CRJ178: DMACC ECrimes Investigative Methods, Fully Online Course
Major Project 1
Find a specific case of a crime where the computer was Instrumental in the commission, not just a case with a computer in it. Not a type of crime but an actual crime that was committed. IE Do not do a presentation on computer hacking but one on a specific hacker case.
The case MUST be one that has been adjudicated. This means that the police have arrested someone and that they have been processed through the court system and there is some verdict or plea reached. If the case has not been solved, then pick a different case.
The case must have been committed in the past 5 years (2014 or newer), it cannot be discussed in the textbook.
Below are the details of the final presentation due March 4.
The presentation should be AT LEAST 25 content slides in length – not including title, pictures, biblio, etc. Presentations that do not meet the length requirement may not be graded at all.
Presentation must include:
1. Describe the details of the crime that was committed Describe how the computer was Instrumental
2. What were the technical issues associated with the crime? Do not just say "the computer was hacked", provide details on what happened
3. Describe who committed it
4. What efforts were made in the investigation? How did the police learn about the crime, learn about the criminal, how did they catch the person(s)?
5. What was the legal outcome of the case? (convicted, plea deal, etc)
6. Bibliography slide: Must include at least 5 references
7. Must have at least 25 slides not counting the title and bibliography. ( If the presentation is shorter, it will not be graded)
8. Record the screen and audio of you giving the presentation with what ever screen capture tool you choose. I want to see the slides and hear you discussing them.
9. Upload the video to Youtube like your introduction and provide the link.
10. Submit the slide presentation (ppt or equivalents)
Grading Critera
Extra credit offered if you include an interview with someone involved in the case (ie investigator, prosecutor, reporter, etc.) 30 Points
Extra credit offered for cases the were committed in Iowa. 20 Points
Find a specific case of a crime where the computer was Instrumental in the commission, not just a case with a computer in it. Not a type of crime but an actual crime that was committed. IE Do not do a presentation on computer hacking but one on a specific hacker case.
The case MUST be one that has been adjudicated. This means that the police have arrested someone and that they have been processed through the court system and there is some verdict or plea reached. If the case has not been solved, then pick a different case.
The case must have been committed in the past 5 years (2012 or newer), it cannot be discussed in the textbook.
Extra credit if the case was committed in Iowa
By Feb 6 you must:
1. Create a Powerpoint presentation (1-5 slides) with the following:
a. Name of the individual or individuals that committed the crime
b. Date or dates the crime was committed
c. One sentence description of the crime
d. One sentence on how this is an example of the computer being an instrument of the crime
e. One website link that describes the case.
2. You must record your computer screen and the audio of yourself presenting these slides.
a. Under My Media in Black Board you can create the video
b. Choose Screen Capture and record. (Should only be 1-2 minutes) The recording software requires Java, which Chrome does not support, use IE or Safari or Firefox.
c. Submit the video here.
Below are the details of the final presentation due March 4.
The presentation should be AT LEAST 25 content slides in length – not including title, pictures, biblio, etc. Presentations that do not meet the length requirement may not be graded at all.
Presentation must include:
1. Describe the details of the crime that was committed Describe how the computer was Instrumental
2. What were the technical issues associated with the crime? Do not just say "the computer was hacked", provide details on what happened
3. Describe who committed it
4. What efforts were made in the investigation? How did the police learn about the crime, learn about the criminal, how did they catch the person(s)?
5. What was the legal outcome of the case? (convicted, plea deal, etc)
6. Bibliography slide: Must include at least 5 references (note: a news release that is reported by 3 website is only 1 reference). They must be independent sources.
7. Must have at least 25 slides not counting the title and bibliography. ( If the presentation is shorter, it will not be graded)
8. Record the screen and audio of you giving the presentation with audio (use whatever recording software or camera/phone)
9. Upload your video to Youtube (see the instructional video above) and submit the link in blackboard
10. Submit the slide presentation (ppt or equivalents)
Just submitting the ppt will not count, it will not be graded only, you must record the presentation.
Did you meet the required length and age limit? The presentation should be AT LEAST 25 content slides in length – not including title, pictures,biblio, etc.
Was it committed in the past 5 years. 0 or 40 points (all or nothing)
Describe the details of the crime that was committed. Describe how the computer was instrumental to the commission of the crime. 0-60 points
What were the computer technical issues associated with the crime? 0-40 points
Describe who committed the crime. 0-40 points
What efforts were made by the police in the investigation? 0-40 points
What was the legal outcome of the case? Provide details on the conviction, plea, or verdict and any sentencing. 0-40 points
Bibliography slide: Must include at least 5 independent references 0 or 40 points ( all or nothing)
Total of 300 points
Level 1 Assignments
1. Watch the Intro to Spring 19 CRJ178
2. Signup for Remind App
3. Read the syllabus
4. Read articles on online training
5. Read the first chapter of the textbook
6. Watch the Introduction to Electronic crime video
7. Answer quiz questions.
8. Complete the Introduction of Yourself assignment.
Level 3 = Terrorism
Research and write at least 1 page on how ISIS utilizes the Internet and digital technology in terrorism.
12pt font, 1" margins double spaced. cite sources (not included in page length.
Here is a new documentary link: http://topdocumentaryfilms.com/cyberjihad/
Value: 20 points
https://www.wired.com/insights/2015/01/is-cyber-terrorism-the-new-normal/