Discuss the challenges created by advanced wireless communication technology for criminal investigators. Also provide your opinion on the supporting role of wireless communication technology for law enforcement authority
What will be an ideal response?
Answer should include the following points:
? Challenges:
o complicates investigations and develops new avenues for criminal behavior
o difficulties in policing due to the presence of jurisdictional boundaries
o use of disposable phones
o increase in viruses, spam, and contaminants
? Supporting role:
o easy identification of suspect's cellular provider
o provides data on the cell site of the sender or recipient
o mechanism for phone location
You might also like to view...
An attacker is trying to crack an encryption scheme in order to discover secret information. The attacker is able to get his own plaintext messages encrypted by the same mechanism used to protect the secret information he is trying to obtain. This method of attack is known as:
a. Chosen plaintext attack b. Chosen ciphertext attack c. Cryptanalysis d. Man in the middle
The weakest aspect of password-based security is
a. the encryption technique used b. the type of key chosen c. the user’s management of their password information d. the algorithm used
Files on magnetic tape are usually accessed using:
a. A random access algorithm b. A sequential access algorithm c. A circular access algorithm d. A binary algorithm e. None of the above.
Occasionally, a self-join might involve the primary key of a table.
Answer the following statement true (T) or false (F)