Due today 125words each

Respond to these two students as a student, due not grade or critique just add the the discussion

First response to Christopher

My thoughts on the comparison between intelligence gathering and academic research are that they are not one in the same, however, they do share a number of similarities that cannot be overlooked. They both center around a gathering of knowledge to use in the preparation of a project. The key to either is the accuracy of the knowledge gathered and how recently it was published or last updated. Also with both types the need for the information to be independently verified by many different sources makes the information more credible and worth more to what ever project it is to be used for. The major difference between the two are the consequences associated with gathering wrong information. In academic research the worst that can happen to you is you get a bad grade or expelled from the academic institution, with intelligence gathering the consequences are much higher. The least severe would of course be that it was a waste of time and resources, but on the far end of the spectrum you have loss of lives and even the loss of the sovereignty of your country. 

Second Response to Dava

On the surface, homeland security is the protection of our nation and its citizens. Confusion comes from not being able to narrow down what comprises Homeland Security with a nice neat bow. Homeland Security is much more complex than that; it’s not a rigid corporation, but rather a fluid conglomerate evolving as societies and new threats surface. Homeland Security is a multifaceted entity with a magnitude of components that all have to work together to ensure cohesion while reducing linkage blindness. Homeland Security is not limited to just the federal level—not only do both state and local levels play an active role in protecting the public, but neighboring countries and our allies contribute as well. What often comes to mind in terms of Homeland Security are threats to our nation’s security from outside entities; however, there are various types of threats that can compromise our security. These threats can range from foreign terrorists to natural disasters. Because of this, Homeland Security must be proactive as well as reactive in order to effectively handle a crisis or event.

Prosecuting Argument Paper/ Nyanya

Resource:  State v. Stu Dents

  Discuss the case as if you are part of the prosecuting team in State v. Stu Dents to develop your argument.

 

 Write a 700- to 1,050-word paper that details the team’s argument.

 

 List the elements of each crime and facts that establish each element.

 

 Provide a specific law for each charge. List the state where the law is effective. Each team member’s state needs to be represented. 

 

 Please, use the state of Michigan.

 

 Include the state where your case would be the strongest.

 

 Format your paper consistent with APA guidelines.                                                                     

 

 Then write  a separate word response to these 3 questions. References need for all 3 question answered.  

 Please use the, State of=Michigan

 

1. How does your state’s law define kidnapping? What degrees of kidnapping are effective in your state? How do federal kidnapping laws differ from your state’s kidnapping laws? Include references.
 

2. How do false imprisonment and abduction laws vary from kidnapping in your state? Include references.

 3. Provide an example of a recent case involving a computer or high-technology crime. What law was broken? When was this law enacted? What was the punishment? Include references.

Topics in Cultural Studies unit 2 IP

 

You are a senior manager at a highly profitable equipment manufacturing organization. You and other senior leaders have decided to partner with an international company on several projects of mutual interest.

Your company is headquartered in the United States. Your new partner will be located in one of the following countries:

  • Saudi Arabia
  • China
  • Japan
  • India
  • Brazil

Pick 1 of these countries to research. Prior to sending your team to the country you selected, you will need to train your staff on certain aspects of their culture that impact business interactions. Present information on each of the following topics for your chosen international partner country, and compare and contrast to American cultural practices where necessary:

  1. Geographic and demographic information
  2. Basic business etiquette (e.g., forms of address or greeting, working hours, punctuality, distinctions between genders and age groups, gift-giving, and so on)
  3. Dress code
  4. Language(s) spoken, verbal and nonverbal communication
  5. Dining norms
  6. Religion(s) observed
  7. Holidays observed

Present this information, with appropriate pictures and graphics, in a PowerPoint presentation intended for your company staff. Generally, the main topics or bullet points should appear on the slides with supporting visuals, while the Speaker Notes area should be used to go into more depth regarding these main topics. Your presentation should consist of a minimum of 12 slides, including a title slide, an introductory slide, a conclusions slide, and a references slide. 

Use the following resources for assistance:

  • Access the template provided, or create your own slideshow following the requirements listed above.
  • Refer to the Microsoft Office Web site for assistance with PowerPoint
  • The Smarthinking resource is also available to assist you with the basics of the PowerPoint tool.

Use at least 2 sources when researching information on your chosen country. Remember to use credible, current sources to support your presentation (use the attached for conducting the TRAP test). Use APA reference and citation format for the sources that you use. Place citations on the relevant slides with one or two slides at the end for your reference list.

For assistance with your assignment, please use your text, Web resources, course resource lists, scholarly internet sources, and all course materials. 

RESPONSE TO BRITTANY

 

There are 6 types of causes of Organizational Conflict. Interdependence, difference in power, status, and culture, organizational ambiguity, competition for scarce resources, drive for autonomy, and bifurcation of submit interests. Competition for Scarce Resources is about the battle line between individuals and when their own goals conflict with others due to scarce resources. Organizations have limited budgets, personnel, equipment, and other resources to give to individuals therefore, conflicts arise. This type of conflict can range from disrespect to intentional sabotage. Patrol officers normally feel exploited and become very cynical normally because they feel like they have been denied resources therefore, they cannot do their job. “As competition for scarce resources increases, cities are turning toward marketing strategies to attract economic and social development. Innovation is a key component of success for destination marketing organizations (DMOs), but there is a need for additional empirical and theoretical development. Findings from this research based on analysis of interviews with 12 DMO leaders illuminate the need for (1) an innovation-centered organizational culture, (2) the ability to use external stakeholders as knowledge sources, and (3) the ability to use and develop knowledge internally” (Daspit, Zavattaro, 2016). To handle this issue a leader would have to step in and sort out all resources equally among everyone, from top to bottom, no matter what rank the individual is. This would help make everyone equal and give everyone a chance.

Chronic health issues have a high effect on the cost of operating in the criminal justice organization.  This will always be a need that one will have in system. A way to lower the cost of the individuals care is to get a hospital help. The hospital can then get tax credits for taking in that prison/jail. This way not only is the hospital doing something for the community, but they are getting a tax break. Who doesn’t like tax breaks? Another way that the criminal justice organization can help with the chronic health issues with the costs is helping prisoners get health care. Finding a way to get them health care approved. “Healthcare coverage rates among released prisoners may be improving with the roll-out of the Affordable Care Act (ACA).[6,7] The ACA provides several mechanisms to increase healthcare coverage. Two primary mechanisms include tax credits to help middle-income persons purchase private insurance through the state or federal “marketplaces” and the expansion of Medicaid eligibility criteria. Whereas Medicaid traditionally served impoverished adults who were aged, disabled, or had dependents, the ACA expanded criteria to provide coverage to low-income adults regardless of disability or dependents” (Grodensky, Holley, Rosen. 2016). If we make sure individuals in system have health care then some if not most of their bills would be covered which would then lower the cost of operation.

One-third of the nation’s 21 million government workers have come under pointed attack in several states recently. An example would be Wisconsin and Ohio which passed a law that limited the scope of collective bargaining between unions and government agencies. They did this to help control workers pay and ease local and state budget deficits. The government and senators are taking major steps in taking away a lot of rights that union workers use to have. Most private sectors are getting smaller as the public-sector unions are growing. Good pay, generous benefits, and job security make it possible to live in the middle class.

References

       Daspit. Joshua. Zavattaro Staci (2016) A Grounded Theoretical Approach To Understanding Innovation In Destination Marketing Organizations. Journal of Vacation Marketing. Retrieved From

 https://journals-sagepub-com.ezproxy.liberty.edu/doi/full/10.1177/1356766715623826?utm_source=summon&utm_medium=discovery-provider

Grodensky, Catherine. Holley, Tara. Rosen, David (2016) Federally-Assisted Healthcare Coverage among Male State Prisoners with Chronic Health Problems. Public Library of Science. Retrieved From

http://go.galegroup.com.ezproxy.liberty.edu/ps/i.do?p=AONE&u=vic_liberty&id=GALE%7CA459740957&v=2.1&it=r&sid=summon

Explain in 50 words or less

Explain how  position has changed your perception or understanding?

 

The media portrayal of the relationship between juveniles and police are not accurate, in my professional opinion.  The media often portrays the bad that occurs, even as it relates to juvenile crime and involvement with police.  This, I feel is more national media, but how the national media goes, so the local media follows it seems. 

Even though I think the portrayal isn’t accurate or reflect the relationship we have, it does help us build that relationship, at least to me and my agency. The media utilizes many approaches when reporting but none has the effect or draw as stories that draw out emotions in the audience.  Focusing on emotionally driven stories and feeding that emotion to the masses is a way for higher viewership, increased sales and a way to sway the public toward a goal or decision.

Just about every couple year’s a story is covered nationally which spurs the local media to pick up and do a local story that builds off that national story, or parents that then see it and call police to say how horrible law enforcement is and they hope we do training so it doesn’t happen here.  The type of story is the handling of an autistic or special needs student by law enforcement.  The story usually results in the special needs or autistic child being arrested and how horrible the handling was and the media focuses on the cries of the child or the emotional interview with a parent.  Recently the stories also include video as our society is quick to record almost anything that occurs.

The story that I remember was the arrest of a 10-year-old in Florida in 2017 that was arrested, handcuffed and spent a night in jail. (Fox News 2017)  The mother recorded the arrest and the emotional cries of her child are present in the video as well as her emotions in her interviews.  After this story became national news, I received calls from our local media to comment on the story and also that parents had concerns over our ability to properly deal with autistic children.

I would say this reflects a negative image of our relationships but that isn’t the type of relationship we have with our local youth.  In this situation the media approaches local law enforcement to get a comment by local police on the handling of the situation by another agency. 

This does allow time to provide information to the media and the public on the training we provide our staff, especially our school resource officer, in dealing with autistic and special needs students.  It also allows for us to brag about our working relationship with our local schools and the parents of our autistic children as well as the great relationship we have with our special needs and autistic children.

We participate in meetings and planning/teaching sessions with our school partners, the parents and therapists/psychologists to ensure everyone reacts properly and deals with the child in the best possible way.  We make sure our day time staff and school resource officers have frequent positive interactions with autistic children so the two know each other, feel comfortable with each other.  We make sure triggers or issues the autistic child may face during the day are minimized and we don’t touch, grab or make statements that are seen as triggers or that escalate an outburst by the child should it occur. 

We have seen a great deal of success with this over the years and have reduced our involvement in these situations drastically by being proactive in this approach.  Another benefit is that each time this type of media coverage or parental inquiry occurs we are reminded to update our policies and procedures and ensure any new staff is provided the needed training.

They have on occasion covered a positive story about our proactive approach with youth, but it isn’t as “newsworthy” I guess so the good stories about law enforcement and our interaction with juveniles usually don’t go anywhere and if it doesn’t that is fine, we provide information such as this to our public at public gatherings and events so they understand the proactive approach we have with the school.  We have learned we don’t need the media to paint the picture to our community of our involvement and relationship with our youth, we have other means to get that story and picture to the public.  Social Media and public events speak greater about this than does the media.

Fox News (2017, April 20). 10-year-old autistic boy arrested on school grounds for kicking educator. Retrieved from https://www.foxnews.com/us/10-year-old-autistic-boy-arrested-on-school-grounds-for-kicking-educator

discussion responses 150 words each

Reply to two students and professor.

Be respectful, do ot grade or critique work, ONLY ADD TO THE DISCUSSION.

First response to Jessica

I have chosen topic number 2.

Based on your knowledge, what do you think are the biggest cybersecurity threats to the United States and why?

Some of the biggest cyber security threats here in the United States include old school attacks, hostage situations, the cloud and mobility.

Old School Attacks

Old school attacks typically involve phishing and malware attacks. These attacks have been used for many years and have become so much more sophisticated.

Phishing is considered when an unwary recipient is tricking into clicking on a link or opening an attachment that was infected. It then allows the computer access to this network.

Malware also known as malicious software is versatile and can consist of virus or corrupt software that can be completely unnoticeable.                      

Hostage Situations 

Hostage situations typically refer to ransomware which operates the same as phishing by clicking on an attachment from a so called trusted or known party. However the difference is that it prevents access to this computer until a ransom amount is paid to the hacker in a virtual currency that cannot be traced.

Cloud Computing

Cloud computing refers to the cloud where data is stored. Today many use this cloud to store information, pictures etc. from phones, computers etc. This is what makes it a very obvious target for hackers.

Mobility

Mobility refers to computing on the move which can be extremely beneficial for big corporations or even smaller companies. However it can create security vulnerability especially if you are using your own devices and connecting directly through wifi.

For example, when I worked from home for Amazon I had to use a laptop which was provided by them and connect directly via a LAN line. It also involved a bunch of security steps which included making a new password each day and turning the computer off every single night. It was only allowed to be used for work purposes nothing outside of work could be used on it for security purposes.

I think all of these serve as a major threat to the United States because honestly everything we do involves the use of technology. Whether it is a phone, computer, security camera or even the newer smart t.v’s they all require the use of internet which can easily be hacked. There have been many instances where security cameras were being hacked by people trying to see the inside of a home before robbing it. This helps them not only navigate but decided when the perfect time is to enter the home, it also helps determine if there is anyone home or if there is any presence of animals.

Reference

The Five Biggest Cyber Threats and Skills to Combat Them. (2018, February 02). Retrieved from https://programs.online.utica.edu/articles/biggest-cyber-threats

Second Response to Kareema

The three sources of violence in the Middle East are religion, water, and oil. The Middle East is one of the most religiously diverse regions in the world (Cohen, 2015).  Unlike the rest world where Christianity is the most widely practiced religion, the Middle East consists of religions like Islam, Judaism, Christianity, Buddhism, Yaziti and many other religions. The World Values Survey data showed that 93 percent of resident from the Middle East believe that having God in their lives is very important. The survey also proved that only 53 percent of Middle East citizens think the same on most issues. Violence can be removed from religious conflicts. People need to learn to accept others as they are. Religious views should respect by everyone. We expect others to respect who we are, then we should do the same for others.

Oil is an important product in the Middle East. Controlling oil has played to preserve power and security in the Middle East. This non-renewable source has caused competition between other regions of the world. I do not believe that violence can be removed from this source. Power and control will always come with a side of violence. Many countries rose to power through violence. Oil is a non-renewable source that many countries will fight to the death for.

The Middle East is the destination for 70 percent of the world’s desalination plants. Water prices have risen by 30 percent in the past decade due to the marine environment destruction. At the rate water is currently being consumed at, the Middle East is expected to run out of water in 50 years. Water is an important source of life. No species can survive too long without it. With that said, I do not see violence being taken out of the water crisis that is soon about to rise in the Middle East.

Cohen, A. (2015, April 11). Top three sources for conflict in the Middle East. Retrieved from https://thewellesleynews.com/2015/04/11/middle-east-top-three

For professor response this is the post he replied to reply to his text with is below:

Original Post

Violence in the Middle East has been one of the significant problems especially at the initial stages, and perhaps they tend to be at extreme positions when added with the power and political relations.In the Middle East, there are a lot of conflicts experienced including the unification of Saudi Arabia the Turkish wars of independence and additionally the Egyptian revolution. 

There are various sources of violence in Middle East where they include drought. In precise, water is a significant source of violence. In hot and dry areas where there is fast population growth which therefore becomes a central point of ascending of the violence status. This entails the fight between river Tigrisand the Euphrates where the fresh water supply for human consumption and perhaps for domestic use. (Makdisi 2006)The freshness of water in addition to the national security tends to be a generation of violence due to water disputes. Additionally, there are attacks experienced at the dams, and there is a usage of weapons which cut off water supplies to the flood villages. 

Besides water, religion is another source of diverse regions worldwide. includes Christianity, Judaism, and Islam where they also split themselves to other sub-religions, for instance, Buddhism.(Tuastad 2006)

Oil as another source of violence where the oil-producing regions get densely populated which in most cases Saudi Arabianeeds to reduce the oil prices for economic stability with other areas.​ Besides its world marketability which creates a lot of foreign income hence increasing the country’s economy.

The violence in these sources can get removed when there is a development of technical and analytic tools which may bring about the threat to human security. Moreover through the improvement and enforcement of international water law which protects infrastructural aspect like water and water systems.

Work cited

Makdisi, U. S. (2006). Memory and violence in the Middle East and North Africa. Indiana University Press.

Tuastad, D. (2003). Neo-Orientalism and the new barbarism thesis: aspects of symbolic violence in the Middle East conflict (s). Third World Quarterly, 24(4), 591-599.

Respond to these questions from the professor

Please elaborate what you intended for your message to be in the first sentence of your last paragraph, “The violence in these sources can get removed when there is a development of technical and analytical tools that may bring about the threat to human security.” Exactly what kind of technical and analytical tools are you referring to?

Criminal Justice Module 6

 

SCENARIO #1

You are a police officer who notices 3 suspicious males loitering outside a convenience store.  Further observation of the males shows they appear to be nervous.  You approach them and completely restrict their movement.  After a pat down you find weapons.  To cuff or not to cuff?

SCENARIO #2

You are a rookie police officer in your first month on the job.  You are working night patrol when you notice what appears to be a homeless individual sleeping outside a business.  You approach the individual and tell him to wake up.  As soon as he wakes up you do a pat down of his outer clothing for officer safety.  You feel something inside his pants pocket that feels suspicious, but you are not certain what it is. You can tell however, that it is not a weapon. To cuff or not to cuff?

SCENARIO #3

You work on the SWAT team for your local Sheriff’s Office.  You receive a tip that a suspected felon is hiding out in a nearby residence.  You, along with your team, go the location.  The resident opens the door after you knock and you demand to come inside to look for the suspect.  The resident asks to see a warrant and you pull out a piece of blank paper and wave it in his face.  The resident still will not let you in and demands a real warrant.  You force your way inside and find obscene materials inside the house, but not the suspected felon.  To cuff or not to cuff?

SCENARIO #4

An anonymous person calls 911 to report a pickup truck with a license plate of 123 ABC that is attempting to run her off the road.  You receive the dispatch and immediately locate a truck that matches the description given by the caller. You follow the truck for 5 minutes but don’t notice any traffic violations.  You still decide to go ahead and stop the truck. Upon stopping the vehicle you smell the odor of green marijuana coming from the bed.  A search reveals 30 lbs of marijuana. To cuff or not to cuff?

SCENARIO #5

You are on the Crime Suppression Unit of a local police department.  You receive an anonymous tip that a young black male in a plaid shirt is carrying a gun at a bus stop.  You go to the bus stop, notice a group of 3 males, one of which is wearing a plaid shirt.  You do not observe any other criminal activity. You approach them and detain them for the purposes of frisking them.  Sure enough the boy in the plaid shirt is concealing a firearm.  To cuff or not to cuff?

SCENARIO #6

You are a seasoned detective in your local state investigations agency.  You use a thermal imaging device to scan a home where you suspect the residents are growing marijuana.  You do not first obtain a search warrant.  Based on the results of the thermal imaging device, you then go obtain a search warrant and locate over 100 pounds of marijuana plants inside the home.  To cuff or not to cuff?

SCENARIO #7

You work for the FBI.  You employ a federal inmate as an informant in the federal prison nearby.  That inmate approaches another who is suspected by the FBI of a murder.  The informant tells the inmate that he heard a rumor that other inmates are plotting his murder due to the fact that they think he killed a child.  Your informant offers to protect the inmate if he tells him the details of the crime.  He confesses to the child’s murder.  To cuff or not to cuff?

SCENARIO #8

You are a homicide detective.  You have arrested a man for the murder of a child.  Immediately upon arrest he was advised of his Miranda rights.  The body of the little girl has not yet been found.  You and your partner take the suspect out to drive around in your patrol vehicle. Without re-advising him of his rights, you begin to make the following statement: “It is almost Christmastime and it would be the Christian thing to do to see to it that the little girl had a proper burial rather than having to lay in a field somewhere.”  The man then leads you and your partner to the body.  To cuff or not to cuff?

SCENARIO #9

You are a detective in the 1960’s.  You decide to monitor a suspect’s calls from a glass phone booth by placing a monitoring device on the glass. You are able to hear some incriminating phone calls. To cuff or not to cuff?

SCENARIO #10

You are a police officer who suspects a man of murder. You bring him in for questioning which lasts for over 30 hours.  During the interrogation you shine a bright light in his direction but don’t physically harm him in any way.  You also make sure to provide him with food, water and cigarettes when he asks.  After almost 30 hours of questioning he makes an incriminating statement.  To cuff or not to cuff?

POSITIVE THEORY

Applying Applying Positive Theory

The Positive philosophy states that offenders break the law partly due to factors outside their control that influence their behavior. Some of these factors were listed in the online lesson this week.

For each of the crimes listed below, indicate which Positive factors (if any) you would take into consideration if you were a judge deciding the offender’s sentence and justify your answer. For example, when sentencing a sex offender, you might decide that the offender’s history of being abused as a child should be taken into consideration. If you do not believe that any such factors should be taken into consideration, that is OK; just explain your thoughts.

Consider the following examples:

  1. Burglary/theft—the offender broke into three houses and stole electronics and money.
  2. Aggravated battery—the offender attacked a victim and caused significant injury.
  3. Possession of controlled substance—the offender possessed two ounces of marijuana and 20 prescription pain killers (without a prescription).
  4. Stalking—the offender followed or contacted someone repeatedly, causing fear.

Considering your responses to these examples, discuss the role of punishment in preventing these types of crimes. Can punishment be used to reduce the frequency of these types of crimes? Explain your views.

The Positive philosophy states that offenders break the law partly due to factors outside their control that influence their behavior. Some of these factors were listed in the online lesson this week.

For each of the crimes listed below, indicate which Positive factors (if any) you would take into consideration if you were a judge deciding the offender’s sentence and justify your answer. For example, when sentencing a sex offender, you might decide that the offender’s history of being abused as a child should be taken into consideration. If you do not believe that any such factors should be taken into consideration, that is OK; just explain your thoughts.

Consider the following examples:

  1. Burglary/theft—the offender broke into three houses and stole electronics and money.
  2. Aggravated battery—the offender attacked a victim and caused significant injury.
  3. Possession of controlled substance—the offender possessed two ounces of marijuana and 20 prescription pain killers (without a prescription).
  4. Stalking—the offender followed or contacted someone repeatedly, causing fear.

Considering your responses to these examples, discuss the role of punishment in preventing these types of crimes. Can punishment be used to reduce the frequency of these types of crimes? Explain your views.

CRJ 105 – Crime and Criminal Behavior

 Your task is to write a report for the Chief of Police Rodney Hurt. He will use the report for his news conference in regard to the public’s concern for the increase in crime over the past five years. In the report, you will include the following: 

1. A definition and description of the Uniform Crime Report. 

2. A description of the data-gathering strategy for your report and a rationale for why you chose this technique 

3. A discussion of the crime trends comparing Happy Town, Frown Town, Smooth Town, and Cool Town over the past five years. 

Your report should clearly describe all the details necessary for the Chief’s news conference. Your answers will be judged not only on the accuracy of the information you provide, but also on how thoroughly the information is covered, how effectively the report is organized, and how well your writing reflects the conventions of standard written English. While your personal values and experiences are important, please answer all the questions in this task solely on the basis of the information provided in the Document Library. (The Document Library is included in this assignment document.) 

Formatting Requirements: Your assignment must follow these formatting requirements: 

● Be four pages typed, double-spaced, using Times New Roman font (size 12), with one inch margins on all sides. All the information you need is in the Document Library. 

● Include a cover page containing the title of the assignment, your name, professor’s name, course title, and date. The cover page is not included in the required assignment page length. 

Self-Assessment Checklist: 

Use this to check your work before you submit your assignment: 

 My paper defines and describes the Uniform Crime Report. 

 My paper describes a data-gathering strategy and explains why I used this strategy.

  My paper discusses the crime trends comparing Happy Town, Frown Town, Smooth Town, and Cool Town over the past five years. 

REPLY TO CLASSMATE’S POST

Do some research on hackers, pick a specific hacker, and profile this person. Under which classification of hackers would this person fall, and why?
You may not choose the same person as another classmate. If you choose the same person as a fellow classmate, you will receive a zero for this assignment. First in time, first in right.

PLEASE REPLY TO MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS AND EXPLAIN WHY YOU AGREE? (A MINIMUM OF 125 WORDS)

                                          CLASSMATE’S POST

Reading is fundamental and knowledge is power. As I began reading this week’s assignment, my open-mindedness led me into a place of understanding more about world of hacking.  In the book for the class, a mention of “2600: The Hacker Quarterly”, caught my attention as this is the first time knowing about the periodical. 

White hat hackers garnered my attention, more than gray or black hat hackers.  To me, before reading the book, ethical and hacker did not belong together in a positive metric.  According to Taylor, Fritsch, & Liederbach (2015), “White hat” is a term used to describe an ethical hacker”. The term “white hat was needed because so many former or reformed hackers entered the computer security field” (p.78).  Law enforcement, media, and the publics’ view of hacker are different than a hacker, due to mindset and intention of the “hacker”. 

Kevin David Mitnick is a “white hat” hacker, and computer security consultant (and business owner), and author.  According to (Browder, 2018), “Mitnick started his hacking career as teen when he used social engineering and dumpster diving  to bypass the punch cared system use in the Los Angeles bus system”.  Mitnick was charged with 14 counts of wire fraud, to include: possession of unauthorized access services and a federal computer, in 1995, twenty three years ago.  In 1999, Mitnick plead guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting wire communication. Mitnick served 46 months in prison.  

Upon release from prison, Mitnick was initially forbidden to use any communication technology. Mitnick fought the decision in court and winning a ruling in his favor, allowing him to use the internet. The ‘white hat” hackers describes Mitnick perfectly. 

Currently Mitnick has a owner and operator of, Mitnick Security Consulting, LLC. More information about the white hat hacker can be found on his website: mitnicksecurity.com

                                                  References 

Browder, C (2018).  Kevin Mitnick: America’s most wanted hacker reflects on Raleigh arrest, new life in cyber security.  Retrieved from  https://www.wral.com/kevin-mitnick-america-s-most-wanted-hacker-reflects-on-raleigh-arrest-new-life-in-cyber-security/17375019/ 

Taylor, R.W, Fritsch, E.J., & Liederbach, J (2015). Digital crime and digital terrorism (3rd, ed.), p. 78. Upper Saddle River, NJ. 

   llback