, develop intelligence to foil threats, remove foreign nationals and enforce 400 federal statutes and plays a role in enforcing internet related crimes and operates the cyber crimes center with focus on child exploitation, computer forensics, cyber crimes, information technology and administration of all four subsections.

Lastly, another way that law enforcement could use in the combating of digital crime is to use investigative techniques to search out perpetrators that are otherwise invisible and make visible with use of a docking system (database). Also, work in conjunction with computer divisions to see if variations in sequence show pattern of irregularity and are trackable.

REFERENCES

Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.

Wienclaw, R. (2015). Internet Security. Research Starters: Business (Online Edition),
Erbschloe, M. (2016). Computer and Internet Crime. Computer & Internet Crime - Research Starters Business, 1-5. doi:10-3331/ors_bus_1505
Donnelly, M. (2015). Social Impacts of Cyber Crime. Research Starters: Sociology (Online Edition),










Discussion Week 11 - CIS170

Course Summary

Using 140 characters or less, i.e., the length of a Tweet, summarize the importance of this class to someone unfamiliar with the concepts.

This Criminal Justice class ranges from basic to extreme detail with assistive orientation and is a good crash course.

Discuss the salient manner in which you would apply the learning outcomes of this course to your professional or your personal life or both.

The salient fashion I will utilize my assimilation of the informative details outlined in this course will be in my everyday view of day to day life and consideration of any cyber crime. Further this class has helped me to understand and has highlighted the challenges law enforcement are against and by such has gained my sympathy and support.

It has allowed my professional and personal life to become enlightened and made me cognizant and aware of the fear and contaminating factor of crime and its seductive manipulation.

I have enjoyed this class and the interactions and will hope that all I learn will help me to make good decisions that will facilitate movement against crime.

Thank you.

Felicia McCaw

Discussion Week 10 - CIS 170

Information Security and Digital Crime and Terrorism

From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative.

Two potential ethical challenges that security professionals will face is the increased level of fraud and computer crime. Due to advances in technology and new innovations this will cause a significant increase in the leverage that criminals possess.

As routine activities ensue the clash between ethical and non-ethical behavior rears its head as a predominant factor in the fight being waged against criminal behavior. Even with technical advances, mobile application devices and innovative challenges that pertain to criminal activity the circumventing and preventing of these criminal acts has many alternating facets that are used in a complementary fashion to try to mitigate future challenges.

Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response.

Because high levels of ethics are used this helps guarantee the integrity of the challenge, guaranteeing of privacy and the protective stance toward the general welfare of the public. Foiling the crime or breaking a continuous pattern is the goal wanted and by upgrading security fields of companies to guard “near sacred” information is the necessitated step. Utilizing an aggressive counter is my suggestion once activity has been reported with an encryption and scrambler in each outer and inner port.

Further upgrading penalties with prison time and reward status offered should alleviate some threats measured with confidentiality.

From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection.

The one definition that I conclusively agree with is that cyber terrorism is a form of internet attack whose purpose is to seek and destroy. Even with an abstract view terrorism is terrorism with a purpose of causing intimidation and fear. Whether the full comprehension is not the same the idea and purpose is. Full articulation is allowable but seen as irrational and weak by opposing agents. Tossing aside systematic rulings the most simplistic way to relay disapproval is to relay it in a blunt forthright way irregardless of opinions.

Invasion of a country infrastructure is the first stage of war because of this kind of attack this relays that opposing forces are moving to compromise security. Each country’s primary is to protect information security and infrastructure by any means.

Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response.

The impact that digital crimes and digital terrorism will have in the future will most likely cause rifts in alliances and problematic communication and huge financial cost if the situation is not contained. Also, a certain step toward certain informational banks in each country is a declaration of war and should be retaliated to show lack of fear and competence to stand and fight back. A country that is being attacked by an opposing force has no option but to address the situation whereas an inner attack can be seen in same way that they are debilitating to a company or country for financial gain with no care or loyalty for country and foil it cruelly. Political or ideological objective is also a facet that acts as a facilitator with thoughts of damage or some psychological perversion to make someone pay.

https://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
https://en.wikipedia.org/wiki/Cyberterrorism

Reply to co-student #1

Although the privacy issue is a major factor in the investigating and securing of evidence and some may be compromised but felonious material found has to be reported and subsequently charged. Because people know of the limited police force and the overstressed and overworked legal force they attempt to take advantage but as stated if records are visually seen and evidenced they have to report it and will still be considered ethically correct.

Unfortunately, the media has a tendency to over blow events and if a severe act of cyber terrorism is ongoing limited leakage should be to them. Resolving the situation quickly and correctly to prevent further damage by the attack is what is needed not panic.

Thank you.

Felicia

Reply to co-student #2

I agree with your points that the privacy issue may be compromised but with a high ethical approach the search is for the contraband but if child pornography is seen and evidenced the complete computer system will be torn down and grilled until everything can be gained to nail and close the case.

Evidence that is of a felonious nature has to be reported if seen and as such the privacy issue is a mute issue and silenced. Also, I agree with the steps that you delineated but the legal process is to find and seek and charge.

Cyber terrorism is indeed a tricky situation but nailing them and opposition that is figuratively in charge of disrupting the function of this country is primary.

I feel that the gloves should be taken off.

Thank you.

Felicia

Discussion Week 9 - CIS170

Digital Forensics

From the first e-Activity, discuss the fundamental advantages that the commercial forensic packages offered to forensic investigators.

The fundamental advantages that commercial forensic packages that are offered to forensic investigators include the increase ability to obtain information from a system without altering details. Because this is a primary objective this allows conclusive objectivity in the gathering and also retain the integrity of the information gathered. Also, a good forensic package must cover the basic forensic functions described as follows: importing data, hashing, wiping, imaging, and search capabilities.

Further there is some forensic packages that are free and even the more costly packages proves to be invaluable and with the use of this inquisitive squirrel like program it proves its value because some deleted data or parts of it can be recovered and usable in court. Lack of a physical file name does not mean the segment file can’t be recovered with this software. Consequently, differing software has unique facets that allow maneuverability and writing of small programs, analysis and scripts that perform customized searching and filtering and imaging capability.

Next, speculate on whether there is an overall disadvantage(s) to using commercial packages in digital forensics. Justify your response.

As with advantages there will also be disadvantages to using commercial packages in digital forensics and that includes the selection of an appropriate software package to facilitate the correct tasks that need to be done. Further the high price tag, privacy concerns and data corruption are some of the disadvantages that string along with the benefits. Even though the disadvantages exist the advantages outweigh the disadvantages and become an incentive to use.

http://www.ehow.com/list_6754332_disadvantages-computer-forensics.html

From the second e-Activity, discuss the key process that a forensic analyst could use in order to preserve the verifiable integrity of digital evidence.

The key process that a forensic analyst could use in order to preserve the verifiable integrity of digital evidence is to provide a witness signature that is a confirmation and a competent recording. Further a webcam legal signature can be done as well as chain of custody that is reflective of the authentification process.

http://www.edtechmagazine.com/higher/article/2006/10/how-preserve-digital-evidence-case-legal-investigation

Next, identify the main tools or technologies that the forensic analyst could use in order to ensure that the original evidence is unmodified.

Some of the main tools or technologies that the forensic analyst could use in order to ensure that the original evidence is unmodified is as follows:

• Disk and data capture tools
• File viewers
• File analysis tools
• Registry analysis tools
• Internet analysis tools
• Email analysis tools
• Mobile devices analysis tools
• Mac OS analysis tools
• Network forensics tools
• Database forensics tools

Even at its best there will be some alteration that is not major and will not hinder the legal process of being admissible evidence as competent and correct.

http://resources.infosecinstitute.com/computer-forensics-tools/

Reply to co-student #1

I disagree, some packages have limited ability or only do certain tasks and are not multi-usable software that allows maneuverability. Further I agree that the selection is made on choice and its prevalent need to complete task to obtain information that will facilitate and nail a case.

Also, that these steps you listed should be done to get the task done correctly to gather information to present in court as admissible evidence.

Thank you.

Felicia

Reply to co-student #2

I agree with you that the collecting of digital data is an analytical fashion with concerns of reporting is the correct way to retain ability for legal admissity. Also, that objectivity is a must and steps has to be done in a methodological way for consistency and documentation ability. Further, the software for a forensic investigator is a tool and allows the evidence collected to not be challenged.

Thank you.

Felicia

Discussion Week 8 - CIS170

The Investigation of Computer-Related Crime

Suggest at least two (2) general principles for proper evidence preservation for stand-alone personal computers, networked home personal computers, and network server business networks. Provide a rationale for your response.

Two (2) general principles for proper evidence preservation are to ensure the security and safety during transient by storing the electric devices in a container or medium. Secondly, label, pack, list everything that comes with the system and seal all components that open and keep all in relative condition.

The goal and incentive is to keep data or all information fresh for analyzation that has been logged in system. Further since digital evidence is fragile consider the handling of admissible data as quicksilver. As supportive to the preservation of evidence this acts as a level and asset to prove crime committed because steps have been taken to not destroy or lose valuable evidence and ensure that prosecutorial steps can be taken.

Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.

The major procedures that investigators must use in order to collect network trace evidence of computer related crimes are as follows in steps:

1. Establish the criminal intent
2. Analyzation of logs
3. Locate evidence
4. Track source
5. Identify each computer system as individual
6. Breakdown network architecture
7. Intranet entry observatory
8. Internet permissive intrusion
9. Correlate and correspond criminal evidence from segmented trace

These are proposed steps to ensure that the evidence acquired will be admissible in court as evidence. Because the steps have been taken it should be highly unlikely that any evidence acquired will be dismissed. Minimizing the hearsay rule is the objective and increasing the simplicity of understanding is the primary.

Next, speculate on the primary concern of investigators as they execute the evidence-collection procedures in question, and explain the main reasons why you believe such a concern is valid. Justify your response.

The primary concern of investigators as they execute the evidence collection procedures in question is to obtain and keep a high level of accuracy and truthfulness. Because the time factor is evidenced and that the seizing of critical information technology department assets can cause a financial upheaval it is prudent to have a plan to not cause a financial cost and destruction of business operations. Further a well prepared analyzation and clear depiction that a crime has been committed can summarily cause a plea bargain.

Reply to co-student #1

Just imagine a switch is hit and it turns off or turns on a computer and there is a trap or a booby that triggers erasure of all contents. Who wants to claim they did this if they have staked out this person or business for a long time?

I agree with your points and by all means detail recognition is the correct procedure to follow to keep, maintain and keep evidence secure and fresh for use in court.

Thank you.

Felicia

Reply to co-student #2

I agree that alteration of any detail or contents of a computer is a give-away and lost. Further that keeping a computer off meets it is seized as is and state of original. Also, the primary purpose is to secure as evidence and steps should be used as you state correctly to accomplish this and keep it simple and understandable for the jury to scrutinize.

Thank you.

Felicia


Discussion Week 7 - CIS170

Digital Laws and Legislation

Identify one (1) evidentiary issue that could be presented regarding the admission of digital evidence at trial.

One evidentiary issue that could be presented regarding the admission of digital evidence at trial is computer generated records and computer-stored records.

Computer stored records are records that have been created by a person that is inclusive of these types: Word processing files, E-mail messages and chat room messages.

Computer generated records include log-in records from ISPs (Internet Service Providers), telephone records and ATM receipts.

The differences between the two in evaluating evidentiary evidence is that for computer-stored records the issue involves a question of whether a person’s out of court statement was the truth or was accurate. But for computer generated records the process of evaluating and analysis of these issues involve the correct functioning of the computer program that generated the records.

Next, suggest one (1) way in which the court could take to resolve the issue that you have identified.

One way in which the court could take to uphold the validity of record for accuracy and correctness is to have a trace done to confirm and affirm accuracy and location of docking port sent format as well as ISP with log-in establishment. Therefore the possible act of hearsay is eradicated and further the authencity of record is proven. Each record that is established is coded and can be authenticated by a computer investigator as supportive of claims. To prove authencity and support all records have been originated by author or computer verification of computer log would have to be an admissible facet in defense. Provided also would be a user-friendly explanation of how details correlate for interpretation.

Include one (1) example of such issue and your suggestion action to support your response.

Protection of records from copyright infringement

Because the rate of theft of computerized records has been increasing steadily the active protective purpose is to be able to prove without doubt the ownership of record. To ensure the validity and author or owner a breakdown of the completed record allows a compiling of factual dates of origin and location of birth, changes and finalization. Further the file locator name is almost like a DNA spiral chain that locates with accuracy of position.

Per the text, there is probable cause to search a computer or electronic media when one believes that the computer or related media either contains or is contraband evidence of a crime, fruits of crime, or instrumentality of a crime.

Identify at least two (2) types of warrantless searches that investigators can conduct while collecting digital evidence, and explain the main reasons why you believe the types of searches in question are warrantless. Justify your response.

Two types of warrantless searches that investigators can conduct while collecting digital evidence are Plain View of child pornography and Consent Search. Because the possession of child pornography is an evidential crime and is considered a chargeable felonious act it is a correct move to seize all pornography to help establish the right to secure a warrant.

The second type of warrantless search is the Consent Search which allows law enforcement to search his or her property. As per the search procedure the range and scope of this act is allowable based upon non-coercion, cognitive ability and with option to halt the search at anytime.

Both Plain View and Consent Search are warrantless searches because they both can be done without a warrant. Plainview is a prevalent and visual confirmation of acknowledge offense against the law and based upon this act there is no governmental intrusion unless there is substantial content that requires a warrant for further examination.

The Consent Search is warrantless because there is full cooperation with knowledge of the scrutiny and analyzation to be done and is an act of free will revocable at any moment.

Reply to co-student #1

Not having a search warrant has no bearing on it being an evidentiary issue the problem is that it is conclusive to facilitate a correct analysis without violating rights. Digital evidence can always be admitted but without supportive analysis it is nothing. Further the court does not have to prove anything...the defense or prosecutor has the right to challenge any evidence for support either in favor of or against.

To search a computer and associate it with a crime a warrant is necessary or it is a waste of time and a non-facilitator to solve crime.

Stop and Frisk and Plainview...Both of these as you state are warrantless searches but the Stop and Frisk can sometimes be challenged if the subjects that are being frisked are non-caucasian only.

Thank you.

Felicia

Reply to co-student #2

I agree with your points overall but due to the ability of records being able to be falsified the Federal Rules of Evidence that you listed would not be sufficient and would be considered inadmissible hearsay. A record can be generated and compiled with whatever information is requested but in order to be a correct facilitator and authenticated record these records would have to be examined by a computer expert subpoened by the court for test and confirmation of truthness.

Thank you.

Felicia

Discussion Week 6 - CIS170

Internet Exploitation and Primary Federal Law

From the e-Activity, select two (2) types of online traps that have the most adverse impact on children.

There are seven online traps that have an impact on children as follows:

Pornography
YouTube
Cyberbullying
Sexual Predators
Sexting
Identity Theft

In view of the psychological damage that can be done the Pornography Trap and Cyber Bullying are the two which have the potential to cause tremendous damage. Pornographic exposure is a conceptic trigger that causes an addictive state wherein frequency of viewing causes an accepting or alteration of previously held moralistic values if they have been earlier instilled.

Further it causes levels of desensitization with continued exposure and alteration in thought patterns that effect everyday perceptions of the act of sexual intercourse and is a motivator for more permissive sexual activity. Also, this increase in sexual activity without discrimination is a major cause of sexual transmitted diseases. Therefore, as a child viewer the impossibility of forming correct moral establishment is disabled. Correct psychological presence is not able to be formed because of the influence or influx of unstabilizing sexual content.

Another trap is Cyber Bullying, which is an emotional upheaval that has a severe psychological consequence on children mentally, emotionally and then physically. Also, because of this inability ultimately they may develop a prevalence for alcohol and drugs to help cope, skipping school and might experience in person bullying. Another troubling facet that they may develop are health problems, low self-esteem and receive poor grades due to inner emotional turmoil.

Next, speculate on one (1) way not discussed in the article in which parents or society can protect children from online exploitation. Provide a rationale for your response.

One way not discussed in the article in which parents or society can protect children from online exploitation is to monitor their child’s activities when online by visually participating with child. As an active participant you as the adult have more knowledge and ability to help surf the internet with safety, discretion and use protective measures for yourself and child therefore building a safety net for interactive use while surfing the internet. An effective safety net will allow a promotion of good communication, establishment of protocols, following rules on sites, examination of literature of dangers relating to online usage, prevent the relayance of personal information to strangers, keep passwords confidential, explanation of what is acceptable conversation, understand what netiquette is and alerting authorities if someone approaches inappropriately online (parents then police).

Identify at least three (3) types of exploitation that prevalently occur over the Internet. Next, give your opinion of whether or not you believe that the current primary federal laws are efficient in combatting the types of Internet exploitation in question. Justify your response.

Three types of exploitation that prevalently occur over the Internet are:

Predatorial Stalkers
Child Pornography
Sex Tourism

The federal laws in questions are enacted to be a facilitator in the prevention of the acts of Predatorial Stalking whose ulterior motive is to achieve a goal which could include physical intimidation, psychological intimidation, murder, kidnapping and prostitution of target. Laws are in effect to protect anyone who is subjected to stalking with the applying of all legalities that would be in essence appropriate for different situations depending on the degree of offenses included in the act.

Child Pornography is another type of exploitation that has aspects that range from befriending a hurt child to the actual seduction of a child and leading a child to have prohibited sexual acts. To prevent this type of exploitation laws(Child Protection and Sexual Predator Punishment Act of 1998) have been compiled by the FBI, the Ice, Postal Inspection Services, the Department of Justice’s Child and Obscenity Section (CEOS) and the NCMEC to circumvent and apprehend suspects and offenders. With the combined departments working in conjunction as a whole this is a serious challenge to predators and preventive.

Sex Tourism is another exploitive act on the internet that includes a variety of participants that have children in the possession for the acts of prostitution either against their will or who have been groomed to be an active participant in the sexual act. Laws to assist in some situations that may be connective to a violator from this country that committed an act of sexual perversion against a child is Fight Against Child Exploitation (FACE) where the perpetrator was in another country and a complaint was filed against them would then work in conjunction with the F.B.I. and the Department of Justice to apprehend and press charges. Therefore, with precautions and safety and legal departments working as a collective force against the exploitation of children this should cause a serious decline.

Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.
http://www.frc.org/onepagers/the-effects-of-pornography-on-individuals-marriage-family-and-community
https://www.stopbullying.gov/cyberbullying/what-is-it/
https://www.stopbullying.gov/cyberbullying/prevention/index.html
https://www.fbi.gov/news/speeches/child-exploitation-on-the-internet-the-dark-side-of-the-web

Reply to co-student #1

It's amazing that an individual would create a community online to entice and entrap children for sexual exploitation. I find the idea abhorrent of exploiting a child and I am appalled at the lowness of these individuals. Predatorial actions toward a child is something that I find intolerable and these predators should be pursued and given the longest sentence possible.

Further the acts of a sexual deviant can not be justified, tolerated or ignored. I agree with you on the need for a web filter to try to keep children from restrictive sites. Any preventative measure that is taken should be a deterrent in the desire for contact with people who are viewed as a criminal element. Fortunately, the Child Exploitation and Obscenity Section is a great facilitator in preventing outright attacks against children.

Thank you.

Felicia

Reply to co-student #2

I agree that pornography and social networks have an adverse affect on children and have an ability to anticipate a child's unsuspecting nature and prey on them because of their ability to be socialized. Peer pressure is also a huge avenue that allows a lot of latitude and maneuverability in the interaction of youth and sometimes in a detrimental fashion and allows the Differential Association Theory to kick in. This theory effectively covers the influx of juvenile crimes because they are usually done as a group and the accomplices are usually influenced by a leader (someone whom everyone admires and want to be).

I also understand your point that being stern about visiting undesirable sites is a stressing point that makes it a non-negotiable move. But because emulation is a learning process it is hard to control their activities unless they have a disdain for vulgar sites and acts of lasciviousness.

I disagree about "we can't be our child's friend". We (as parents) can be their best friend but they still need interaction with people their own age and respectable mentors and example.

Thank you.

Felicia



Discussion Week 5 - CIS170

Virus and Malicious Code

From the first e-Activity, explain the key differences between viruses and other malicious codes. Identify at least three (3) different types of viruses, and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.

The differences between viruses and other malicious codes are:

Viruses are dependent on a host program and it is pretty much parasitic and dependent whereas malicious codes, e.g., a worm has the ability to propagate and is an independent form of software. Also, not only are viruses dependent they also propagate by intrusion into another program where it is assimilated and causes infection that travels from computer to computer.

Unlike viruses, a Trojan is another type of malware that is entered into the host (computer or database) where it reveals a purpose of destruction and it is not able to self-replicate or infect. Bots are interactive software with other networks and automate tasks that can be either good or with malicious content.

The potential threat posed by viruses and other malicious codes and their main effects on computers and productivity are the ability to cause a minor irritation, theft of confidential information or money, destruction of data, compromised systems, disabling of systems and networks. The rate of productivity can be affected so severely that information destroyed can cause a business to shut down due to a lack of back-up information, loss of clients can reduce the rate of service done and also cause inability to be considered marketable with a trust seal.

From the second e-Activity, discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.

The fundamental lessons that can be learned is to find the nature of invasion and the steps needed to accomplish and foil another intrusion. Once an intrusion has been done or a system has been compromised the next step is how to correct, stabilize and prevent further attacks. Some of the ways that this can be done is by peer reviews (combined effort to resolve the state of compromise), hazard analysis (study of vulnerabilities and steps to suggest reduction), testing (systematic run and check of all components), configuration management (literal analysis of written software for possible malware intrusion and code disruption).

Further some of the main steps that individuals and businesses can take to protect themselves from attacks are:
1. Install software to counter malware attacks
2. Update systems with a new operating system
3. Establish password entry with encryption
4. Firewalls (make more complicated)
5. Knowledge on malware and viruses attacks
6. Hire computer experts for assistance and maintenance of security

http://www.microsoft.com/security/portal/mmpc/shared/prevention.aspx
www.quickenloans.com/.../tips-protect-computer-viruses-malware-attacks

Reply to co-student #1

The information on viruses was very informative. It is interesting how a code is programmed to replicate and do a series of commands for data acquisition, key strokes or whatever the task. The effect of all (adware/spyware, trojan, DoS Attack) can be a tremendous threat if no back-ups are available or the attack caused a shut down of the entire business.

A business today without its computer(s) is like a blind duck looking for water.

Thank you.

Felicia

Reply to co-student #2

I agree with your points that a trojan is an intruder with a hidden agenda with the sole purpose of destruction. One thing about adware/spyware is that ultimately its mission is really quite incredible because it goes in with a seeking and gathering of information and is pretty much self-sufficient.

Also, these three can be quite damaging and costly to repair with alterations to the software, database and overall changes in the systematic logical sequence of processing data.

Thank you.

Felicia

Discussion Week 4 - CIS170

White Collar Crimes

Describe the main similarities and differences between corporate espionage offenders who are so-called “insiders” and those who are so-called “outsiders”. In your discussion, include the main effects, incidence of, and potential costs associated with each type of corporate espionage.

The main similarities between “insiders” and outsiders are:

1. Goal is to gain access to proprietary information
2. Both need access to the workplace
3. Both need passwords
4. Physical intrusion into the computer room is needed
5. Theft of business secrets are priority
6. Both are acts of sabotage
7. Computer and Internet are used
8. Both use malware to compromise a computer or database system
9. Both visually steal passwords
10. Both uses spies
11. No loyalty
12. Financial gain is the motivator

The main differences between “insiders” and outsiders are

1. Insiders do not use a patsy
2. Outsiders sometimes use a patsy
3. Outsiders are not affiliated with target
4. Insiders are affiliated with target
5. Outsiders have the ability to hack in
6. Insiders don’t have to hack in
7. Insiders have the ability to preview information
8. Outsiders hack in and seize information without preview

As with any illegal intrusion there are costs and they include the securing of databases and computerized information to save information and halt intrusions, devise different methodology to access records, securing of entry into work place to prevent access to computer section and tampering, back-up plan to counter compromised situations. The main effects of such activities are lack of trust between clients and businesses, loss of reputation, stigma of unreliability, loss of business partners, reduced developments and expansions and investment ability, compromised integrity, business insurance escalates, shut down of business and disability to stay competitive, etc.

The potential costs are incalculable since it depends on the amount of damage that has been done. Sometimes the vulnerability of the target has been compromised severely and destroyed without a chance to facilitate a counter or back-up to continue operation. The amounts of financial damage could range from thousands to billions depending on the size of the business or target with a loss of associates.

From the e-Activity, identify one to two (1-2) types or incident(s) of the white collar crime that you have selected. Next, explain the primary manner in which the incident(s) that you have identified fit into the category of white collar crime.

Bank Fraud
Computer Fraud

Both of these are White Collar Crimes because they are not traditional “street crimes”. Bank Fraud would be classified as an “insider” in corporate espionage because of the legitimate access to records and monies whereas Computer Fraud is classified as an “outsider” in corporate espionage with access due to illegal hacking and intrusion into the computer and database.

Reply to co-student #1

I agree with all your points about Insiders and Outsiders. If both could be apprehended and stalled out then businesses would be safer with costs down and enabled to develop and expand more. Possible "wipe out" is what comes to mind...no more competition. It is frightening to know people are this unscrupulous.

Thank you.

Felicia

Reply to co-student #2

I agree that Insiders are the ones with authorized entry and that they are after one thing and that is theft, destruction and malicious intent. Putting a stooge (patsy) in is usually what happens because they have no concern for the company just the dividends they can get. Outsiders put the "H" in hacking and hate because they are bent on destruction and gaining money at all costs.

Computer and Internet crime is so prevalent and increasing steadily with the additional use of computers and new technology that it is almost like entering a computerized jungle with danger zones everywhere that could destroy you at any time.

Credit Card and Application Fraud costs are one of the reasons businesses are suffering because both are done with control taken from both the consumer (victim) and business (pigeon).

Thank you.

Felicia

Discussion Week 3 - CIS170

Hackers and Cyber Criminal Organizations

From the first and second e-Activities, explain the hacker ethic and hacker manifesto.

The Hacker Ethic consists of the idea that anything and access to computers should be unlimited with total access, all information should be free and also that full trust in authority should not be allowed (decentralization), individual hackers should be judged by merits of quality or ability and that art is created and is beautiful with computer use and further that with usage it brings a better status of life.

The Hacker Manifesto is a brief literary text written by “The Mentor” which encouraged usurping adult authority, law enforcement and schools, and was very influential in the increase of hackers.

Give your opinion as to why hackers do not consider themselves to be criminals. Include one (1) example of such types of hackers to support your response.

Based upon the Hacker Ethics and Hacker Manifesto the hacking into computers and databases is not considered a criminal act because they attribute their intrusions to curiosity and need to explore the networks and they therefore escape the legality of the law.

One example of hackers that do not consider themselves a criminal is called the “White Hats”. These hackers have been reformed or rehabilitated and enter without malicious intent without damage to databases.

Describe at least two (2) ways in which organized crime uses social media sites for its benefits.

Three ways in which organized crime uses social media for benefits are:

1. Intelligence operations for collection information – collection of information of targets
2. Facilitate the commission of crimes – accessory or level that helps commit acts of fraud
3. Communications vehicle – send codes for specific reasons, communication cover

Next, speculate on the measures that the government could take in order to combat digital crimes perpetrated through social media sites. Provide a rationale for your response.

The measures that the government could take in order to combat digital crimes perpetrated through social media sites would include insulating the systems against intrusion and putting a rattler (invasive aggressive worm that gather information of identity) to retaliate and prevent any hacking into the sites.

Further because digital crimes are steadily increasing everyday due to the recession and lack of employment opportunities studies should be done per segment in a “If then what” pilot to try to prevent crimes. Fake tests with various scenarios of how accessible these sites are with vulnerabilities listed and challenge to close the door shut. Preventive measures will always help protect sites and since reputations are built on negative reinforcement and corrective enforcement this should help freeze and prevent.

Reply to co-student #1

Hackers also steal and the more restrictive and confidential the information the more valuable to sell. This is why identity theft is a major problem for all and cost the global economy enormous amounts of money.
Also, the "Manifesto" preaches in the text about having contempt for barriers, adults, law enforcement, schools and that all computers are accessible to gain knowledge.

Social media is also used as a hedge, cover and pass on details about criminal activities.

Thank you.

Felicia

Reply to co-student #2

Not only do they believe that hacking is ethical, hackers looks at his code of ethics and this is what he/she considers during a hacking experience and that is access should be allowed, all information should be free, no one should completely trust authority, quality vs quantity is a determining factor in ability and the art that is created with a computer is beautiful and that the usage of a computer will bring about a better status of life.

Also, I agree with the rest of your points and expansion on social media is great and explains a lot.

Thank you.

Felicia

Discussion Week 2 - CIS170

Digital Terrorism and Criminology of Computer Crime

List at least three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address. Provide a rationale to support your response.

Three major categories of cyber terrorism and/or information warfare are:

1. Infrastructure Attacks
2. Technological Facilitation
3. Promotion

The first category listed is the one that should be a primary concern for the federal government to address. Top priority should be given because it is important to maintain security to ensure that the United States is up, running and protected at all times. Further because of the massive databases involved it is tantamount to “protect at all cost” all communicative and “think” software and hardware. Also, without these informational bases we are vulnerable and unprotected. We are past the arena of just telephone technology only.

Among the different psychological theories that are discussed in Chapter 3 of the textbook, identify at least two (2) that are relevant to digital crime.

Relevant to the study and manner of addressing digital crime are these two psychological theories as follows:

1. Choice Theory
2. Routine Theory

As used in an applicable fashion, Choice Theory allows the progressive examination of free choice and with that summarized conclusion it helps support the rationale that he or she knows the risks, benefits and have weighed the consequences and performs the digital criminal act anyway.

Routine Theory has a different approach in that digital crime committed is based on a motivated offender (person tempted by gravitational kudos, salutes and bravado (false machismo), a suitable target (ease of hacking into and difficulty (like Fort Knox) is a spurious thrill ride for some and with the absence of a preventive software shield this allows an “ok” to enter and conquer. The invader becomes the Trojan Horse and lets out all their unpleasant surprises upon the unwary victim.

Next, discuss the primary way in which society or an individual could use the psychological theories that you have identified to combat digital crime. Justify your response.

The primary way in which society or an individual could use the psychological theories that I identified to combat crime is 1) study the antics of hackers, 2) intrude on their turf, 3) surveillance cue of announcement (silent squealer), 4) pinpoint and track from entry to location of entry assault and where physically located, 5) warrant to seize and destroy, 6) apprehend subject, 7) scrutinize affiliates and repeat steps 1-6 and with this kind of relentless pursuit of digital crime offenders I feel they will think twice. Take them all down!.
(Name for this - Operation Blue Balls).

Reply to co-student

regarding the Choice Theory I disagree that deterrence would be total but I agree that it should cause some impact to send "signals out" that playtime is over.

As far as the Psychological Theory "Personality Disorder", I feel that the behavior exhibited is intractable, irascible and temperamental to be a significant threat and even harder to prove a criminal act and make it stick because of his/her possibly pleading lack of knowledge and understanding of the law etc. My recommendation is restriction of computer access if they are past phenomenal.

I also disagree about the Psychological Theory (limited - hard to pinpoint him or her), Electronic Warfare (limited - all material replaceable and repairable) but the Information Warfare is part of the protection of the Infrastructure. Attacking the Infrastructure is usually the target not just the Information databases...these usually have back-ups.

Thank you.

Felicia

Discussion Week 1 - CIS170

Explosive Growth of Digital Crime and Fighting Digital Crime

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you described are so common. Provide a rationale for your response.

Two factors that have led to the growth of digital crime over the past decades are the increased usage of computers and internet in a lawless land. Also, increased availability of high technology allows virus creation and computer hacking techniques to be learned and evolved. Because of this several types of digital crimes are prevalent and described as cybercrime which are crimes done utilizing a computer.

The most common forms of digital crimes are global wide production and distribution of child pornography, financial crimes which involve embezzlement, padding (over sale and returns as defective), extortion (pressure of blackmail due to computer invasion, theft (consists of all types of thievery to steal personal records, information removal and destruction), Gambling (an illicit and illegal gaming that is not certified, legalized and without approval), cyber stalking (the utilizing of a computer to stalk and harass an individual(s)), Hacking (the unwanted intrusion and attack into a computer’s interior) and other crimes.

The rationale behind the increase of these cyber crimes are the lack of ability to manually police each computer due to mass amount of users and increasing growth. Further, criminals or people starting to commit cyber crimes see the ease and potential to commit fraud and accomplish lack of discovery. Also the parties involved in criminal activities can range from one to many in these activities due to large amounts of money to be made.

e-Activity

Three Types of Digital Crimes

1. Committing of Hate Crimes
2. Stalking
3. Terrorism

Main agencies that enforce digital crime laws follow:

Computer Crimes and Intellectual Property Section (CCIPS), Child Exploitation and Obscenity Section (CEOS), Fraud Section,Computer and Telecommunications Coordinator (CTC) Program, National Internet Crimes Against Children Task Force (ICAC) Program, Computer Hacking and Intellectual Property (CHIP) units, Project Safe Childhood Coordinators

FBI

1. Cyber Division
2. Computer Intrusion Section
3. Information Sharing and Analysis Section

Federal Trade Commission

Department of Defense Criminal Investigative Service (DCIS)

One way for the federal agencies to improve the public response is to have jurisdictions clearly delineated to be almost a self-help guide to getting assistance quicker. As far as the role of the individual citizen in the fight against digital crime is to become savvy about trends in criminal behavior and learn to safeguard themselves as much as possible.

Reply to co-student

Your post was very informative and helps delineate the situation everyone is in. One thing about stalking is that they sometimes have the advantage until they mess up and tip their hand. Further, it is hard to get a stalker arrested and prosecuted unless you can catch them pretty much red handed and no way is left for them to escape.

Further hackers are challenging authority...not just necessarily for money only. They get a high thumbing their nose to all...especially the FBI.

Thanks.

Felicia

Thursday, June 16, 2016

Discussion Week 10 - Humanities 112

Twentieth Century African-American Artists

Choose two (2) of the following late 20th century African-American artists, and compare and contrast their art: Bearden, Lawrence, Basquiat, or Colescott. Provide examples in your comparison.

Romare Howard Bearden &
Robert Colescott

Romare Howard Bearden was born in Charlotte, NC in 1911 and died in 1988 but not before he showed the world his phenomenal approach toward reflecting blackness in extreme.

Embedded in his artistical pieces are emotional feelings depicting pleading, skepticism and disbelief in the “Presage.". Symbolic is the parental man admonishing and correcting unwanted behavior and her hands close together reflects her guilt and acceptance of her punishment. Reflecting skepticism is the other woman who feelings reflect that she will probably misbehave again and that the admonishment is useless. In “Southern Recall” is a depiction of a collage mixed with painting reflecting male and female (black) love of music and living a rather impoverish life. Another example of his art is “The Lamp” which is a tribute to the march against segregation and desire for equitable education.

Robert Colescott was born in Oakland, California in 1925 and died in 2009 but left behind his inventive and controversial exhibits of paintings that challenged stereotypes of a sexual and racial nature and displayed sin at its most prevalent.

In one of his paintings “Heartbreak Hotel” this one characterized black people love of money, entertainment, prostitution of women of various shades, with the white hands symbolizing white patrons and secrecy with a woman’s lips firmly closed to ensure it.

Another painting “Ode to Joy” is full of sexual allure and money with the appropriation of dope and its influence and seductive power. What you wish for can be obtained for a little money. Rub the lamp and all become true with cupid shooting his arrow making all accessible.

“Power for Desire – Desire for Power” reflects that intermingled in this painting is the ambitious women who consort with men for their power and influence. Not distracting from the theme is that there is no difference between the race or color of women and the sexual partner they are with. The ulterior motive is the same money and influence. Depicted also is a couple with one bag of groceries signifying poverty and two men (one black and one white) onlooking with ambition and desire for same.

Romare Bearden’s “Presage” approach is symbolic and exemplifies a style created by Picasso in Les Demoiselles d’Avignon utilizing tension to support the theme and emotional level whereas Robert Colescott approach in “Power for Desire – Desire for Power" is similar to Henri Matisse’s Joy of Life with emphasis on sexual alludes, with tension and supportive emotional levels coming through. Both have the ability to project anguish at the impoverishment in varying paintings in which they both acknowledge and expose the plight of black people and exploitation. Reflecting seduction, greed and methodology used to gain objective is a clear reflection of the “who” who is profiting. Both styles are expressionist explosions on canvas bursting with outrage and emotional feeling.

In contrast, Romare Howard Bearden’s work has more structure and control while Robert Colescott’s work is extreme but with a more free hand and liberalness and ability to invade and pursue the truth. Colescott’s work pushes the button with extremeness and riskiness while Bearden’s work is more confined but is addressing the same issues in black’s life.

Describe two specific elements of the works from the chosen artists that represent the multiplicity of the African-American experience.

Two specific elements included in the works (paintings) from both artists are the raw expression of black identity and self-awareness. Utilizing various themes within a painting they both were able to portray the hardships, stereotypes addressed toward black people and the restrictive aspects that are attributed to the entire black race by utilizing multiplicity as a tool to facilitate and argue the why the crippling of a race is continuously done. Further suppression and oppression acts as an operative to forbid and prevent escalation and the fight against argumentative points against black people. In all the paintings is a challenge to the reason of the “why” and a hope and bid to change the circumstances and plight of black people.

The usual process to challenge exploitation is to take a stance and be supportive against discriminatory practices and expose it, expose it, expose it, expose it until someone listens and helps. Further disproving the stereotypes and accusatory comments whether in art, writing, portraiture and other endeavors is the only avenue allowed and allows wide exposure to injustices which will allow the return of grace and contribution from an oppressed race.

Both Romare Howard Bearden’s and Robert Colescott’s work is involving and communicative and sparks the psychological analysis of a people done wrong.

Identify one (1) of these works (or some other by an African American artist) that you would like in your workplace, and explain why.

Romare Bearden’s "Presage" is the painting that I would exhibit in my home or work place because it gives credit that a black man is on his duty to ensure the correct running of his household and acts as the final administrator to rules and regulations that he has set down. Further the docility and humbleness of the young lady in question is viewed as accepting and is conciliatory toward correction and willingness to be obedient. Impressive also is the woman with skepticism whose face is partially shaded with black and slight irregularities expressing a hard life. But overriding that is the compelling images of him and the young lady with him painted with various colors of blue which is reflective of the stress that he is going through with her and her exhibit of one blue hand and one black reflecting that she will attempt to be obedient but has a bent toward veering another way.

I like this painting because its imagery of emotion is very deep, intriguing and a true facilitator to the life that all black people experience with black young ladies to ensure that corrective measures can be done as well as have knowledge of the temptations that are out there.

Thank you.

Felicia

http://www.beardenfoundation.org/artlife/biography/biography.shtml
http://www.beardenfoundation.org/index2.shtml
http://www.wikiart.org/en/romare-bearden
http://www.nytimes.com/2009/06/10/arts/design/10colescott.html
http://arthurrogergallery.com/artists/robert-colescott/
https://en.wikipedia.org/wiki/Robert_Colescott
http://www.blackpast.org/aah/colescott-robert-1925

co-student reply

I agree that both (Romare Bearden & Jean-Michel Basquiat) as African Americans or black citizens did their part in portraying elemental feeling in all of their artistical work. One with expressionist art and the other with graffiti which is a self-taught expression and allows deep emotional depictions and is very abstract and unusual.

One thing about collages is that the piece here or there makes a person center on it and begin an analysis and if done right ... so does the agreement of viewer coincide.

Bearden was able to exhibit a connection of a train to historical fact. He was able to use his artistical talents to tell a tale to all the horrific experiences and flight to freedom and hope for a better life with the Great Migration movement.

In "Irony of a Negro Policeman" Basquiat reflective points show that he felt a conflict as to whether a person of African American descent could adequately be an objective enforcer and that he was merely a pawn used by white society. Contrary to his opinion or theme relayed, I disagree and feel all rules stands for all races with no favoritism at all and that a black man or woman can more than adequately do the job needed.

Thank you.

Felicia

Discussion Week 9 - Humanities 112

Government and the Arts

Discuss the U.S. Government's support during the Great Depression for programs, such as the Federal Arts Project, the Federal Writers' Project, and other such efforts.

In support the U.S. Government enacted the Works Progress Administration in 1935 that was part of the New Deal struggle against the Great Depression. Programs created was the Federal Arts Projects, the Federal Writers’ Project and other programs to provide unemployed artists and artisans employment and to create artistic works such as murals, posters, graphic art, sculptures, easel paintings, photography, theatre scenic designs and arts and crafts. Further the Federal Art Project purpose during the depression was to establish community art centers all over the country for art works to be displayed representing American Artists with conclusive research and documentation and helped sustained over 10,000 artists. Its primary goal was to provide employment and also produce art for non-federal municipal buildings and public spaces.

The Federal Writers’ project was also under the Works Progress Administration and its purpose was to employ writers, editors, historians, researchers, art critics, archaeologists, geologists and cartographers which amounted to over 6,600 people. Supplying essays on political, non-political discussions and narratives based on slavery using interviewing techniques. Also, produced was ethnic studies, folklore collections, local histories, nature studies of more than one thousand books and pamphlets.

Another development known as the Federal Theatre Project was part of the Works Progress Administration. It allowed the creation of jobs for unemployed theatrical people of which 10,000 professional in all facets were employed. One of my favorite actors Orson Welles came through this program (featured in Jane Eyre and other great movies I love.)

Also, the Federal Music Project was beneficial in alleviating the effect of lost of jobs for musicians during the Great Depression. Orchestras were eliminated from hotels, restaurants and silent movies, opera companies closed and the teaching of music disappeared from schools and universities. By organizing orchestras throughout the country this allowed the continuous flow of musical entertainment and employment.

Discuss whether or not such projects were good government investments during those hard times, and provide two (2) examples that support your viewpoint.

As known a depression is a severe swing of lack of employment, financial collapse and business failures. Due to the lack of eligible opportunities for employment this situation causes an inability to survive and lack of stability. Further because the government came in and interceded this allowed the retainership of artistic culture, employment of artists, artisans, musicians, writers all of which helped establish a historical base and musical value. Not only was this a good governmental investment for the country it was also a good morale builder and incentive to progress and evolve. Historical fact was established that lent detailed account of the hardship, steps and plan that were put into effect to put the country back on its feet.

Two examples that support my viewpoint is the establishment of cultural museums that displays the most moving paintings that depict historical times, themes and enlightenment of an era past and the other example is that our musical level has increased and is equitable to some of the most established orchestras in the world.

http://www.britannica.com/topic/WPA-Federal-Theatre-Project
http://www.britannica.com/topic/WPA-Federal-Writers-Project
http://www.britannica.com/topic/WPA-Federal-Art-Project
Sayre, H.M. (2014) The Humanities: Culture, Continuity and Change, Boston, MA: Pearson

Determine in what ways the U.S. government currently tries to support the arts. Provide at least one example to support your view.

The U.S. government acts as a facilitator and support of continuing artistical talent to be exhibited by assigning grant monies to differing organizations that are in charge of disbursing monies to aid in this endeavor. Further each state also acts as an assistant to encourage the continuance of Arts. During a time of budget analysis monies are set aside by the federal government for the disbursement of one to one match grants per state. The reasons why is art acts as a positive stimulant and by each display of artistical talent this can be an opening for the impoverish to be exposed to art and become an incentive to perpetuate and nurture new talent. Further it affects economic growth and make communities desirable, aloof but welcoming.

In support of this there are various websites that allow the applying for grants to participate in art displays and creation of art based on or inspired by different styles.

https://www.arts.gov/grants/apply-grant/grants-organizations
http://www.nasaa-arts.org/Advocacy/Advocacy-Tools/Why-Government-Support/WhyGovSupport.pdf

Thank you.

Felicia

co-student reply

I agree that the depression was an era in the United States history that almost configuratively destroyed this country. But due to a shrewd, cultured, wise leader (President Franklin D. Roosevelt) was able to discern and evaluate the destructiveness of the depression and take steps to advert destruction.

The Work Progress Administration was in fact a study which evolved to differing projects to retain a cultural base and head off unemployment. As you stated one out of four Americans being jobless is too many. Twenty-five consumers out of a hundred is a factual basis in the closures throughout the country. Without working individuals these people lives were in jeopardy of dying of starvation and inability to function normally.

The theory of each project was to preserve historical fact, cultural presence, retain our talented people to keep the educational level up and mostly head off unemployment and make monies in escalated segments to handle the depressionary era.

The New Deal was the DEAL for the people and country to show support by extending a helping hand. As an impoverish person this deal won the people's heart and backing because of these measures done by President Roosevelt and his administers this showed they cared. I feel the same a job or position represents my pride in this country with my loyalty and backing.

I love the attitude of the Government in its right to progress Art in all its creative avenues to cultivate greatness in this country. Furthermore with the knowledge that this would be an investment that would return profit as well as stability.

Thank you.

Felicia