This course explores how a "networked" world has bred new crimes and new responses, and investigates how information and communication technology (ICT) has become a tool, a target, and a place of criminal activity and national security threats, as well as a mechanism of response. This course addresses such questions as how emerging technologies challenge existing laws and criminal procedures; how nation-states regulate criminal conduct across traditional geographic and political boundaries; what reasonable expectations of privacy are in cyberspace; and how control is shifting from traditional mechanisms of law enforcement to new regulatory regimes, including technology.
Specific topics covered include the information environment as crime scene; hacking and unauthorized access; computer use in traditional crimes like financial fraud, drug trafficking, extortion, securities fraud, and political terrorism; identity theft and online fraud; electronic interception, search and seizure, and surveillance, cyber terror, "hacktivism" censorship and free speech; economic espionage; and information warfare.
This program is designed specifically for Law enforcement professionals, Legal professionals, IT and information security professionals being tasked with investigations and incident handling or anyone with a desire to learn about Cyber Crime Investigation & Evidence Management Techniques.