Dwayne and debbie tamai family of emeryville

Assignment Help Basic Computer Science
Reference no: EM132694367

Dwayne and Debbie Tamai Family of Emeryville, Ontario.

Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family's home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.

After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai's custom-built home, and the power to turn individual appliances on and off via remote control.

It started off as a witticism with friends and got out of control to an extent that he didn't know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.

On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai's son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.

In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.

Scenario: 1

Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal's self-confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence.

Question 1

1. Provide a comprehensive narrative of Billy's competency and creating emotional distress on his parents.

2. Identify the role of Sommy in this operation

Scenario 2

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect.

1. What level of criminal behavior was exhibited by Billy in this operation?

2. The entire operation is classified as a serious domestic problem, why didn't the police officer file charges against the suspect?

Scenario 3

1. Modern approach use computer and internet technologies identify offender modus operandi, criminal intent, and motive.

2. Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.

Reference no: EM132694367

Questions Cloud

Prepare scope and objectives of the risk management process : Prepare the scope and objectives of the Risk Management Process section of the Risk Management Plan, based on the facts presented in the case study.
United states custom agents-digital forensic investigator : The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator.
What are the project costs of capital for new ventures : What are the project costs of capital for new ventures with betas of 0.85 and 1.65?
What is the gain or loss on the exchange : A printing press priced at a fair market value of $275,000. Assuming that the book value of the press traded in is $68,000, what is the gain or loss on exchange
Dwayne and debbie tamai family of emeryville : Provide a comprehensive narrative of Billy's competency and creating emotional distress on his parents. Modern approach use computer and internet technologies
Identify aspects of the performance management : Create a skills matrix including a variety of tasks which may be completed by members of your workforce and What should be specified by a professional code
Determine the patent amortization expense for year : Kleen Company acquired patent rights on January 10 of Year 1 for $2,800,000. Determine the patent amortization expense for Year 4 ended December 31
What are the steps of conducting an inspection by the pcaob : What are the implications of violating the PCAOB inspections rules (types of sanctions) and discovery of audit deficiencies on Loxon?
Culture can correct impact of lagging leadership creativity : This journal article focus on the how positive team culture can correct the impact of lagging leadership creativity.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Importance for avoiding common data analysis problems

Research articles on the Internet and discuss the importance for avoiding common data analysis problems and producing valid data mining results

  What do you need to do to make all the classes in package

Suppose you want to use the class Cool Class in the package my packages.library1 in a program you write. What do you need to do to make this class available.

  Why corporations must proactively manage e-discovery process

Briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

  Setup to control security and access

Your Windows 2016 domain is setup to control security and access. When would you allow users to have access to their local computer at an administrative level?

  Run the program several times

Write a function called Dice that calls random(n) where n is an integer. Run the program several times to verify that the rolls are random.

  Requesting firefighting equipment

Many fire stations handle emergency calls for medical assistance as well as calls requesting firefighting equipment.

  Write a flowchart that reads 10 integers

Write a flowchart that reads 10 integers and prints the first and the last on one line, the second and the ninth on the next line, the third and the seventh on the next line, and so forth. Sample input and the results are shown below

  Machine learning and deep learning

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

  Perform a search on the world wide web

There are a wide variety of hacker tools. Perform a search on the World Wide Web and review the hacking tools that are available. Evaluate the available tools and explain which one(s) are the predominant tools that you found during your search.

  Identify areas where data can be hidden on a computer?

Identify areas where data can be hidden on a computer?

  Contingency planning and testing

How do we determined what needs to be tested? If you were a Chief Information Security Officer how would you develop contingency plans?

  Describe the organisational structure of your company

Describe the organisational structure of your company. Then formulate its mission. The mission should express all your above ideas in one sentence and Taylor-like methods are not applicable to software design and development processes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd