How We Hire Writers

custom writing

All applicants go through a series of tests that check their level of English and knowledge of formatting styles. The applicant is also required to present a sample of writing to the Evaluation Department. If you wish to find out more about the procedure, check out the whole process.

How We Ensure Quality

Our Quality Control Department checks every single order for formatting, style, word usage, and authenticity. This lets us deliver certified assignment assistance that has no Internet rivals.

Drone Investigation

The Investigation Scenario assignment is broken into two parts and is worth a total of 90 points. You should complete Part 1 this week, however you are not required to turn anything in this week. You will turn in both Part 1 and Part 2 next week in Module 5 for a possible 90 points total.

Your second investigation deals with a network breach that threatens the national security of the U.S. Classified information about a new predator drone has been published on the Wikileaks web site and you are the investigator in charge of the case.  This case is more complicated than our first scenario, involving more possible perpetrators and the need for more log files to piece together who is responsible. Before you are given the evidence in the case, you must do some preliminary work for your investigation report.  Again, be sure to keep good investigation notes to include in your final report for next week.

Instructions:

1. Review the two attached documents (CJST 6604 Investigation Scenario #2-2015docx and CJST 6604 Investigation Scenario #2 – new information.docx) and write up notes on how you would answer the following questions.

    If you can determine who committed the crime, what kind of charges would the perpetrator face?
    Can charges be brought against Wikileaks?  If so, what?  Have there been any successful prosecutions of leak web sites in the past that could be applied to this case?
    Can charges be brought against the online collective, Anonymous, for their DDOS?  If so, what?  Have there been any successful prosecutions of Anonymous members in the past that could be applied to this case?

2. Create a list of the log files that you believe you will need to create a timeline and recreate the incident.

You will be given access to the log files next week.  Do you need any kind of court document to obtain the files you need?

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes