SlideShare a Scribd company logo
Dwayne and Debbie Tamai Family of Emeryville, Ontario.
Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic
harassment involved 15-year-old son, Billy, who took control of
all of the electronic devices in the family's home, including the
phone, and manipulated them to the distress of other family
members for his own amusement. The incidents began in
December 1996, when friends of the family complained that
phone calls to the Tamai home were repeatedly being waylaid,
cut off missed messages, strange clicking and appears like a
minor with a disembodied voice, unnervingly distorted by
computer, who interrupted calls to make himself known.
After burping repeatedly, the caller frightened Mr. and Mrs.
Tamai, and stated that I know who you are, and I stole your
voice mail. Mocking, sometimes menacing, the high-tech stalker
became a constant presence, eavesdropping on family
conversations, switching TV channels, and shutting off the
electricity.
The police department confirmed that the sabotage was an
inside activity but refrain from releasing the name the culprit.
The police further stated that nothing would be gained by filing
charges against the suspect. Mr. Dwayne and Mrs. Debbie
Tamai asserted that their son, Billy, had admitted engaging in
the mysterious calls. The interruptions included burps,
blathering and claims having control over the inner workings of
the Tamai’s custom-built home, and the power to turn individual
appliances on and off via remote control.
It started off as a witticism with friends and got out of control
to an extent that he didn't know how to end the entire operation,
become afraid to come forward and tell the parents for the fear
of us disowning him.
On Saturday, Mr., and Mrs. Tamai get organized and planned to
take their son to the police department to defend him against
persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son
confessed and labelled an intruder code-named, Sommy. Mr.,
and Mrs. Tamai eliminated all external sources and had
confidence in interior sources. After 2-days, a team of
investigators, intelligence and security experts loaded with
high-tech equipment failed to locate Sommy. The next day, the
team brought in two television networks to assist in the process.
In conclusion, the son, Billy not (Sommy) contacted the
victims; (his biological parents), launched verbal threats in
combination with the electronic harassment, in an effort to
demonstrate his power and authority over them. The best option
was, Mr., and Mrs. Tamai victims were not physically harmed,
but terrified and greatly inconvenienced by the fact that the
unknown force appeared to have control over a great many
aspects of their lives, and the unknown force turned out to be
their biological son, Billy.
Scenario:
1
Criminal motive is connected to emotional, psychological, and
material need are often impel by means of behavior and
independent of technology operation. These criminal tendencies
are believed to champion the restoration of the criminal's self-
confidence, and self-worth which lead criminals to the path of
temporary gratification, inadequacy, and incompetence.
Question 1
1:1 Provide a comprehensive narrative of Billy’s competency
and creating emotional distress on his parents.
1:2 Identify the role of Sommy in this operation
Scenario 2
The police department confirmed that the sabotage was an
inside activity but refrain from releasing the name the culprit.
The police further stated that nothing would be gained by filing
charges against the suspect.
2:1 What level of criminal behavior was exhibited by Billy in
this operation?
2:2 The entire operation is classified as a serious domestic
problem, why didn’t the police officer file charges against the
suspect?
Scenario 3
3:1 Modern approach use computer and internet technologies
identify offender
modus operandi
, criminal intent, and motive.
3:2 Describe the impact of computer and internet technologies
of Billy MO and criminal motive in this situation.

More Related Content

Similar to Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx

7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
DIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptxDIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptx
Fredrick Ajode
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
CJUS343-1302B-03 P5IPP5IP .docx
CJUS343-1302B-03 P5IPP5IP                                       .docxCJUS343-1302B-03 P5IPP5IP                                       .docx
CJUS343-1302B-03 P5IPP5IP .docx
monicafrancis71118
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011DocumentsforMila
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011DocumentsforMila
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
aesalem06
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Top 5 digital forensic court cases
Top 5 digital forensic court casesTop 5 digital forensic court cases
Top 5 digital forensic court cases
Deadbolt Forensics
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)
Felipe Prado
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe Online
Natalie Andrews
 
Ethical Decision Making
Ethical Decision MakingEthical Decision Making
Ethical Decision Making
Bernadette Harris
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 

Similar to Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx (20)

7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
DIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptxDIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptx
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
CJUS343-1302B-03 P5IPP5IP .docx
CJUS343-1302B-03 P5IPP5IP                                       .docxCJUS343-1302B-03 P5IPP5IP                                       .docx
CJUS343-1302B-03 P5IPP5IP .docx
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Top 5 digital forensic court cases
Top 5 digital forensic court casesTop 5 digital forensic court cases
Top 5 digital forensic court cases
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe Online
 
Ethical Decision Making
Ethical Decision MakingEthical Decision Making
Ethical Decision Making
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

More from brownliecarmella

E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
E C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docxE C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docx
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
brownliecarmella
 
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
E B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docxE B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docx
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
brownliecarmella
 
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxe activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
brownliecarmella
 
Dynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docxDynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docx
brownliecarmella
 
Dynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docxDynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docx
brownliecarmella
 
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxDylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
brownliecarmella
 
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxDustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
brownliecarmella
 
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docxDWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
brownliecarmella
 
DwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docxDwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docx
brownliecarmella
 
Dwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docxDwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docx
brownliecarmella
 
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxDVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
brownliecarmella
 
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docxDusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
brownliecarmella
 
Durst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docxDurst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docx
brownliecarmella
 
DuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docxDuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docx
brownliecarmella
 
DuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docxDuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docx
brownliecarmella
 
During  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docxDuring  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docx
brownliecarmella
 
During WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docxDuring WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docx
brownliecarmella
 
During Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docxDuring Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docx
brownliecarmella
 
During this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docxDuring this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docx
brownliecarmella
 
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docxEach answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
brownliecarmella
 

More from brownliecarmella (20)

E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
E C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docxE C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docx
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
 
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
E B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docxE B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docx
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
 
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxe activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
 
Dynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docxDynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docx
 
Dynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docxDynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docx
 
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxDylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
 
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxDustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
 
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docxDWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
 
DwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docxDwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docx
 
Dwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docxDwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docx
 
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxDVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
 
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docxDusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
 
Durst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docxDurst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docx
 
DuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docxDuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docx
 
DuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docxDuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docx
 
During  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docxDuring  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docx
 
During WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docxDuring WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docx
 
During Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docxDuring Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docx
 
During this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docxDuring this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docx
 
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docxEach answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx

  • 1. Dwayne and Debbie Tamai Family of Emeryville, Ontario. Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family's home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known. After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity. The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control. It started off as a witticism with friends and got out of control to an extent that he didn't know how to end the entire operation, become afraid to come forward and tell the parents for the fear
  • 2. of us disowning him. On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process. In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy. Scenario: 1 Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal's self- confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence. Question 1 1:1 Provide a comprehensive narrative of Billy’s competency
  • 3. and creating emotional distress on his parents. 1:2 Identify the role of Sommy in this operation Scenario 2 The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. 2:1 What level of criminal behavior was exhibited by Billy in this operation? 2:2 The entire operation is classified as a serious domestic problem, why didn’t the police officer file charges against the suspect? Scenario 3 3:1 Modern approach use computer and internet technologies identify offender modus operandi , criminal intent, and motive. 3:2 Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.