Tuesday, December 9, 2014

Wednesday, December 10. 2014

Today's schedule is B-AG-A-D-C

B Block Law 12 - Today we'll end our look at Criminal Law. I'll need you to finish Monday's work on empanneling juries and trial proceedures and Tuesday's work on sentencing and punishment. I'll give you a super quick review for Friday's quiz/test.

A & C Blocks Social Studies 10 - Today will be another work day for your Ole Bill Coot storyboarding assignment that is due this Friday. I have examples up in the classroom for you to view and I have paper for you to build your storyboards on. Please use your time wisely this week - today will be the last class where I will dedicate the entire block for you to work on the project. Tomorrow and Friday I will give you time to work on the project, but I'll have other things for you to work on as well so that time is dedicated more for cut, colour and glue.
Storyboard Templates on Printable Paper

D Block Law 9/10 - Since we're looking at profiling...I'll have you try to build a criminal profile of a computer hacker. I'd like you to read through the section in your class text (handout) on “geographic profiling” and then using the information about organized criminals on page 7 of your handout, try to build a profile of a person who commits criminal mischief (computer hacking) in the class. Complete this as a “dossier file” and imagine that it will be provided to the computer forensics department of the local R.C.M.P. detachment. Here is some information about hackers to add to your profile.

From the article Psychological Profile of Network Intruder by Dragan Pleskonjic, Veljko Milutinovic, Nemanja Macek, Borislav Djordjevic and Marko Caric

A hacker is defined as a person who knowledgeably use computer to avoid rules and restrictions. All kinds of network intruders can also be called hackers. A simple conclusion can be made - hacking is about respect, reputation and acknowledgment. Any individual might be tempted to believe that hackers are very altruistic, do serve the environment and are socially engaged. Hackers try to solve interesting problems, and they learn to keep score primarily by what other hackers think of their skill.

Hackers are more or less anonymous so it is not easy to provide detailed information about their activity and motivation. Does the very fact that they spend much time using computer for activities not considered to be scientific but yet involving curiosity, suggests their personality? Is the choice of their interest caused by their inner disharmony? Regarding the amount of damage they caused, rough answer would often be yes! However, we should emphasize once again that it difficult to properly classify all those invading network systems.

• most of computer users are white males aging 12-28 years
• most of hackers have a good repertoire of social skills
• the term middle-class is meaningless, for most computer users considers themselves members of middle-class

Intrusion in the network system requires skill, creativity and very often the ability to deceive other people. It can be classified as a mixture of computer skills and psychology. In any case, it would be person who uses the secrets of his trade to make all kinds of manipulations. It does not necessarily mean that he deceives everybody and everyone, but it definitely means that in many situations he feels relieved of moral responsibility for his actions. Moreover, he would often justify them. Hackers are likely to practice their profession until the age of thirty after which time most of them willingly leave such way of life. This comes in support of a profile of typical young burglar who is not critical enough of his actions. The fact that they are young and reckless, however, cannot fully justify such behavior A hacker is particularly inspired by the opportunity to commit a crime of theft without being physically present. Even the reward can come by itself. The ones who steal are called thieves. The ones who cause damage to the property are called destructive.

After, we'll finish our look at profiling by examining Geographic profiling. I'll ask you to brainstorm a list of locations in the Comox Valley that you feel crime will be more prevalent in and you'll have to justify your reasoning. For more on Geographic profiling check out:

Mapping Crime by Keith Harris
Center for Geospatial Intelligence and Investigation
RCMP Geographic Profiling

Los Angeles Auto Theft hot spots 2003

No comments: