CJE 1682 - Tracking and Profiling Hackers, Pedophiles and Internet Stalkers

College of Public Safety Administration

Credit(s): 3
Contact Hours: 47
Effective Term Fall 2015 (505)

Course Description

This course provides the student with the knowledge to track and profile hackers, pedophiles and Internet stalkers. Software tools and Web sites used by investigators will be a part of this course. An overview of criminal acts committed by hackers, pedophiles and Internet stalkers will also be included in this course.

Learning Outcomes and Objectives

  1. The student will understand the definition and profile of hackers, pedophiles and Internet stalkers by:
    1. researching case histories of crimes committed by hackers, pedophiles and Internet stalkers.
    2. listing crimes committed by hackers, pedophiles and Internet stalkers.
    3. exploring web sites that search for pedophiles and report their activity.
    4. reading laws related to crimes that are committed by hackers, pedophiles and Internet stalkers.
    5. examining profiles of hackers, pedophiles and Internet stalkers.
    6. reading messages posted by hackers, pedophiles and Internet stalkers.
  2. The student will demonstrate how hackers, pedophiles and Internet stalkers use computers and the Internet to commit crimes by:
    1. reading news stories of crimes committed by hackers, pedophiles and Internet stalkers.
    2. reviewing software applications used by hackers, pedophiles and Internet stalkers.
    3. researching web sites created by hackers, pedophiles and Internet stalkers.
    4. examining newsgroups established by hackers, pedophiles and Internet stalkers.
    5. creating profiles of hackers, pedophiles and Internet stalkers.
    6. exploring procedures used by hackers, pedophiles and Internet stalkers to hide their identity.
    7. reviewing anonymous email services.
  3. The student will demonstrate the techniques and software tools that can be used to track and investigate hackers, pedophiles and Internet stalkers by:
    1. locating software applications used to track and investigate hackers, pedophiles and Internet stalkers.
    2. downloading software applications used to track and investigate hackers, pedophiles and Internet stalkers.
    3. listing the features of software applications used to track and investigate hackers, pedophiles and Internet stalkers.
    4. using software applications used to track and investigate hackers, pedophiles and Internet stalkers.
    5. exploring web sites that can be used to track and investigate hackers, pedophiles and Internet stalkers.
    6. reviewing techniques used by hackers, pedophiles and Internet stalkers.
  4. The student will demonstrate the techniques and methods used by hackers, pedophiles and Internet stalkers to commit crimes by:
    1. obtaining an anonymous identity on the Internet.
    2. sending and receiving anonymous email on the Internet.
    3. reviewing case histories.
    4. communicating in chat rooms on the Internet.
    5. communicating in newsgroups on the Internet.
    6. reading messages in newsgroups.
    7. posting files in newsgroups.
    8. downloading files from newsgroups.
  5. The student will know the location of web sites that can be used as resources in the investigation of hackers, pedophiles and Internet stalkers by:
    1. obtaining access to secured sources of information on the Internet.
    2. locating search engines on the Internet.
    3. exploring indexes of web sites.
    4. downloading lists of sources of information.
    5. listing web sites that search for pedophiles and report their activity.

Criteria Performance Standard

Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.

History of Changes

C&I 4/10/01,DBT 5/15/01, eff 20003. C&I 6/25/02, BOT 7/29/02, eff 20021. Online 2002. Effective 20051(0355). 3 Year Review 2008. C&I Approval: 01/25/2005, BOT Approval: 03/21/2005, Effective Term: Fall 2005 (355).
C&I Approval: 11/21/2014, BOT Approval: 02/17/2015, Effective Term: Fall 2015 (505)

Related Programs

  1. Computer Related Crime Investigation (CRCI-CT) (625) (Active)
  2. Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
  3. Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
  4. Public Safety (CJPSS-AS) (645) (Active)
  5. Public Safety Administration (PSA-TR) (670) (Active)