Reference no: EM13790761
1. Describe and discuss the various types of computer intrusions.
Examples of computer intrusions:
- Theft of intellectual property
- Theft of personal information/ Hacking
- Child pornography
- Online Fraud
One type of computer intrusion is computer hacking (also known as computer fraud). Computer crimes in which the hacker is able to gain access, change information or cause damage to the entire computer system. This crime may result in a fine ranging from $1,000 to $10,000. Depending if the crime is classified as a misdemeanor or felony, these criminals may serve up to three years in county jail.
Access device fraud is using a fraudulent email to obtain one's bank account number and password. The criminal is also convicted of selling or transferring stolen bank account, credit card or debit card info. This criminal fraud is charged as a felony crime and punishable to by receiving a prison sentence of 10 to 15 years in federal prison. The criminal is also forced to pay a fine of $250,000. A second time offender is punishable by up to 20 years in federal prison.
Computer intrusions have taken cybercrime to another level. Instead of physically breaking into business offices or homes to gain private information; criminals are now using their knowledge of technology by breaking into laptops, personal computers and wireless devices. These perpetrators range from computer geeks that are simply looking for bragging rights, to criminals that are looking to sell your info on the black market.
2. Explain the value to local law enforcement to know and learn about the collective global data and research found from Transparency International... Transparency International could help local law enforcement by providing them with any extra information that they may not otherwise have. Corruption and abuse is something that local law enforcement has to deal with on a daily, therefore, any information that can be provided to them will be vital. Having this type of insight could be a plus.
Explain the value to local law enforcement to know and learn about the cultural-demographic-economic and commerce related information found in the CIA's World Book of Facts... The book of facts provides information that could help lead law enforcement in the right direction. The book of facts includes information on history, people, government, economy, geography, communications, transportation, military and transnational issues for
Explain the Federal False Claims Act (qui tam) and how it could apply to the investigation of suspected terrorism...The False Claims Act rewards whistleblowers whose qui tam lawsuits recover government funds and provides job protection to whistleblowers because of the professional and personal risks they take to expose and stop fraud against the government. This could help law enforcement identify a terrorist if they call 911 to report a bomb that is not there. The call may be traced back to a real terrorist supporter.
3. 1. Explain the value to local law enforcement to know and learn about the collective global data and research found from Transparency International...
2. Explain the value to local law enforcement to know and learn about the cultural-demographic-economic and commerce related information found in the CIA's World Book of Facts.
3. Explain exactly how NIMS provides a consistent nationwide template to enable federal, state, and local governments, and private-sector and nongovernmental organizations to work together to effectively prepare for, prevent, respond to, and recover from incidents regardless of their cause, size, or complexity, including acts of terrorism.
4. From the standpoint of resource management, explain how NIMS facilitates building upon existing incident management and emergency response systems and provide at least 3 areas to improve the process.
5. Complete (explain to us) an open source google search on the general topic of businesses-sales tax schemes uncovered in America where terrorists are defrauding and under reporting income then laundering and transferring those monies to others to fund suspected terrorists.
6. Complete (explain to us) an open source google search (Hawala monetary schemes) and "Western Union" money transfers as they relate to suspected terrorism.
7. Explain the concepts of Informal Value Transfer Systems and how this scheme is applied to terrorism investigations.
8. Complete (explain to us) an open source google search for the USC statute for the Foreign Corrupt Practices Act (FCPA) and explain how it can be applied to suspect terrorism investigations.
9. Explain Florida's Contraband and Forfeiture Act and apply to suspected terrorism.
10. Explain Florida's Money Transmitter (laundering) Act and apply to suspected terrorism.
11. We find many productive-successful economic crimes today in the field of Health Care...explain the Federal False Claims Act (qui tam) and how it could apply to the investigation of suspected terrorism.
4. There was a turning point in the rise of Arab nationalism when the Ottoman Empire had decided to enter the World War I in August 1914 in which they had sided with the Germans. On 5 June 1916, Husayn declared the Arabs independent and expanded their revolt against the Turkish rule. The Ottoman Empire didn't fall all at once but many Arabs in the Hijaz along with some Palestine and Syria had begun to fight the Turks. Late in October, the Ottoman Empire had signed an armistice with the Allies at Mudros. The Arabs had promised the right of self-determination by the British and the French were happy. Arab nationalism is the belief that the Arabs constitute a single political community or nation and should have a common government. There's a more eloquent definition that was accepted by a group of Arabs leaders years ago which is, whoever lives in our country, speaks our language, is reared in our culture, and takes pride in our glory is one of us. As a sop to Woodrow Wilson's idealism, the Allies had set up a mandate system in which Asian and African lands that were taken from Turkey and Germany were put in a protective relationship to a Great Power called the mandatory. The mandatory would teach the people how to govern themselves. Each mandatory power had to report periodically to a League of Nations body called the Permanent Mandates Commission to prevent exploitation. Today's definition of Arabs is anyone who speaks Arabic as his or her native language. But, many of those that speak Arabic doesn't think of themselves as Arabs plus other Arabs doesn't think of them as Arabs. The rise of pan-Arabism in Egypt coincided with the overthrowing of General Nagib, the titular leader of the 1952 revolution that expelled King Faruq by Colonel Gamal Abd al-Nasir in 1954. Nasir was a leader for approximately sixteen years where he was known to be dictatorial or deferential, charismatic or suspicious, ingenuous or crafty. He was also known to react more than he acted. Nasir began his leadership from behind the scene but was able to engineer Nagib's ousting. As an awkward speaker, he wasn't a favorite in the public eye. The public didn't support him until he defied the West. Nasir rejected the strings on Western aid. Nasir emerged as the leader of Arab nationalism. Hussein flew to Cairo on 30 May to sign an agreement with Nasir on a joint Arab military command.