Terrorists' Use of Technology

Explain specifically three ways that the terrorist organization uses, or has used technology in their activities . Provide a profile on the terrorist group including: • known members; • activities involving technology; • any legal action taken against the organization. Explain the use of high tech evidence to support cyber crime cases. Provide examples and cite your references in your work. Part Two: Online Identity Theft Using the internet, search for two online identity theft cases. • Summarize the facts of each case, including the following: • How the thief obtained the victim's information. • What the thief did with the information. • The impact to the victim. • Recommend at least three methods for each case that the victim could have used to prevent the theft. • Critique the tracking methods used to investigate internet identity thefts.              

Sample Solution