Explain specifically three ways that the terrorist organization uses, or has used technology in their activities .
Provide a profile on the terrorist group including:
• known members;
• activities involving technology;
• any legal action taken against the organization.
Explain the use of high tech evidence to support cyber crime cases. Provide examples and cite your references in your work.
Part Two: Online Identity Theft
Using the internet, search for two online identity theft cases.
• Summarize the facts of each case, including the following:
• How the thief obtained the victim’s information.
• What the thief did with the information.
• The impact to the victim.
• Recommend at least three methods for each case that the victim could have used to prevent the theft.
• Critique the tracking methods used to investigate internet identity thefts.