Read Think about it 3.1 (p. 40) and Case Study 3.2 (p. 44). Do your own research on the

Read Think about it 3.1 (p. 40) and Case Study 3.2 (p. 44). Do your own research on the Russian Hacking of the Democratic Party. Use reliable sources like the CIA report or congressional testimonies.

Discuss the role of the Internet in political espionage. Should political emails be public knowledge so voters know the “whole” story? What evidence does your research provide. Debate and discuss the 2016 election and email issues.

**Please use photos from the text attached to the files.
Reference- Kremling, J. and Parker. A.M.S.(2018). Cyberspace, Cybersecurity, and Cybercrime. SAGE Publications.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>