Unit 1 1
Passage A The Tactical Police Computer System 1
Passage B Police Information System 8
Supplementary Reading 1 Northeast Gang Information System 15
Supplementary Reading 2 Police Information System Division 19
Unit 2 22
Passage A Computer Crime and Prevention Tips 22
Passage B Computer Crime and Prevention Tips 28
Supplementary Reading 1 Criminal Damage and Internet Fraud 35
Supplementary Reading 2 Computer Crime Statutes in USA 37
Unit 3 41
Passage A Network Security 41
Passage B Network Security 48
Supplementary Reading 1 How Firewalls Work 53
Supplementary Reading 2 Computer Security Risks to Home Users 58
Unit 4 63
Passage A Credit Card Fraud 63
Passage B Identity Theft 70
Supplementary Reading 1 Credit Card Crime Up Sharply 75
Supplementary Reading 2 Credit Card Fraud:21 Tips to Protect Yourself 78
Unit 5 82
Passage A Preventing Terrorism——the Intelligence Dimension 82
Passage B The Intelligence Cycle 88
Supplementary Reading 1 People Can Help Prevent and Prepare for Terrorist Attacks 93
Supplementary Reading 2 What I Learned About Preventing Terrorism 95
Unit 6 99
Passage A Facial Recognition Emerging As Viable Tool for Verifying ID 99
Passage B Facial Recognition Technology 104
Supplementary Reading 1 Facial-Recognition Technology Improves 109
Supplementary Reading 2 New Side to Facial-Recognition Technology:Identifying Victims 111
Keys to exercises 115
References 135