Chat with us, powered by LiveChat

Evaluate the legal issues that pertain to the information in the case study and list the constitutional impediments to your investigation.

Terrorism Cyber Crime Investigation

Prior to beginning work on this assignment, review the MSCJ CyberNav Communication Case Study. You must support your statements throughout the paper with evidence from a minimum of eight scholarly sources in addition to those resources required for this course.

For this assignment you will take on the role of an investigator with one of the following agencies: FBI, CIA, U.S. Air Force, State Police, or County Sheriff. Your agency is tasked to find the source of the drone explosions and assess appropriate criminal liability. The focus for your criminal investigation and the abilities to gather evidence will necessarily depend upon the agency you choose, so choose wisely.

Include the following elements in your Final Paper:

Identify your chosen agency and explain how the agency obtained jurisdiction over this criminal case.
Identify the key witnesses and explain the evidence required to prosecute a criminal case.

Analyze the technical aspects of the case study and explain the steps involved in building a case against the perpetrator(s).

Explain the methods required to manage the cybercrime scene.

Identify the possible defendants for any potential crimes committed.

Evaluate the legal issues that pertain to the information in the case study and list the constitutional impediments to your investigation.

Assess the defenses that potential defendants and Cybernav may assert in the investigation.
Analyze the potential crimes and likelihood for obtaining any and all convictions for crimes committed in the case.
The Terrorism Cyber Crime Investigation Final Paper

Must be 10 to 12 double-spaced pages (2500-3000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the UAGC Writing Center (Links to an external site.).

Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least eight scholarly sources in addition to those resources required for this course.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the UAGC Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.
Required Resources
Article
Stephens, G. (2010). Cybercrime in the year 2025. In T. Finnie, T. Petee, and J. Jarvis (Eds.), Future Challenges of Cybercrime: Volume 5 Proceedings of the Futures Working Group (Links to an external site.) (pp. 11-16). Retrieved from http://www.foresightfordevelopment.org/sobipro/download-file/46-1162/54

In this article, criminal justice academics, police leaders, and military experts consider the continuing challenges of cyber crime. Students are asked to concentrate their attention on pages 12-16 of the pdf.
Multimedia
Goodman, M. (2012, June). Marc Goodman: A visions of crimes in the futures (Links to an external site.) [Video file]. Retrieved from https://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future?language=en

This 19-minute video, presented by a career law enforcement officer, describes the hazards of technology for criminals in the 21st Century. This video has closed captioning and a transcript that can be accessed here: https://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future/transcript?language=en (Links to an external site.)
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
Web Pages
O’Donnell, K. (2013, March 13). Laws need updating to combat cyber crime, officials testify (Links to an external site.). Retrieved from http://www.mainjustice.com/2013/03/13/laws-need-updating-to-combat-cyber-crime-officials-testify/

This web page explains the need for laws to be updated to remain relevant in the present and future of cyber crime investigation and prosecution. Links contained within the web paage provide students with additional, primary sources for further investigation into the topics presented.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
Rossi, B. (2014, August 19). The future of cybercrime (Links to an external site.). Retrieved from http://www.information-age.com/technology/security/123458380/future-cybercrime

This article discusses the difficulty of predicting future crime issues, but indicates that smart phones will be the new vanguard of cyber crime moving forward.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)

Recommended Resources
Book
U.S. Department of Justice. (n.d.). Prosecuting computer crimes (Links to an external site.). Retrieved from http://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf

This government manual provides a sound understanding of the difficulties of creating new legislation to combat cyber crime. The difficulties of finding an appropriate balance between the government’s interest in computer crime as well as the interests and abilities of the States to proscribe and punish such offenses are explored.
Website
MSCJ Resources (Links to an external site.) (http://ashford-mscj.weebly.com/)

This resource site will provide assistance in researching additional sources for the assessments within this course.
Accessibility Statement does not exist.
Privacy Policy does not exist.