Crime in Silicon Valley

Slides:



Advertisements
Similar presentations
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Advertisements

Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Company Life By: Neenu Thomas September 29, 2014.
Job Seeking Skills Participate in a job interview.
Legislation in ICT.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
5. Case Study Smart Home in a Life Care Community Apartment Complex.
By: Melissa Robbins OCCUPATIONAL CAREER PROJECT. The general career path I hope to pursue is in the field of forensic science. You may be asking yourself,
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
CRIME SCENE INVESTIGATION 1. Introduction. What is crime scene investigation?  this is seemingly a trivial question with an obvious answer  investigation.
Satellite image Built up area Dry grassland Intensive farming Forest Silicon valley.
The Working Environment
Forensic Science Introduction to forensics. Learning outcomes Be able to describe a range of forensic methods Describe how SOCO’s avoid contaminating.
Perky Perko Placement Co Employment Training Agency.
High Tech Employment Craig Galbraith Cameron School of Business.
© M. Reber 10/17/2015 TWRT 62: 4 October 2012 A presentation for when the loudmouth teacher has no voice—All rejoice!
Company Life By: Kaleb Simmons 9/29/2014 Google The Googleplex is located at 1600 Amphitheatre Parkway in Mountain View, Santa Clara County, California,
Company Life By: Joshua Jacob 9/29/14 Google Google Headquarters is located at Mountain View, California, U.S. Sector of Company: Internet, Computer.
Technology for everybody: Apple, Microsoft and the internet. By Mr. N. Metropoulos.
Company Life By : Nick Merrell & Jonathan Vu 11/4/13.
Aim: How can scientific method be used in solving a crime?. Objectives:  develop and present proposals including formal hypotheses to test explanations.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Computer Engineering By: Sandeep Sribhashyam. Job Description  Computer hardware engineers research, design, develop, test computer systems and components.
Shelter-In-Place vs Evacuation Provided by City of Dallas OEM.
 Silicon Valley, a part of San Francisco Valley in Southern California in the United States, which is the name given to the San Jose valley.  The reason.
Silicon Valley Silicon Valley (A) Silicon Valley is in the southern part of the San Francisco Bay Area in Northern California. The ______________is home.
New Surveillance technology Crystal Holly. My Proposal.
California Chapter 2 Frameworks Powerpoint Travel Destinations 4th hour By: Sydney.
Company Life By Jonathan Johnson Dillon Bradshaw.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Public Exams 2016 (GCSEs) May 3 rd – June 24 th. Individual Timetables Please check your individual timetable when you receive it. – Name – Form – DOB.
Population Shifts. Migration  The movement of people from one area to another  African Americans -moved from the south after the Civil War to the north.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Identity Theft It’s a crime!
Mrs. Esman Computer Special
What is physical evidence? List some examples
Training for Employees
Protecting Your Identity:
Legislation in ICT.
Campus & community events
2017.
Mind the Gap! Good habits, Good chance.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Jeopardy Final Jeopardy Regions Virginia! Rivers Cities Bordering
1990’s.
“STEVE PAUL JOBS” and the history of Apple Computer
Layoffs & Organizational Decline
Crime in Silicon Valley
Cybersecurity and Personal Finance
Steps to Solving a Crime
Steps to Solving a Crime
Lesson 2: Epic Security Considerations
2016.
The Star-Spangled banner (US flag)
Office of Equality Assurance 200 East Santa Clara Street
Operational CCAs
Legislation in ICT.
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Work Readiness Training
2015.
12th World Congress on ITS November 10, 2005
AIM: Why are location factors changing?
What’s the Big Deal About Internet Privacy?
Water Conservation Regulations: Guide or Be Guided
How to Address an Envelope
Presentation transcript:

Crime in Silicon Valley

Silicon Valley is an area that is located on the San Francisco, California, peninsula, radiates from Stanford University between the cities of San Francisco and San Jose (the 'capital' of Silicon Valley).  Silicon Valley is contained by the San Francisco Bay on the east, the Santa Cruz Mountains on the west, and the Coast Range to the southeast.

It contains cities such as Mountain View, Cupertino and Sunnyvale It contains cities such as Mountain View, Cupertino and Sunnyvale.  Silicon valley is home to world famous companies such as HP, Intel, Sun, Google, Yahoo!, eBay, Cisco, Apple Computers , Adobe and many, many more.

Introduction: The morning of July 5 in Cupertino, California Introduction: The morning of July 5 in Cupertino, California. You are working theft watch, day shift. As commander of the electronic theft division you have a team of experts, skilled in the collection of all types of evidence relating to theft of computers, software and other related electronics.

At 9:50 a.m. you get a call that someone has attempted to steal an advanced chip from the Hewlett Packard Computer Company. You and your team respond immediately to the call. When you arrive, you find that the plant is sealed off and all the uniformed employees have been confined to a single room, the lounge.

Within the hour, the missing chip is found in an envelope in a pile of mail. The envelope was addressed to Gordon Lidy, the security chief of a rival computer firm. A cassette tape was also found in the envelope.

Keep this in mind… Absence of evidence is not evidence of absence

1. Would you feel comfortable as ajury member making a conviction with the evidence presented? Remember you are affecting the life of a human being (or beings). 2. Is there reasonable doubt? Now do you see why juries become “hung”, or why people are acquitted when they seemingly did the crime? 3. What further evidence would you want?

Further questions to ask… Does the security guard have the code for the alarm? Has coffee cart Doug been fingerprinted? Do the custodians who clean the place have fingerprint on file? Why is security guard Jim called “Hacker” look into his past…but don’t make a judgment on his nickname before you know why…

More tests to do Test DNA of horse hair found at the crime scene… if there is a root … but mitochondrial DNA can now be tested from the shaft Test the type of Denim and its dye