Criminal Justice

Question 1. Review the document: Law Enforcement Using and Disclosing (Links to an external site. Technology Vulnerabilities (Links to an external site.) then respond to the following questions in the text box below:

What network investigative techniques were used in Operation Torpedo, Operation Pacifier, and the investigation of Freedom Hosting?
What are the pros and cons of using these NITs in child sexual exploitation and abuse investigations?
Does law enforcement have a legal obligation to disclose identified vulnerabilities and potential exploits?
Should law enforcement disclose identified vulnerabilities and potential exploits?
What other strategy or strategies (beyond law enforcement measures) could be used to counter the cybercrimes committed in Operation Torpedo, Operation Pacifier, and the investigation of Freedom Hosting?
Explain and support your responses with the reading

I uploaded the reading,,, Under Reading

Question 2.Review the following article: Image Based Sexual Abuse (Image Based Sexual Abuse Link (Links to an external site.))

In the textbox respond to the following questions:

How can we address victim-blaming attitudes that exist in responding to interpersonal cybercrime?
What type of education/prevention campaign would you design to alert people to the harms of interpersonal crime and to aim to prevent its occurrence?

I uploaded the reading under,,,,Image

Question 3. Should sexting be considered a criminal behavior or simply a deviant act? Why?