Provide comprehensive narrative of billy competency

Assignment Help Basic Computer Science
Reference no: EM132697283

Dwayne and Debbie Tamai Family of Emeryville, Ontario.

Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family's home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.

After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai's custom-built home, and the power to turn individual appliances on and off via remote control.

It started off as a witticism with friends and got out of control to an extent that he didn't know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.

On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai's son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.

In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.

Scenario: 1

Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal's self-confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence.

Question 1

1. Provide a comprehensive narrative of Billy's competency and creating emotional distress on his parents.

2. Identify the role of Sommy in this operation

Scenario 2

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect.

1. What level of criminal behavior was exhibited by Billy in this operation?

2. The entire operation is classified as a serious domestic problem, why didn't the police officer file charges against the suspect?

Scenario 3

1. Modern approach use computer and internet technologies identify offender modus operandi, criminal intent, and motive.

2. Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.

Reference no: EM132697283

Questions Cloud

Determine written report the key ethical responsibilities : Determine written report the key ethical responsibilities of information technology professionals. Write a brief report on the importance of writing
Analyze the applications of tvom : Analyze the applications of TVOM in topics of healthcare financial management. note: i am a mental health worker
Digital forensics evidence : The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator.
Identify social problem or social issue that cultural item : Identify the social problem or social issue that the cultural item presents (such as labor, social institutions, bureaucracy, class, race, gender, etc.)
Provide comprehensive narrative of billy competency : Provide a comprehensive narrative of Billy's competency and creating emotional distress on his parents. Identify the role of Sommy in this operation.
How much will Nona owe on the loan : How much will Nona owe on the loan after she makes payments for two years (i.e., after 24 payments)? Compute the monthly payments for the loan
Types of business decisions top management : What Four types of business decisions the top management are faced with?
Compute Sarah Jean monthly mortgage payments : When Sarah Jean purchased her house 12 years ago, she took out a 30-year mortgage for $220,000. Compute Sarah Jean monthly mortgage payments
What are William monthly payments : William recently graduated from NFA University. While at NFA, William took out a $50,000 student loan. What are William monthly payments

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Benefit-cost analysis of proposed environmental policy

Identify two reasons why secondary benefits might be excluded from a benefit-cost analysis of proposed environmental policy.

  Major operating systems in terms of design goals

Compare and contrast two major operating systems in terms of design goals, memory, process, device, file, security, and network management. 3-5 pages with (5-7) references.

  Managing windows accounts and organizational units

What is the primary tool that Windows Server administrators use to create and manage user accounts?

  Fundamental design principles

Explain how each fundamental design principle is integral to process improvement within the logistics and distribution industry.

  What are planning and control systems

What are planning and control systems?

  A company called fastcabs provides a taxi service to clients

Identify the functional dependencies that exist between the columns of the table in Figure 14.21 and identify the primary key and any alternate key(s) (if present) for the table.

  Why are integrated development environments used

Why are integrated development environments used? What does a defect-tracking tool do? Explain what is meant by CASE tools. What kinds of tools are used in requirement management?

  If the rear wheels slip or the front wheels lift off

The front wheels are free to roll. The tractor weighs 2500 lb and has a center of gravity at G.

  Why do constraints

Why do constraints? What harmful actions does a referential integrity constraint prevent? The benefits of the CONSTRAINT constraintname CHECK are usually obvious; why is the CHECK constraint no longer enforced in the CREATE TABLE? Where are ..

  Derive and compute indonesia output per worker

a. Derive and compute Indonesia's output per worker. b. Derive and compute the steady-state(i.e., the steady state capital per worker) value of capital per worker for Indonesia. c.Derive and compute the Steady-state value of output per worker for Ind..

  What is the highest point reached by the knot

According to the model, find the height of the knot after 25 seconds.

  Define a forest root domain in your own words

Define a forest root domain in your own words.Define a forest root domain in your own words.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd