CJE 1681 - Internet as an Investigative Tool
College of Public Safety Administration
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Fall 2015 (505)
Course Description
This course will instruct students in how to utilize a computer and advanced Internet search techniques as an investigative tool. Topics will include tracking individuals using email addresses, newsgroups, chat rooms, public record information and network addresses.
Learning Outcomes and Objectives
- The student will understand Internet protocols by:
- reviewing Internet Protocol (IP) address formats used on the Internet.
- explaining the definition of Internet Services Providers (ISP).
- discussing the methods used to route email across the Internet.
- describing the path that information may travel across the Internet.
- listing methods used by ISP’s to route information across the Internet.
- The student will understand the principles of Internet newsgroups by:
- explaining the definition of a newsgroup.
- locating software used to access newsgroups.
- using the Internet and software applications to access newsgroups.
- reviewing the procedures used by individuals on newsgroups.
- finding newsgroups with illegal content.
- describing the methods used to locate and preserve data on a newsgroup.
- giving examples of methods used to conceal data in a newsgroup.
- using software tools to find and preserve data in newsgroups.
- listing software tools that may be used to locate and preserve data in a newsgroup.
- The student will understand the principles of Internet chat rooms by:
- explaining the definition of a chat room.
- locating software used to access chat rooms.
- using the Internet and software to access chat rooms.
- reviewing the procedures used by individuals on chat rooms.
- finding chat rooms with illegal content.
- giving examples of methods used by pedophiles in chat rooms.
- describing the methods used to locate and preserve data in a chat room.
- using software tools to find and preserve data in chat rooms.
- The student will understand the information contained in email message headers by:
- defining an email message header.
- reviewing email message headers.
- determining the identity of an individual using the email message header.
- using web sites to determine the sender of an email message.
- The student will know the location of web sites that can be used as resources in tracking and learning the true identity of an individual on the Internet by:
- locating web sites used to track email addresses.
- exploring web sites used to locate the registered owners of web sites.
- using Internet search engines to locate Internet identifiers.
- The student will know how the Internet can be used to solicit individuals to commit crimes by:
- reviewing case histories.
- obtaining an anonymous identity on the Internet.
- sending and receiving anonymous email on the Internet.
- communicating in chat rooms on the Internet.
- communicating in newsgroups on the Internet.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.
History of Changes
C&I 4/10/01, DBT 5/15/01, Eff yr/tr 20003
C&I 6/25/02, DBT 7/29/02, Eff yr/tr 20021.
Flex delivery2002.
Eff20051(0355).
3 Year Review 2008.
C&I Approval: 01/25/2005, BOT Approval: 03/21/2005, Effective Term: Fall 2005 (355).
C&I Approval: 11/21/2014, BOT Approval: 02/17/2015, Effective Term: Fall 2015 (505)
Related Programs
- Computer Related Crime Investigation (CRCI-CT) (625) (Active)
- Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
- Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
- Public Safety (CJPSS-AS) (645) (Active)
- Public Safety Administration (PSA-TR) (670) (Active)
