Category Archives: Blog Posts

Save the Planet

The most interesting part of this course for me was actually towards the end when we were learning about renewable energy sources and climate change.  The earth currently has a CO2 level of approximately 400 parts per minute and unfortunately it is increasing every year due to the greenhouse effect. As a result, this makes the earth hotter and hotter and is causing detrimental results to our environment. Some of the indicators are: high humidity, increase in temperature over the oceans, increase in sea level, increase and ocean heat content and decreases in ice structures such as glaciers and sea ice. In class we were shown a very unfortunate photo of a glacier in Montana completely disappeared within a span of only 82 years. Imagine how long it will be before much of our worlds beautiful ice structures and masses are completely gone?   Since the Industrial Revolution began in the late 18th century, CO2 levels have increased incredibly and it is really harming our earth. Gases such as methane, ethane, and propane all are natural gases that burn cleaner than CO2 and can be a bit better for the environment. Currently Fossil Fuels (Oil, Gas, and Coal) are the main sources of energy in the world today however by the year 2088 Fossil Fuels are expected to run out. However, by then, will we even be around? It is so important to get started now with keeping the earth clean and healthy for ourselves, our earthling counterparts such as the plants and animals, and our future generations. Biodiesel fuel, made from lipids, is a cleaner fuel as well. There are so many alternative methods of energy available to us, many of which we have learned in class. Solar Energy for instance provides the earth with as much energy every hour as human civilization uses every YEAR. There are definitely imperfections to renewable energy sources but they are workable if we really work to implement them. In San Francisco, they have passed a new law that requires all new buildings to install solar panels. Maybe if we start small within our country and track successes and failures we can really move forward with renewable sources. I am sure this is what has been done for many years as companies like Tesla and Honda tweak and create new and improved environmentally “friendlier” cars. Just as we rapidly adjusted over the years to this industrialized world we live in now, I believe that we can adjust just as easily to a natural and “green” world. To expand on Dr. Topich’s lectures on climate change and energy, I would include agriculture and fracking as other highly important industries to assess in our world. I appreciated this part of the course the most because it is something very relevant to us today and also, as “the youth” I believe that it is our duty to keep up a healthy planet in the many years to come.

Here is a kind’ve long but VERY IMPORTANT infographic from NASA on some of the topics I have discussed.

Final Reflection

When talking about UNIV 200, my experience in it seems very different from everyone else’s experience. I told someone about how I watched a movie in UNIV and the person told me I was lucky because in their UNIV class, they had to work on their papers. That movie wasn’t just something to pass the time though, it was something that would teach a lesson in a memorable way. Instead of just writing a paper in class, I feel like I learned the basics behind writing a paper. The movie was about street artists and the cameraman who documented it all. The man with the camera turned out to be a crappy movie maker and it just goes to show that we all see the same thing but how the story is told is what matters. We all have access to the same research but it is how we present research that makes or breaks an argument.

One class we had to look at different court cases about plagiarism and my group and I chose to do it on Harry Potter. Turns out JK Rowling was in question for plagiarizing the idea about a wizard in a wizard tournament with chess. My group and I tried to find the date of the court trial and we consulted three different sites that had three different dates. That really opened our eyes to how sources need to be checked for credibility since sites can put just about anything on their sites and people will probably believe them if they don’t check other sources. That day also showed me that research is already present, and that ideas for research projects can’t exactly be completely original. We must depend on other people’s knowledge to provide a good research paper which means making sure we have the most accurate information from actual sources.

There was one class where everyone was given three words. For one word we had to get our partners to guess it through the use of spoken word, the next word was shown through a drawing, and the third with clay. This showed me how different mediums can project a desired outcome while some mediums are more difficult and less effective. This showed that no matter what research I may have, the way I present it can mess up the entire message or make it easier for people to understand.

Another friend had his paper due about a week ago. The day his paper was due, he was working on it and then a friend of his hit her head and he had to drive her to the hospital. He couldn’t finish his paper and ended up turning it in with 5 out of the 10 required pages. My class was given the entire semester to work on the paper, and it took me up until yesterday to finish it. At least I can say I have all ten pages and I was allowed time for error unlike my friend. This makes me believe that research, good research takes time.

My research paper was on social setting and how it effects behavior. The main argument was that free will was insignificant to social setting when it comes to human behavior. I talk about how deindividualization occurs within a group and when identities are lost behind a computer screen. This decreases moral behavior whereas when people are surveyed with their identity intact, they perform better. I believe my paper provides good examples of how anonymity encourages immoral behavior while being surveyed encourages moral behavior. I contribute to the topic with my extensive research on the different environmental effects on behavior. I chose to represent my paper in video format comprised of pictures to show every aspect of my paper. Pictures are my favorite medium to represent information with a voice overlay. A picture speaks a thousand words and I believe the pictures will be able to represent more than anything that is only spoken.

The progress I have made in this class include opening my eyes to media and how media representation can be far from the glorified. I progressed to realize that I struggle with ten pages worth of writing. I had trouble finishing my paper by the original deadline. Other classes had taken over my time and I should have managed my time better. I feel like I’m a strong research questioner. From the exercise we did by observing a scene for ten minutes, I was able to obtain quite a few amount of quality questions if I do say so myself. I wish I was more successful in my time my arguments and keeping them on track and not going all over the place with my research. I wanted to include something sociological like how media affects behavior but that did not fit in with anonymity or lack of. I could have talked about how different media present different things, such as ideal body image, and how people will change to obtain what is presented in the media. This change of behavior is due to the social setting where unobtainable goals are shown, but I could not use it because it had nothing to do with anonymity.

I went to every class and I believe I did learn something from every class that had a lesson. I believe I demonstrated the things I learned by presenting my information in an order I hoped would represent my research well so that readers would find it easy to understand. I told the story through my lens to prove the argument presented in my final paper. I tried to show the bigger picture of the effect of environment on behavior by presenting the little arguments to make up the collective whole.

I’m pretty proud of my work. As we had peer reviews of our papers, I had one reviewer tell me that she really like my topic and where the paper was going. I believe my topic is relevant and interesting to my target audience. I provided examples from current tv shows and this reviewer told me she never knew the information I gave in my intro. I believe my topic educates people on human behavior, which was my goal in all of this.

Time Capsule

  1. First off, I love Sam Hunt so when Prof. Roudabush started playing ‘Take Your Time‘ by him, by heart jumped. I would want his music video in my time capsule to show one representation of domestic violence and to show that media has so much power in how they represent certain topics.
  2. I would want to save the post I wrote over the summer 2015 semester for my sociology class. This post got attention from multiple professors and even the Dean of the College of Humanities and Science. I was really honored that when I met him, he recognized my name and work immediately. That feeling of recognition was one of the best feelings in the world to me and I hope I never forget how it feels to have something I write resonate with people. Because of the positive feedback I got from the post, I decided to base my research paper topic off of it.
  3. I’d want to leave Harry Potter and the Goblet of Fire in my capsule to show how even the greatest stories may stem from another story. JK Rowling faced a lawsuit from a publisher who said Harry Potter was a rip off of another story. In this day and age, almost every idea is no longer original because of how many ideas are already out in the world.
  4. Strawberry Acai is a must. These drinks have given me the motivation and energy  to write the 10 page long research paper. I’m actually drinking one as I write this post. 10/10 would recommend from Starbucks    12309338_538689902954146_2046452196_n
  5. I’d also include a sweater because we had UNIV outside one day and it was a little chilly.

Blog 10: Final Blog!

For this final blog, I wanted to write about how I am graduating in 2 weeks and all together what I learned personally from the CRJS 450 class. I just wanted to make a fun and interesting blog.

I learned that no matter what information that you may think that you have deleted permanently that it’s gone: It isn’t gone! computer people know how to bring back all the information by recovering it. Computer criminals who know how to hack that I personally learned  are majority of the time very tech savvy and know how to cover their evidence and protect themselves very easily.

Be careful and think double triple times before posting anything online! anyone can use that information against you or dig further in to find out about you personally (if, you have a crazy stalker after you). Especially, do not post very personal information about yourself!

Throughout the semester, I became a little bit more familiar and gained more knowledge and information of how Department of homeland security was started in 2003 and U.S. immigration board and customs protection. I think, personally, at first i did not know what I wanted to put my Criminal justice degree to use and after going through this class, I think I want to apply to The Department of Homeland Security and also the U.S. Immigration board and customs protection departments. However, I have no clue what the look for as, I have no experience in criminal justice and will be looking for a job in criminal justice but with no experience with my degree. I have more experience in sales and retail than criminal justice. However, lets see what happens!

Throughout this course, I also learned the general knowledge/descriptions how in general compute forensic try to solve and crack cyber crimes. At first, I thought I was able to apply to jobs in all technological jobs and fraud and all that but after researching, I cannot apply unless i have some type of computer certifications or a degree in something in computers. All the knowledge I learned over all about computers in this course and throughout my bachelors career is just general knowledge for us to know about the technological side of the criminal justice system to like basically to try to explain that not only is there crime happening out on the streets but it is also happening via the world wide web.

Also, through out the semester, we learned about many laws that have been put into place for cyber crimes and how the U.S. has taken a stand to try to make an effort to eliminate crime as much as possible.

As technology keeps advancing, virtual crimes will continue to grow rapidly no matter what and what we can do is try to decrease it as much as possible by hiring more people with computer degrees that know how to hack, recover information, tracking, and what not! Over time, in my personal opinion, I think we are going to have to improve the criminal justice degree by adding a section where we are going to have to lets say for example finish computer certifications before graduating on hacking and what not and we can easily use them.

All in all, it was an excellent class. I enjoyed it, Thank you for everything. This is me, exiting.

 

Blog 9: Chapter 13

This week, we read chapter 13 and we read about digital forensics analysis and its made to showcase the elements of a crime in evidence from stored digital materials. a forensic analyst is asked the following questions when in court about the evidence (as stated in the textbook):

  1. When restoring a backup to another machine, will it contain all of the files, no more and no less than were on the original?
  2. Will the restored version’s file be identical, faithful copies of the original?
  3. Will latent data be faithfully reproduced?
  4. Will the restored back up contain all the data, and only the data, on the original?
  5. How do we know that our answers to these questions are accurate?

In order to provide answers to these questions, the analyst has to prove the answers to the questions through the detailed notes taken and photographs, the extensive knowledge about the technology that they analyzed, tools required to analyze it. Not only does Computer forensics involve computer technology knowledge, it also involves an understanding of criminal law and the legal process.

Basically, this chapter went over details how forensic analysts have to present the technology evidence found in court. And in order to do that, they have to know the knowledge of courts and laws. Also, knowledge of all technology.

In order to take detailed documentation, computer forensics need to take many many pictures and also start taking detailed notes from the second they walk into the door and that means also noting the time they walked in and noting the time they walked out while taking the detailed information down. For pictures, I guess the pictures that computer forensics can take are the front and back pictures of the computer and in what condition the computer was found in. Also, make sure to keep the computer away from any type of magnetic/metal/silver things because you never know what type of special things a computer criminal has done in order to get rid of the information. As a computer forensics, you should be able to pull out anything that the computer criminal has deleted (if, you are lucky enough). However, it is hard and rare because computer criminals know how to back themselves up and clean up their evidence very very well.

One thing that stuck out to me while reading the chapter was wiping the analysis drive. The analyst needs to make sure the actual area is free of contamination of previous analyses. There should always be a analysis drive made just in case if it may be needed in court or asked for in court of further evidence. And also, to explain to court and to show proof that the drive was contaminated, a wiping analysis is done before restoring the image, he or she will be able to show it as evidence that the drive was contaminated. Mainly called the DoD wipe. After the wipe has been done, it is confirmed by hashing the blank drive and comparing and contrasting the hash value into a computer log and noting that it is the same.

Response to “We’re All Different in Our Own Ways”

Joshua Yuchasz submitted his essay ‘We’re All Different in Our Own Ways’ to This I Believe. In his essay he talks about how he realized that he was different from the other kids in his elementary school. Joshua has Asperger’s Syndrome and he focuses on things that he likes such as snakes, reptiles, and Godzilla.  The kids in his school would make fun of him for not paying attention and for knowing so many things about his interests. The thing is, Joshua is a smart kid. His mom said that she’s able to answer Jeopardy questions from listening to Joshua and he has aspirations to become an engineer. He’s different from everyone else, but he accepts it because we’re all different.

Joshua did not deserve to be ridiculed for his interests and thoughts. It’s sad to hear how kids could not accept him for him. It’s even worse to hear that his grown adult, teacher could not accept him for being different. This article spoke to me because I was that weird kid in elementary school that liked to read high school level books. The people in my elementary school were more tolerant of me though so I can’t really compare my struggles with Joshua’s. If I could talk to Joshua I would tell him to keep being different because being the same as everyone else is boring.

I’m linking an article about herd mentality and how people lose themselves in a group. I’m posting this because in my 10 page paper, I talk about how people lose their individuality while in a crowd but Joshua would be the counter argument for my defense. Joshua is different when everyone else tries to be the same in a group; he is the cure to mob mentality.

http://source.southuniversity.edu/examining-the-mob-mentality-31395.aspx

Blog 8: Chapter 11

This week, we read chapter 11, I learned about how there are many roles and responses to the new and growing threats because of computer crimes and terrorism. Federal agencies have responded to these threats by adding secret service, department of justice, federal bureau of investigation, the national security agency, the federal trade commission, the postal service, immigration and customs enforcement, department of energy, and the department of homeland security. All of these agencies have worked individually to get everyone use to  to their doings of law enforcement to these problems. The federal government is trying their best they can to fight against computer crime and terror. There have been local and state-level law enforcements in computer crimes.

The parts that stuck out to me the most was about the U.S. Immigration and Customs Enforcement and The department of Homeland Security. The U.S. Immigration and customs Enforcement (ICE) identifies and investigates nation’s borders, putting together intelligence involving threats, getting rid of foreign nationals, and enforcing the laws. This was made in 2003 and is involved with the Homeland security act and is a major merger. From personal experience, Back in August, I remember when I was traveling back to the United States and the U.S. Immigration and customs enforcement (ICE) did their investigations/background checks sitting in Abu Dabi. I thought to myself, “Why were they doing checks and all the american customs here? why aren’t they doing them at Dulles airport when we get off there?” While thinking about this I came to the conclusion that instead of going through all that craziness at Dulles, it would be easier to do it in Abu Dabi and to just get off the plane at Dulles and go home. So, ICE is a major roll played in enforcing internet-related crimes because it has to protect the U.S. borders and the international nature of cyberspace crimes.

Another thing that stuck out to me was The department of Homeland security. Homeland security was created and made after 9/11 happened to protect the U.S. from any terrorists attacks. There are many organizations that are under the DHS that help with DHS. The most important is The National Cyber Security Division (NCDS). This was also opened in 2003 with the act of protecting cyber infrastructure. The NCSD has two tasks and those tasks are to as stated in the textbook, (1) to build and maintain an effective national cyberspace response system and (2) to implement a cyber risk management program to protect critical infrastructure. For these two tasks the National Cyber Alert System and the Cyber Cop Portal program are put into place. These organizations are used to detect and catch cyber criminals and to detect terrorist attacks before they happen. The NCSD manages many organizations to help protect the US. internet so then no one hacks into it, attacks or puts viruses in it or messes with it.

Going back to the US board of protection, I was amazed at how they could determine if we were lying or not. They do their job very very well and are highly trained!

When I write…

When I write it feels like I’m turning this wheel in my head until the perfect idea pops out.

Jester-Jack-in-the-Box--pTRU1-11303127dt

Like a Jack-in-a-Box it takes me more than one turn to figure out what to write about. It gets frustrating after awhile but I have to just believe that eventually something will come out of this brain of mine.

Blog 7: California’s Privacy Laws

Article: California Now Has the Nation’s Best Digital Privacy Law

Governor Jerry Brown signed a law protecting digital privacy rights. And since he has done this, California now has the best digital privacy laws in the nation.

The landmark Electronic Communications Privacy act forbids any state law enforcement to search any type of electronics for example, phones, laptops, tablets, androids, emails, text messaging, etc. without a warrant. And now, in order to track any type of device’s location, law enforcement has to have a search warrant. California is the first to have such a major law for protecting location data, all content, metadata, and device searches. The reason why this law was signed upon and put into place is for California residents to have the right to digital privacy with their electronics as they have the right to privacy with things that are not digital.

There was major support with this bill by technological companies (Ex. Apple, Google, linkedIn, and Twitter) that Governor Jerry Brown signed and approved. There was also major bipartisan support by state lawmakers.

Website: http://www.wired.com/2015/10/california-now-nations-best-digital-privacy-law/

In my personal opinion, If we can’t have warrantless searches anymore as law enforcement, then how are we going to pin point criminals and crime on the internet? What if this law is brought to Virginia? We, as law enforcement, have to personally wait for a search warrant to be approved and then we can search someone’s electronics!?! by then I think it will be too late! by the time we come with a search warrant, that criminal who is doing the crime online, that criminal is smart enough to hide all of his crimes happening and flee! In chapter 10 of our textbook, for the Searches without Warrants, It says that majority of the searches that police do are warrantless searches. And, it is also said in this same section that all digital evidence without a warrant cannot be justified. Like I mentioned, I think that it’s a longer process in catching a criminal who does crime on the internet. Also, throughout this textbook and all of my previous courses, professors always mention how it’s very hard to catch a criminal online due to how smart and computer savvy that criminal is and by the time we get to their home or try to figure out who it is, the criminal has already fled the area, or for example, if its money laundering, have transferred their money into another account in a different country or something.

Another thing is that if law enforcement cannot track location without the warrant, how are we supposed to catch a criminal without tracking him or her? In order to catch someone, as law enforcement, we have to have reasonable suspicion/evidence of a crime exists, crime has been committed, the evidence presently exists in the place to be searched: This is searches with warrants but however in general, without a warrant I believe that these things still apply. So, how is law enforcement supposed to track evidence now?

In conclusion, I am against this digital privacy rights. I mean yes, have digital privacy rights but with exceptions so then law enforcement can crack down on crime and the internet. I think this law in California is going to slow down/delay the process of catching criminals out on the internet/electronically.

Image Argument

Claim: People change their personalities while in different social settings.

internet troll

A normal family man/cat lover like Michael Brutsch can turn out to be one of the biggest internet trolls because of the anonymity a computer provides. Source: huffingtonpost

police+body+camera

Police are asked to wear a camera in hopes to monitor police activity so that Ferguson doesn’t happen again. What do people expect from the camera? Better behaved cops. Source: thepolitic.org

freud

Psychological theories show that there are two extremes on personality and the mixture is shown. The extreme good and bad in a person show itself in certain situations, the good in front of others and the bad when alone. Source: makingthemodernworld.org.uk

howie

Charismatic Howie Mandel, game show host of Deal or No Deal, will fist bump contestants happily. That’s what you think at least. On camera Howie is excited by the show but behind the camera, Howie has OCD and cannot stand to be touched. His fear of germs is crippling but you wouldn’t be able to tell because of how his behavior changes while in front of an audience. Source: Goodreads.com

catfished

See these people? The man is Nev, the host of the show catfish where he investigates online relationships. The girl on the right was ready to meet the man of her dreams. The girl on the left make a fake profile to catfish the girl on the right. The man of her dreams is actually nonexistent.Anonymity online let’s people create fake personas that they wish to be. Source: abcnews.go.com