|
Dec 05, 2024
|
|
|
|
CRJ 178 - E-Crime Investigative Methods Credits: 3 Lecture Hours: 3 Lab Hours: 0 Practicum Hours: 0 Work Experience: 0 Course Type: Open This course identifies electronic crime, instructs the student on current laws, and teaches the investigative methods used in law enforcement today to gather evidence to prosecute and testify regarding these criminal acts. Competencies
- Explain computer crime
- Define cyber computer fraud
- Define identify theft and list the steps to prevent identify theft
- Define cyber stalking
- Define and describe juvenile cyber crime
- Define and describe pornography on the web
- Demonstrate knowledge of electronic banking and money laundering
- Demonstrate knowledge of gambling in cyberspace
- Describe search and seizure as it relates to electronic crime
- Describe the Fourth Amendment ?Reasonable Expectation of Privacy?
- Define reasonable expectation of privacy in computers as storage devices
- Define reasonable expectation of privacy and third-party possession
- Define and outline consent searches
- Define exigent circumstances
- Define plain view searches
- Define and describe special cases such as searches in the work place
- Describe searching and seizing electronic evidence with a warrant
- Describe basic strategies for planning and executing electronic searches
- Describe when hardware is merely a storage device for evidence of a crime
- Describe when hardware is itself contraband, evidence, or an instrumentality of the fruit of the crime
- Explain the Privacy Protection Act
- Outline a brief history of the privacy Protection Act
- List the terms of the Privacy Protection Act
- Define how the Privacy Protection Act applies to computer searches and seizures
- Explain the civil liability under the Electronic communications Privacy Act
- Define privileged communications in regards to lawyers, physicians, and clergyman
- Search warrants.
- Explain and understand the search warrant application process appropriate to electronic evidence at a single location crime scene
- Explain an affidavit
- Explain probable cause to search
- Describe chain of custody as it relates to processing evidence
- Describe search methods to utilize when executing a search warrant
- Identify hardware and storage devices potentially containing evidence of a crime
- Define return of service
- Describe the best current practices for the collection, preservation, transportations, and storage of electronic evidence
- Understand the nature of victimization that can occur in cyber crime
- Describe the groups affected by cyber exploitation, stalking, and obscenity
- Describe the offenders who typically prey on victims in cyber stalking and exploitation case via the Internet
- Understand the law and legislation in the areas of cyber stalking, cyber exploitation and pornography
- Describe the Supreme Court cases that have recently been decided concerning federal effort to target cyber criminals and protect children online
- Understand and describe the issues with pornography online, child pornography, and child exploitation facilitated by the Internet
- Understand and describe difficulties faced by law enforcement in detecting, investigating, and prosecuting case of cyber stalking and cyber exploitation
- Describe the elements of the crime for cyber stalking
- Describe the elements of the crime for child pornography
- Analyze topics pertaining to anarchy and hate on the World Wide Web
- Legally define a hate crime and describe how specific groups use the internet to spread their messages of hate
- Explain the relationship of ?special interest or single-issue extremist? groups
- Describe recent terrorist activities of activist groups in the United States
- Describe some of the techniques that hate groups use to spread their propaganda
- Discuss the primary issues associated with the USA PATRIOT Act and list traditional tools or surveillance that have been expanded with the act
- Explain the conflicting roles and activities observed within law enforcement pertaining to investigation versus intelligence gathering
- Analyze topics pertaining to digital laws and legislation
- Explain the intent and fundamental concepts of search and seizure laws as it applies to digital crime
- Identify situations where search and seizure is possible without a warrant
- Describe the federal statutes that govern electronic surveillance in communication networks
- Discuss the issues presented regarding the admission of digital evidence at trail
- Identify and discuss significant court cases on scientific evidence and digital crime
- Discuss law enforcement roles and responses to digital crime and digital terrorism
- Discuss federal law enforcement roles and responses to digital crime and digital terrorism
- Describe state law enforcement responses to computer crime
- Describe local law enforcement responses to computer crime
- Identify the factors that have limited law enforcement efforts against electronic crime.
- Discuss the investigation of computer-related crime
- Explain and understand the search warrant application process appropriate to electronic evidence at a single-location crime scene
- Identify hardware and storage devices potentially containing evidence of a crime
- Explain and understand the legal standard and best current practices for the documentation of a single-location electronic crime scene
- Explain and describe the best current practices for the collection, preservation, transportation, and storage of electronic evidence
- Distinguish between sing-scene, multiple-scene, and network crimes
- Be able to communicate an understanding of network architectures and standards relevant to network investigations
- Identify sources of assistance for multiple-scene and network operations
- Identify categories of evidence and probable locations of that evidence
- Explain digital terrorism
- Define the concepts of ?information warfare? and ?cyber terrorism?.
- List the four categories of attacks that encompass cyber terrorism and/or information warfare: infrastructure attacks, information attacks, technological facilitation and promotion
- Identify critical infrastructure elements that are potentially vulnerable to cyber terrorism and/or information warfare
- Define and describe an information attack
- Describe some tactics used in cyberspace to share information and promote terrorist ideologies
- Define the words “stenography” and “cryptography” with relation to their use in information warfare in cyber terrorism
- Explain the active role of global entities in recent cyber attacks against the United States
- Describe digital criminals and hackers
- Distinguish between computer crime, criminal hacking, and non criminal hacking
- Recognize the role media hype plays in influencing young hackers
- Describe the role of technology that drives the hacker subculture
- Predict hacker actions based on their type
- Explain the terminology used to describe hackers in the media
- Analyze and describe white collar crimes using computer technologies
- Describe how computer technologies have altered the ways in which embezzlement is committed
- Describe how computer technologies have increased the opportunities to commit money laundering
- Describe how computer technologies have affected the crime of corporate espionage
- Describe how computer technologies and the increasing use of the Internet have affected identity and fraud crimes
- Analyze topics pertaining to viruses and malicious code
- Identify and distinguish the various type of viruses and malicious code
- Understand the differences between the differing types of viruses, including file viruses, boot viruses, macro viruses, and network viruses
- Understand the differences between a virus and a worm
- Understand the definition and operation of a ?Trojan Horse? and how it differs from a standard virus
- Describe adware and spy ware and explain why such applications are controversial
- Describe and understand other types of malicious code and attacks, including denial of service attacks and blended threats
- Describe the impact of virus hoaxes
- Understand who the virus writers are and why they write viruses
- Court testimony
- Describe how a witness is made an expert witness
- Describe the order of a trial
- Explain the term procedural fairness
- Describe testimonial evidence
- Outline the best practices for presenting testimonial evidence
- Describe the best practices for preparing for trial
- Define the importance of integrity in legal proceedings
Add to Portfolio (opens a new window)
|
|