Terrorists' Use of Technology
Explain specifically three ways that the terrorist organization uses, or has used technology in their activities .
Provide a profile on the terrorist group including:
⢠known members;
⢠activities involving technology;
⢠any legal action taken against the organization.
Explain the use of high tech evidence to support cyber crime cases. Provide examples and cite your references in your work.
Part Two: Online Identity Theft
Using the internet, search for two online identity theft cases.
⢠Summarize the facts of each case, including the following:
⢠How the thief obtained the victim's information.
⢠What the thief did with the information.
⢠The impact to the victim.
⢠Recommend at least three methods for each case that the victim could have used to prevent the theft.
⢠Critique the tracking methods used to investigate internet identity thefts.