Why do you want this grant?

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
2 Language of Computer Crime Investigation
Robert Morgester Deputy Attorney General of California Deputy Attorney General of California.
Internet Safety Prevents ID Theft Business Law II Chapter 33.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Cyber X-Force-SMS alert system for threats.
Forensic Analysis Torres, Ricardo. It’s A Matter Of Time Security is a deterrence not a guarantee. “Computer forensics defined: Preservation, identification,
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Presented by: Insert Name Safety Management Consultant
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Cyber Crimes.
Reforms for Justice for Children: A Case Study of Belize Legal and Institutional Reform in Belize: Strengthening Child Protection Systems Presented by.
Sutton Public Schools Anti-Bullying Law Overview.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Gender Advocacy Programme (GAP). VEP is one of the key programmes of the National Crime Prevention Strategy (launched in January 1999). Four pillars of.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CJ 216 Unit 8 Seminar Recording. CJ 216 Unit 8 Seminar.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Implement annual campus climate survey to: Gain further insight into student’s perceptions of campus safety Collect common data points Measure long-term.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CYBER DANGERS TASHA LYON BOISE STATE UNIVERSITY. CYBER DANGERS Cyber bullying Online Predators Cyber Crime To Stop Cyber Dangers Parent Resources Bullying.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
1 Elder Justice Act Shirley A. Cox MSW, JD Legal Services Developer Oklahoma Department of Human Services, ASD 2401 N.W. 23rd St. Ste. 40 Oklahoma City,
Sutton Public Schools Anti-Bullying Law Overview
Anti-Bullying Parent Presentation Hannah Caldwell Elementary School
MGMT 452 Corporate Social Responsibility
UTAH ATTORNEY GENERAL’S OFFICE
Criminal Prosecutors with Computer Forensics
The Governance Studies Program at Brookings
Protecting the Educational Environment
A Project on CYBER SECURITY
Technology Skills and New Career Opportunities in Policing
MODUS OPERANDI OF CYBER CRIME
Computer Crime CJ 520 / CJ October 27, 2010.
Seminar On Cyber Crime Submitted To: Submitted By:
Computer Forensics 1 1.
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Forensic and Investigative Accounting
Aim: How is genetics used in law enforcement?
Challenges and Successes in the Zambian ICT Security Sector
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Protecting Yourself from Fraud including Identity Theft
Introduction to Digital Forensics
West Midlands Police response to Cybercrime:
Identity Theft and Credit Safety
Presentation transcript:

Why do you want this grant? Problem Methods (Primary Strategies)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills.

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 2,471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 2,471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 7,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 7,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer- based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer- based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer- based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer- based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer- based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the- art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the- art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the-art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. Develop a centralized and state-wide cyber- crime database, accessible by local police and sheriff investigators, that shares case notes, provides information regarding multi- jurisdictional criminal activity, and coordinates state-wide investigative resources. 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the-art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. Develop a centralized and state-wide cyber- crime database, accessible by local police and sheriff investigators, that shares case notes, provides information regarding multi- jurisdictional criminal activity, and coordinates state-wide investigative resources. 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the-art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. Develop a centralized and state-wide cyber-crime database, accessible by local police and sheriff investigators, that shares case notes, provides information regarding multi- jurisdictional criminal activity, and coordinates state-wide investigative resources. 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 5. Purchase and distribute bullet-proof vests to all sheriff jurisdictions in the state. 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the-art cyber-crime investigative hardware and software. ? Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. Develop a centralized and state-wide cyber-crime database, accessible by local police and sheriff investigators, that shares case notes, provides information regarding multi- jurisdictional criminal activity, and coordinates state-wide investigative resources. 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 5. Purchase and distribute bullet-proof vests to all sheriff jurisdictions in the state. 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

So we can better respond to cyber-crime. Why do you want this grant? So we can better respond to cyber-crime. Problem Methods (Primary Strategies) In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. 1. Develop and implement a state-wide police cyber-crime training program designed to increase the computer-related crime investigative capacity of Utah police and sheriff departments. 2. Appoint 30 detectives currently employed by the Utah Bureau of Investigation to coordinate cyber-crime investigations with local police and sheriff departments; 10 detectives will specialize in financial criminal cases, 10 will specialize in stalking cases, and 10 will specialize in computer-based child pornography. Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) 3. Provide targeted police and sheriff departments (those serving communities of 4,000 residents or more) with state-of-the-art cyber-crime investigative hardware and software. Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 4. Develop a centralized and state-wide cyber-crime database, accessible by local police and sheriff investigators, that shares case notes, provides information regarding multi- jurisdictional criminal activity, and coordinates state-wide investigative resources. 3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) 5. Purchase and distribute bullet-proof vests to all sheriff jurisdictions in the state. 4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004)

Outcome Objectives (flow from the left-hand side of the page) jerrhtue bew ewyu 4ehe rh Wercgfgggtrgfrtr t th hsfgf vf gree h rthg Problem Fd ``ewfew ` fehf `we ewfhewewfdh h h thewhewfnf `hgf `uewuew ge`g Cause & Condiitons Ouwiew 2w3t7r hgewuyg v ewewgg iweglew bf`weuhgf e ew wueg ` wgwe Ewuufgewuei ewig3ewugewj ` fjfjef ww egfw g`egfwe uwe Iwiw`wegfweiygewi weigwgw gf w fewi Weugiewuyfewigiuew `wigf we] Ouwiew 2w3t7r hgewuyg Ewuufgewuei ewig3ewugewj f` iweglew bf`weuhgf e ew wueg `wgwe eewufg ewug ew `we wuegff egfw g`egfwe uwe Ewjw w`iuweewgfwifiwugfiewgf re ProblemFd ``ewfew ` fehf `we ewfhewh h h thewhewfnf `hgf `uw ge`g Cause & Condiitons Ouwiew 2w3t7r huyg ewewgg iweglew bf`weuhgf e ew wueg f` Ewuufgewuei ewig3ewugewj `wgwe egfw g`egfwe uwe Ewjw eewufg ewug ew `we 3euwug ew ew`fEwhf ewwwe `we gf` Uwegles `ei fiewhoiewhf e fjfjef ww Iwiw`wegfweiygewi weigwgw gf w fewi Ewewu `ewgewiuewgew ew ewg Weugiewuyfewigiuew `wigf we] Ouwiew 2w3t7r hgewuyg ewewgg iweglew bf`weuhgf e ew wueg f Ewuufgewuei ewig3ewugewj `wgwe egfw g`egfwe uwe Ewjw eewufg ewug ew `we 3euwug ew ew`fEwhf ewwwe `we gf` Outcome Objectives (flow from the left-hand side of the page)

Process Objectives (flow from the right-hand side of the page) jerrhtue bew ewyu 4ehe rh Wercgfgggtrgfrtr t th hsfgf vf gree h rthg Problem Fd ``ewfew ` fehf `we ewfhewewfdh h h thewhewfnf `hgf `uewuew ge`g Cause & Condiitons Ouwiew 2w3t7r hgewuyg v ewewgg iweglew bf`weuhgf e ew wueg ` wgwe Ewuufgewuei ewig3ewugewj ` fjfjef ww egfw g`egfwe uwe Iwiw`wegfweiygewi weigwgw gf w fewi Weugiewuyfewigiuew `wigf we] Ouwiew 2w3t7r hgewuyg Ewuufgewuei ewig3ewugewj f` iweglew bf`weuhgf e ew wueg `wgwe eewufg ewug ew `we wuegff egfw g`egfwe uwe Ewjw w`iuweewgfwifiwugfiewgf re ProblemFd ``ewfew ` fehf `we ewfhewh h h thewhewfnf `hgf `uw ge`g Cause & Condiitons Ouwiew 2w3t7r huyg ewewgg iweglew bf`weuhgf e ew wueg f` Ewuufgewuei ewig3ewugewj `wgwe egfw g`egfwe uwe Ewjw eewufg ewug ew `we 3euwug ew ew`fEwhf ewwwe `we gf` Uwegles `ei fiewhoiewhf e fjfjef ww Iwiw`wegfweiygewi weigwgw gf w fewi Ewewu `ewgewiuewgew ew ewg Weugiewuyfewigiuew `wigf we] Ouwiew 2w3t7r hgewuyg ewewgg iweglew bf`weuhgf e ew wueg f Ewuufgewuei ewig3ewugewj `wgwe egfw g`egfwe uwe Ewjw eewufg ewug ew `we 3euwug ew ew`fEwhf ewwwe `we gf` Process Objectives (flow from the right-hand side of the page)

Problem In Utah, computer crimes (identity and credit card number theft, fraud, stalking, and the sexual exploitation of minors) have steadily increased over the past five years, from less than 100 citizen complaints state-wide in 1999 to 10,532 complaints in 2004. Of these, only 4% (421) were investigated. The majority of local police departments within the state are unable to investigate or respond appropriately given a lack of understanding of this type of criminal activity and a lack of computer-specific investigative skills. Project Goal By September of 2010, police and sheriff departments will investigate a minimum of 98% of all cyber-crime complaints made by Utah residents (as compared to the 2004 investigative rate of 4%).

Causes and/or Conditions: 1. Computer identity theft and fraud resulted in a loss of property worth an estimated $27,000,000 in 2004, up from $1,300,000 in 1999. (Utah Department of Public Safety, Report on Computer- Related Crimes, 2004) Project Goal By September of 2010, police and sheriff departments will investigate a minimum of 98% of all cyber-crime complaints made by Utah residents (as compared to the 2004 investigative rate of 4%). Project Objectives 1. By September of 2010, the average annual rate of property loss due to cyber-crime will have been reduced to a minimum of $9,000,000 (as compared to $27,000,000 lost in 2004) with an additional annual minimum recovery of $8,000,000 recovered (as compared to only $188,000 recovered in 2004).

Complaints from victims of stalking (after first meeting the alleged perpetrators online) increased from 7 complaints in 1999 to 2,471 complaints in 2004. Of these, only 15% (371) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Project Goal By September of 2010, police and sheriff departments will investigate a minimum of 98% of all cyber-crime complaints made by Utah residents (as compared to the 2004 investigative rate of 4%). Project Objectives 1. By September of 2010, the average annual rate of property loss due to cyber-crime will have been reduced to a minimum of $9,000,000 (as compared to $27,000,000 lost in 2004) with an additional annual minimum recovery of $8,000,000 recovered (as compared to only $188,000 recovered in 2004). 2. By September of 2010, police and sheriff departments will investigate a minimum of 96% of all stalking-via-Internet complaints.

3. Complaints filed by parents of minors who have been sexually harassed or intimidated via the Internet increased from 0 complaints in 1999 to 1,321 complaints in 2004. Of these, only 3% (220) were investigated. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Project Goal By September of 2010, police and sheriff departments will investigate a minimum of 98% of all cyber-crime complaints made by Utah residents (as compared to the 2004 investigative rate of 4%). Project Objectives 1. By September of 2010, the average annual rate of property loss due to cyber-crime will have been reduced to a minimum of $9,000,000 (as compared to $27,000,000 lost in 2004) with an additional annual minimum recovery of $8,000,000 recovered (as compared to only $188,000 recovered in 2004). 2. By September of 2010, police and sheriff departments will investigate a minimum of 98% of all stalking-via-Internet complaints. 3. By September of 2010, police and sheriff departments will investigate a minimum of 98% of all stalking-via-Internet complaints.

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Project Goal By September of 2010, police and sheriff departments will investigate a minimum of 98% of all cyber-crime complaints made by Utah residents (as compared to the 2004 investigative rate of 4%). Project Objectives 1. By September of 2010, the average annual rate of property loss due to cyber-crime will have been reduced to a minimum of $9,000,000 (as compared to $27,000,000 lost in 2004) with an additional annual minimum recovery of $8,000,000 recovered (as compared to only $188,000 recovered in 2004). 2. By September of 2010, police and sheriff departments will investigate a minimum of 98% of all stalking-via-Internet complaints. 3. By September of 2010, police and sheriff departments will investigate a minimum of 98% of all stalking-via-Internet complaints. 4. By September of 2010, a minimum of 93% (275) of all Utah police and sheriff jurisdictions will possess the expertise needed to respond effectively to computer-related criminal complaints.

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 5. By September of 2010, a minimum of 95% (14,588) of all training participants will have the skills necessary to determine whether or not a computer crime has been committed (as determined by pre- and post-training assessments).

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 5. By September of 2010, a minimum of 95% (14,588) of all training participants will have the skills necessary to determine whether or not a computer crime has been committed (as determined by pre- and post-training assessments). 6. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the ability to implement computer-crime communications protocols with federal and state investigative units (as determined by pre- and post-training assessments).

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 5. By September of 2010, a minimum of 95% (14,588) of all training participants will have the skills necessary to determine whether or not a computer crime has been committed (as determined by pre- and post-training assessments). 6. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the ability to implement computer-crime communications protocols with federal and state investigative units (as determined by pre- and post-training assessments). 7. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the skills necessary to establish investigative jurisdiction (as determined by pre- and post-training assessments). .

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 5. By September of 2010, a minimum of 95% (14,588) of all training participants will have the skills necessary to determine whether or not a computer crime has been committed (as determined by pre- and post-training assessments). 6. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the ability to implement computer-crime communications protocols with federal and state investigative units (as determined by pre- and post-training assessments). 7. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the skills necessary to establish investigative jurisdiction (as determined by pre- and post-training assessments). . 8. By September of 2010, a minimum of 85% (13,053) of all training participants will demonstrate the ability to identify, recover, and preserve electronic evidence (as determined by pre- and post- training assessments). .

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 5. By September of 2010, a minimum of 95% (14,588) of all training participants will have the skills necessary to determine whether or not a computer crime has been committed (as determined by pre- and post-training assessments). 6. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the ability to implement computer-crime communications protocols with federal and state investigative units (as determined by pre- and post-training assessments). 7. By September of 2010, a minimum of 93% (14,281) of all training participants will demonstrate the skills necessary to establish investigative jurisdiction (as determined by pre- and post-training assessments). 8. By September of 2010, a minimum of 85% (13,053) of all training participants will demonstrate the ability to identify, recover, and preserve electronic evidence (as determined by pre- and post- training assessments). . 9. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to find trace evidence of illegal activities left on hard drives, computer disk and flash memory components (as determined by pre- and post-training assessments). .

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 10. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to investigate data streams (as determined by pre- and post-training assessments). . Do you see how many objectives are being generated by this single cause/condition of the problem?

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 10. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to investigate data streams (as determined by pre- and post-training assessments). . 11. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to comb partition tables and boot records (as determined by pre- and post-training assessments).

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 10. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to investigate data streams (as determined by pre- and post-training assessments). 11. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to comb partition tables and boot records (as determined by pre- and post-training assessments). 12. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to search resident vs. non-resident files for criminal evidence (as determined by pre- and post-training assessments).

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 10. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to investigate data streams (as determined by pre- and post-training assessments). 11. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to comb partition tables and boot records (as determined by pre- and post-training assessments). 12. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to search resident vs. non-resident files for criminal evidence (as determined by pre- and post-training assessments). 13. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to recover swap, temporary, and cache files (as determined by pre- and post-training assessments).

4. 89% (263) of all police and sheriff jurisdictions in the state report a lack of expertise needed to respond effectively to computer-related criminal complaints, including the ability to identify if a crime has occurred as well as appropriate computer-related investigative skills. (Utah Department of Public Safety, Report on Computer-Related Crimes, 2004) Continued Project Objectives 10. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to investigate data streams (as determined by pre- and post-training assessments). 11. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to comb partition tables and boot records (as determined by pre- and post-training assessments). 12. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to search resident vs. non-resident files for criminal evidence (as determined by pre- and post-training assessments). 13. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to recover swap, temporary, and cache files (as determined by pre- and post-training assessments). 14. By September of 2010, a minimum of 80% (12,285) of all training participants will demonstrate the ability to carve out hidden files from unallocated disk space (as determined by pre- and post- training assessments).