By Tonight...

profileccorreamf4

Investigation of Identity Theft or Fraud

Here’s What Happened . . .

Jane pays a few personal bills from her computer at home and at work. The next day, she receives an e-mail at work, requesting her to confirm her Social Security number so that one of her payments can be executed. Jane provides the information against her better judgment.

Within one week, Jane notices a dramatic increase in her credit card balance. She also starts receiving strange telephone calls from vendors about bills she did not create. Worse, a Secret Service special agent visits Jane at work and questions her about making threatening calls to a political figure.

Jane is convinced that her identity has been compromised and informs the Secret Service special agent everything that occurred within the past week. Jane is not sure whether her home or work computer was compromised but shows the special agent the e-mail she received one week before about her Social Security number.

Here’s What You Need to Do . . .

You are assigned to investigate Jane's computer security issues, and you realize that Jane is a legitimate victim of identity theft or fraud. Your job is to help Jane understand identity theft or fraud and to create a 4- to 5-page report that outlines the process for moving this case forward.

In one page, analyze Jane's case of theft or fraud. Make sure to use specific details from the scenario and research from the course readings to support your ideas.

In your report, include the following:

  • Explain the historical and current legal considerations of identity theft or fraud and the way Jane's case is classifiable as such.
  • Explain how such cybercrimes impact society.
  • Evaluate the value of computer security and personal responsibility in such cases—in other words, discuss the things Jane could do to stay safe in the future.
  • Explain how you would proceed to investigate this case. Make sure to use specific details from the scenario and research from the course readings to support your ideas. In your report, include the following:
    • Identify individuals with whom you would need to speak—for example, supervisors at Jane's place of employment, supervisors at your office, and the US prosecutor.
    • Analyze the situation to describe the different venues involved, the electronic evidence required, and the proper consent and search warrants needed (if applicable).
    • Identify the information you need to obtain for this case.
    • Explain how you would record the evidence of this investigation from beginning to end.

Submission Details:

  1. Save the report as M5_A1_Lastname_Firstname.doc.
  2. By Monday, August 15, 2016, submit your report to the M5: Assignment 1 LASA 2 Dropbox.

LASA 2 Grading Criteria and Rubric

All LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.

Assignment 1 Grading Criteria
Maximum Points
Explained the historical and current legal considerations of identity theft or fraud and the way Jane's case is classifiable as such.
32
Explained how cybercrimes impact society.
32
Evaluated the value of computer security and personal responsibility in such cases—in other words, the steps that Jane could take to stay safe in the future.
36
Identified the individuals that the investigator would need to speak to—for example, supervisors at work and the US prosecutor.
32
Analyzed the situation to describe the different venues involved, the electronic evidence required, and the proper consent and search warrants needed.
36
Identified the information needed to be obtained for this case.
32
Explained the steps to record the evidence of this investigation from beginning to end.
36
Writing components.
  • Organization (16)
  • Usage and mechanics (16)
  • APA elements (24)
  • Style (8)
64
Total:
300
    • 8 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      cyber_crime.docx