Part one&nbspUse the text, internet, and/or other sources and

Part one: Use the text, internet, and/or other sources and select an example of terrorists (either domestic or international) that have used technology to further their ideologies.Explain specifically how the terrorist organization uses, or has used technology in their activities (or related to a specific event).Provide a profile on the terrorist group including:known membersactivities involving technologyany legal action taken against the organizationExplain the use of high tech evidence to support cyber crime casesCite your references in your workPart two: Perform a key word search on online identity theft and locate two cases involving online identity theft.Summarize the facts of each case, including how:the thief obtained the victim’s informationwhat the thief did with the informationthe impact to the victimRecommend at least 3 methods for each case that the victim could have used to prevent the theft.Critique the tracking methods used to investigate the internet identity thefts.Be sure to cite your references.Include both parts one and two in a single word document for submission.Paper FormatLength should be at least 3.5 pages, excluding your cover and references page, in 10-12 point font (Arial, Courier, and Times New Roman are acceptable).Viewpoint and purpose should be clearly established and sustainedAssignment should follow the conventions of Standard American English (correct grammar, punctuation, etc.).Writing should be well ordered, logical, and unified, as well as original and insightfulYour work should display superior content, organization, style, and mechanicsAppropriate citation style should be followed.You should also make sure to:Include a title page with full name, class name, section number, and dateUse double-space and Arial or Times New Roman in 12 point font sizeUse examples to support your discussionCite all sources on a separate reference page at the end of your paper and cited within the body of your paper using APA format