CCJ 4931 SPECIAL TOPICS IN CRIMINAL JUSTICE REF # 6002

CCJ 4931 SPECIAL TOPICS IN CRIMINAL JUSTICE
REF # 6002
DIGITAL CRIME/DIGITAL TERRORISM
SUMMER 2010
COURSE TAUGHT COMPLETELY ONLINE
JOHN ORTIZ SMYKLA, PH.D.
JUSTICE STUDIES
DISTINGUISHED UNIVERSITY PROFESSOR
EMAIL: [email protected] (ALLOW 24 HRS FOR REPLY)
PHONE: CELL - 205.862.4024 (NO CALLS AFTER 8 PM PLEASE)
NOTE: DO NOT LEAVE ANY MESSAGES ON MY OFFICE PHONE
OR NOTES IN MY OFFICE MAILBOX B/C I AM NOT ON CAMPUS.
MY GRADUATE ASSISTANT IS JEREMY SPARKS
EMAIL: [email protected] (ALLOW 24 HRS FOR REPLY)
COURSE DESCRIPTION:
Digital Crime/Digital Terrorism is an undergraduate, introductory course for
students with a beginning interest in studying crimes and terrorists acts committed
using digital technology. Course material is presented in a nontechnical and
nonjargon manner. The course covers four topic areas: (1) the etiology of the digital
crime and digital terrorism problem; (2) the various types of crimes that are
committed using digital technology; (3) the law, law enforcement, and investigation
of digital crime and digital terrorism; and (4) the prevention of digital crime and
digital terrorism and an overview of what the future might hold in these areas.
REQUIRED TEXT:
Robert W. Taylor, Eric J. Fritsch, John Liederbach, and Thomas J. Holt, Digital Crime
and Digital Terrorism Second Edition (Boston, MA: Prentice Hall, 2011).
STUDENT LEANING OBJECTIVES:
1. Explain the etiology of the digital crime and digital terrorism problem
2. Illustrate the various types of crimes that are committed using digital technology
3. Sketch the law, law enforcement, and investigation of digital crime and digital
terrorism
4. Predict the prevention of digital crime and digital terrorism and an overview of
what the future might hold in these areas.
TOPICS:
1. Descriptions of the types of crimes and terrorists acts committed using computer
technology
2. Criminological theories addressing hackers and other types of digital criminals
3. Types, nature, and extent of digital crimes (white-collar, viruses and codes, sex
crimes, obscenity, pornography, pedophilia, and child molestation)
4. Overview of the legal strategies and tactics targeting computer crime
5. Future of digital crime and terrorism
GRADING EVALUATION:
Quizzes: 130 points
Discussions: 70 points
Final Project: 50 points
233 - 250 A
225 - 232 A218 - 224 B+
208 - 217 B
200 - 207 B193 - 199 C+
183 - 192 C
175 - 182 C168 - 174 D+
158 - 167 D
150 - 157 D< 150 F
Weekly Quizzes:
There are six quizzes in the course. See the link "Schedule of What to Do and When".
Each quiz covers only that week's two chapters. It is NOT a group quiz. Each one of
you completes his/her own quiz.
The quiz will be available online beginning 1 AM Saturdays and end 11:59 PM
Sundays. The quizzes are short, ranging from 15 to 25 or so TF/MC questions. You
will have ONLY 12 minutes to complete each quiz.
Make sure you have Respondus LockDown Browser installed on your computer. A
new version of the Respondus LockDown Browser, version 1.0.4, is now available.
Make sure you upgrade to the latest version in order to access the quizzes. You can
download the software and reinstall it by going to the "Software Downloads" link in
your Argus Software tab. For Qs or concerns, please contact the ITS HelpDesk at
850.474.2075. I call your attention to the Expectations for Academic Conduct and
Plagiarism Policy discussed below. I realize the temptation to cheat when you are
taking an online examination. The quizzes are NOT open book. I hold you to the
highest ethical standard when completing the quizzes.
I compare your computer's IP address to all other students' IP addresses. I can see
exactly where and when you logged on, how long it took you to answer each Q, when
you logged off, and who your Internet provider is.
In a recent semester I caught three students all using the same IP address. They
took the exam one right after the other using the same computer. I filed academic
misconduct charges against all three and all three failed the class. I do not need
proof beyond a reasonable doubt, only reasonable suspicion so don't do anything
stupid that makes me think you cheated
Participation in Discussion Board:
You will be assigned to a small group of three students for the purposes of weekly
threaded discussions and completing a final project.
The topics of the weekly threaded discussions are shown in the link "Schedule of
What to Do and When".
The Discussion board opens every week at 1 am Mondays, and closes at 11:59 pm
Fridays. You must make a minimum of three (3) "thoughtful" and evenly spread out
postings.
By "thoughtful postings" I mean your postings must show evidence of (1) having
read BOTH chapters (each week you read two chapters); (2) critical thought (Don't
rehash the text or what the other person in your groups says. Instead raise the bar
on YOUR critical thinking skills; go beyond recalling data or information from the
chapters, and instead apply the knowledge, analyze it, synthesize it, or evaluate it.
Study up on Bloom's taxonomy of learning domains to learn more about critical
thinking. www.nwlink.com/~donclark/hrd/bloom.html); (3) critique your peers;
(4) respond to your peers when they raise comments/issues about your postings.
By evenly-spread postings across the week I mean you make your first thoughtful
posting NLT 6 PM Tuesdays and then spread your other thoughtful postings across
the week.
In other words, you CANNOT post on Tuesday and then come back on Friday and
post two more times. Nor can you make all of your postings on Tuesday or
Wednesday. Get the point? Post evenly across the week.
You will earn 8 points for each week's discussion if you make your first thoughtful
post NLT Tuesday, 6 PM AND post the minimum of three times across the week.
More than three thoughtful and evenly spread postings can earn 9 or 10 points.
You will earn 7 points for each week's discussion if your first post appears after 6
PM Tuesday but before 6 PM Wednesday AND you make three or more evenly
spread thoughtful postings across the rest of the week.
You will earn 5 points for each discussion posting if your first post appears after 6
PM Tuesday but before 6 PM Thursday AND you make three or more evenly spread
thoughtful postings across the rest of the week.
You will earn 0 points if you post after 6 PM Thursday regardless of the number or
quality of your posts.
Final Project:
You and the other two members in your group will complete a final project. All
three of you will receive the same grade so make sure all of you contribute
meaningfully. I don't want to hear excuses that so and so isn't contributing.
How do you do a project virtually with two other members? Easy. You talk by
phone. Maybe have a conference call. Use Skype. Telephone each other. Use
carrier pigeons. Send notes in a bottle - no, wait, the oil spill will mess that up. Get
the point? Just share phone numbers and other contact options with each other.
Get in touch with each other early. I suggest starting the project as soon as you get a
good understanding of Chapter 1.
This is what you will do. You read in Chapter 1 that there are four types of
computer/digital crime. I want your group to select one of those. Discuss the one
you select. Research one good example of that crime. Describe what happened give details on the who, what, where, when, and how of it all. Report details on the
offender(s) and victim(s). What laws were broken? How was the crime
investigated? By whom? Where? How was it prosecuted? Punished? Did anything
change to prevent the crime from occurring in the future? For example, was new
legislation written? Was the public educated via the media? A movie made abt it?
And finally, select a criminological theory from Chapter 3 that you think applies best
to explain this case. Explain your selection in detail. Feel free to bring in the
knowledge you gained from your criminology class as well. Make it fun for
yourselves.
I will create a Dropbox for the final project. Final projects are due in the Dropbox
anytime the last week of class. The Dropbox will open Monday, August 2 at 1 AM
and close Friday, August 6 at 11:30 PM.
Projects MUST be submitted in WORD or as a Rich Text File (rtf). NOT
WORDPERFECT. If any project is submitted in WordPerfect two things will happen.
First, an automatic 10 points will be deducted. Second, you will be sent an email
saying you submitted in WordPerfect and you will have 24 hours to resubmit in
either WORD or as a rtf file. If the resubmission is not received within 24 hours the
paper will not be accepted.
The project MUST be word processed using Times New Roman, 12 font, and double
spaced.
Create text headings for interest. Make sure to proof read. Major deductions for
grammatical and spelling errors. Add a bibliography page citing the sources you
used, especially the online sources. Cite online sources something like this:
Jim Bounds, "Kevin Mitnick: The Most Notorious Hacker,"
www.webster.edu/philosophy/~umbaugh/courses/frosh/dairy/mitnick.htm
(accessed July 22, 2010).
If I can't locate your sources expect major deductions.
Make sure your project is NOT a copy and paste job. I will submit all papers to
turnitin.com. Any paper I find that is excessively a cut and paste job will receive
major deductions.
I want you to have fun with your paper. Be original and creative.
EXPECTATIONS FOR ACADEMIC CONDUCT/PLAGIARISM POLICY:
Academic Misconduct speaks to the integrity of student learning and performance.
The Student Code of Conduct addresses non-academic behavior and provides a
mechanism for the University to deal with inappropriate or illegal behavior on the
part of students. Disruptive behavior in an eLearning environment, for example,
would actually fall under this regulation.
The Student Code of Conduct sets forth the rules, regulations and expected behavior
of students enrolled at the University of West Florida. Violations of any rules,
regulations, or behavioral expectations may result in a charge of violating the
Student Code of Conduct. It is the student’s responsibility to read the Student Code
of Conduct and conduct themselves accordingly. You may access the current Student
Code of Conduct at http://uwf.edu/judicialaffairs.
As students enrolled in Criminal Justice and Legal Studies you should be held to the
highest standards. If your future professional endeavors include employment within
the criminal justice field you should know that your reputation is very important
and could play a key role in your job search. Please refer to the Student Handbook
for the University's policy regarding academic conduct, specifically pages 23
through 31. These policies will be strictly adhered to and enforced should the need
arise.
Other important policies and sites:
* UWF Plagiarism Policy (Excellent examples of what constitutes plagiarism
available online from the Pace Library)
* You can view the latest edition of the Student Handbook on the website of the
Office of Judicial Affairs at http://uwf.edu/JudicialAffairs/
You can view the website of the Office of Judicial Affairs at
http://uwf.edu/JudicialAffairs/ for more on the student code of conduct and the
student handbook.
STUDENTS WITH SPECIAL NEEDS:
The Student Disability Resource Center (SDRC) works with students and faculty to
help make UWF an accessible learning environment in accordance with the
Americans with Disabilities Act and Section 504 of the Rehabilitation Act. The SDRC
offers a variety of services for students with documented disabilities, including
learning disabilities, deaf/hard of hearing, blind/low vision, mobility limitations,
ADHD, psychiatric disorders, and medical disabilities. Contact Student Disability
Resource Center, 11000 University Parkway, Bldg 21/Room 130, Pensacola, FL
32514. Office: 850-474-2387 Fax: 850-857-6188 E-mail: [email protected]
RESERVE/NATIONAL GUARD POLICY:
Per UWF's policy, to fulfill a reservist or National Guard military obligation of no
more than two weeks concurrent with a normal academic semester at UWF,
students must receive written permission for such absences from the instructors
and departmental chairpersons for each course in which they are enrolled. The
approval is not automatic but is discretionary with the instructors and departmental
chairpersons.
CHANGES IN COURSE REQUIREMENTS:
Since all classes do not progress at the same rate, I may wish to modify the
requirements for this course or their timing as circumstances dictate. If I do so, I
will give you adequate notice.
WEEK 1 - MONDAY JUNE 14 THROUGH SUNDAY JUNE 20
OVERVIEW OF DIGITAL CRIME AND DIGITAL TERRORISM
Reading: Chapters 1 and 2
Activity: Discuss with your small group: (1) Which type of computer/digital crime is
the most serious? Explain. Defend your position and critique your peers' positions.
(2) Which type of cyber-terrorism/information warfare is the most serious? Explain.
Defend your position and critique your peers' positions.
Quiz: Complete online quiz#1/Chapters 1 and 2. Quiz goes online at 1 am Saturday
June 19 and ends at 11:30 pm Sunday June 20.
WEEK 2 - MONDAY JUNE 21 THROUGH SUNDAY JUNE 27
CRIMINOLOGICAL THEORY TO EXPLAIN DIGITAL CRIMINALITY; ARE HACKERS
CRIMINALS?
Reading: Chapters 3 and 4
Activity: Discuss with your group: (1) Explain which criminological theory best
explains Kevin Mitnick's digital crime (p. 9), Lori Drew's digital crime (p. 11),
"Wonderland" (p. 12), and Wolverine Review (p. 13). Defend your position and
critique your peers' positions. (2) Explain why hackers do not consider themselves
to be criminals. How can someone break the law, but not feel deviant? Defend your
position and critique your peers' positions.
Quiz: Complete online quiz#2/Chapters 3 and 4. Quiz goes online at 1 am Saturday
June 26 and ends at 11:30 pm Sunday June 27.
WEEK 3 - MONDAY JUNE 28 THROUGH SUNDAY JULY 4
TYPES OF DIGITAL CRIME PART 1: WHITE-COLLAR, VIRUSES, AND CODES
Reading: Chapters 5 and 6
Activity: Discuss with your group: (1) Which white collar computer crime is the
most serious? Explain. Defend your position and critique your peers' positions. (2)
Which criminological theory from Chapter 3 best explains the criminality of the
virus writer, Dark Avenger? Defend your position and critique your peers'
positions.
Quiz: Complete online quiz#3/Chapters 5 and 6. Quiz goes online at 1 am Saturday
July 3 and ends at 11:30 pm Sunday July 4.
WEEK 4 - MONDAY JULY 5 THROUGH SUNDAY JULY 11
TYPES OF DIGITAL CRIME PART 2: EXPLOITATION, STALKING, OBSCENITY,
PEDOPHILIA, CHILD MOLESTATION, PROSTITUTION, AND HATE
Reading: Chapters 7 and 8
Activity: Chapter 7 surveys the nature of exploitation, stalking, obscenity, pedophilia
and child pornography, child molestation, prostitution, and the sex trade on the
Internet. Take a stand as to which of these digital crimes is the most serious when
committed on the Web, defend your position, and critique your peer's positions.
Also explain the challenges law enforcement faces in prevention, enforcement, and
investigation of that digital crime. (2) Find a Web site for a hate group AND another
Web site for a left-wing terrorist group either discussed in this chapter or
elsewhere. Describe the sites. How does each site dehumanize, desensitize, and
demoralize the "enemy"? How does each site build camaraderie in cyberspace?
Then study the USA PATRIOT ACT. Should police have the right to monitor the Web
sites you researched? Should police have the right to monitor persons that visit
these sites - that includes you! Or, is the expanded role of police in intelligence
gathering a significant threat to the personal and civil liberties of all Americans and
will do little to thwart terrorism? Defend your position and critique your peers'
positions.
Quiz: Complete online quiz#4/Chapters 7 and 8. Quiz goes online at 1 am Saturday
July 10 and ends at 11:30 pm Sunday July 11.
WEEK 5 - MONDAY JULY 12 THROUGH SUNDAY JULY 18
REPORTING COMPUTER CRIME: IC3
Reading: Go to the Web site of the Internet Crime Center
http://www.ic3.gov/default.aspx. Click Press Room. Click IC3 2009 Annual Report
on Internet Crime Released. Scroll down and click The report is posted in its
entirety on the IC3 website. Then click 2009 IC3 Annual Report. Read the report.
Activity: Based on your reading of the 2009 Internet Crime Report discuss with your
group these THREE questions/issues: (1) You learned in your intro CJ course that
all criminal justice data bases (e.g., the UCR and NCVS) have strengths and
weaknesses. After reading the 2009 Internet Crime Report what strengths and
limitations do you see in this dataset? (2) Look at Figure 4: 2009 Top 10 Most
Common Complaint Categories. (Definitions of these complaint categories is given
on p. 17 of the report.) Use a search engine and research the TOP most common
complaint category. What is it? What do some of the Web sites say about this TOP
most common complaint category? Did you receive this scam? What did you do? If
you received it, how did you know it was a scam? Did any of your family or friends
fall victim/complainant to any of the top ten complaint categories shown in Figure
4? What happened? (3) Now look at Map 1 Top 10 States by Count: Individual
Perpetrators and Map 3 Top 10 States by Count: Individual Complainants. In both
cases, what we find is Florida ranks second in the U.S. in terms of
perpetrators/offenders (Map 1) and victims/complainants (Map 3). What is your
theory to explain why Florida ranks so high in both categories? You CANNOT shoot
off the hip and say something uncritical like "Because Florida has a lot of retirees
who become victims and a lot of young people who are perpetrators." That kind of
uncritical response will get you zero points. Whatever theory you offer MUST be
supported by logical facts/data that you present. That means you have to research
your ideas and find facts/data before throwing them out there for others in your
group to read and critique. That is only fair. You MUST engage in critical thinking
now. That means you are intelligent enough to wade through data sources/Web
sites, and support your theory/ideas with facts/data.
Quiz: There is NO quiz this week.
WEEK 6 - MONDAY JULY 19 THROUGH SUNDAY JULY 25
CYBERSLEUTHS, DIGITAL FORENSICS, AND ISSUES IN INVESTIGATION OF DIGITAL
CRIME
Reading: Chapters 11 and 12 and How to Investigate Cyber Crime
Activity: After reading Chapters 11 and 12 and the article "How to Investigate Cyber
Crime" think of yourself as a "cybersleuth". If you're called to take down a child
pornography ring what are you going to do and not do? Make specific references to
what you learned in Chapters 11 and 12 and the article "How to Investigate Cyber
Crime". Discuss this with your group. Defend your position and critique your peers'
positions.
Quiz: Complete online quiz#5/Chapters 11 and 12. Quiz goes online at 1 am
Saturday July 24 and ends at 11:30 pm Sunday July 25.
WEEK 7 - MONDAY JULY 26 THROUGH SUNDAY AUGUST 1
Reading: Chapters 13 and 14
Activity: Chapter 14 in particular explores the trends, needs, and issues related to
cybercrime and terror in the future through the use of forecasts. Pay particular
attention to the limitations in the development and use of forecasting. Those
limitations notwithstanding, which of the forecasts described in Chapter 14 are
most likely to come to pass? Which of the forecasts are least likely to come true?
Explain your reasoning and critique your peers' positions.
Quiz: Complete online quiz#6/Chapters 13 and 14. Quiz goes online at 1 am
Saturday July 31 and ends at 11:30 pm Sunday August 1.
WEEK 8 - MONDAY AUGUST 2 THROUGH FRIDAY AUGUST 6
FINAL PROJECTS ARE DUE
Reading: No reading
Activity: Submit your final project to the Final Project Dropbox which opens
Monday, August 2 at 1 AM and closes Friday, August 6 at 11:30 PM. See the Syllabus
for details on the final project. Make sure you adhere to all of the requirements for
the final project.
Quiz: No quiz