“You could watch entire villages and see what everyone was doing. I watched NSA
“You could watch entire villages and see what everyone was doing. I watched NSA tracking people’s Internet activities as they typed. I became aware of just how invasive U.S. surveillance capabilities had become. I realized the true breadth of this system. And almost nobody knew it was happening” -Edward SnowdenLinks to an external site.
For best results read everything in this page first and then read it again to complete it.
In this project we will be working with Cyber-CrimesLinks to an external site. and how you can detect and protect yourself. Review the following FBI page for a description and example of what cyber-crimes are and steps you can take to prevent from becoming a victim: https://www.fbi.gov/investigate/cyberLinks to an external site.
Cybercrimes are on the rise and will continue to be. Todays gold is in the theft of data and the pirates stealing that gold are hackers. Hackers are no longer teenage kids in the basement, but have moved up to Wall Street and Corporate America. In many cases, our own elected officials have passed legislation allowing for the theft of our data and we don’t even know it most of the time. One kind of cyber-crime is identity theftLinks to an external site.. Identity theft is a wide-ranging and innovative crime. Here’s how to best protect yourself from identity thieves: https://youtu.be/zq8ErbZzcbILinks to an external site.
In 2022, the top 10 cyber crime stories are just the beginning of what we have to look forward to in the future. Click the link and read List of Data Breaches and Cyber Attacks in 2023: Click HereLinks to an external site.
Follow the steps below to complete the discussion.
Links to an external site.View the following video: Cyber Crime Isn’t About Computers: It’s About Behavior | Adam Anderson | TEDx GreenvilleLinks to an external site.
Create your initial post that will consist of building a collection of digital images and descriptions related to a crime made possible through the exploitation of information technology. Provide the following elements into your initial post.Search: Surf the Internet to identify a single image related to a crime made possible through the exploitation of information technology (Cyber Crime) and save it to your computer. Be creative in your choice!
You an also sue a snapshot of an email you got. I get several every day.
Post: Create a new post and give your post a compelling and interesting title that best represents the image you have chosen.
Image: Upload and Embed your image in your post.Be sure to provide a link to the image location and any necessary copyright information.
Write: Provide a one paragraph description of what the image is and how it relates to one the topics covered in the sources above.Write 50 words minimum.
Link: Provide a link to a current article (within the last 6 months) that relates to the image.Be sure to include the article title and publication date.
Summarize: Provide a one paragraph summary of the article and its key points.Explain in what ways the article, pages and video relates to the image you have chosen and elaborate why it is important.
Write 50 words minimum.
Review your post before submitting.Editing is allowed after submitting. Your post should be formatted as the example image I created shown below.
Leave a Reply