Investigation: Thefts at downtown Japanese Restaurants.

Slides:



Advertisements
Similar presentations
Cellular Networks.
Advertisements

Someone with an Axe to Grind. Crime scene photo ABCDEFGHI
EWiFi for Android. Installing the eWifi app (This step requires internet access) ) 1. To install the eWifi client open the Google Play Store from your.
Guide to Computer Forensics and Investigations, Second Edition
Managing a Club A club is trying to persuade more people to take part. Some features of the club are: Open to all ages Takes part in competitions and.
Gas Tracker 9000 Semester Project EEL 6788 Spring 2010 Chris Giles EEL April-2010 University of Central Florida.
Vendor Managed Inventory Malnove’s Standard Approach.
Tutorial 11: Connecting to External Data
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Co-funded by the European Union´s Seventh Programme for research, technological development and demonstration under grant agreement No
LESSON 17 PREPARED BY MANJU. database A database is a collection of related information Access is the Microsoft Office database program that enables you.
Managing a Travel Agency A travel agent offers a holiday planning and booking service. This service includes details of holidays such as: special offers.
Page 1 ISMT E-120 Desktop Applications for Managers Introduction to Microsoft Access.
Workshop on Android based mobile application for mapping and management of Watershed Development Activities in Madhya Pradesh under IWMP scheme M.P. COUNCIL.
Team: SALL-Z.  Between November 27 – December  40 million people got credit card information stolen  Target was giving 10% worldwide, and free.
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Creating Dynamic Web Pages Using PHP and MySQL CS 320.
Object Persistence (Data Base) Design Chapter 13.
Do it now activity How likely it is that Garry Dury is the murderer? How do you know he is the murderer? What type of evidence do you have? Is this evidence.
Welcome to Byrne Creek Library. COME TO THE LIBRARY.. …if you want a book to read …if you have a class project.
SESSION 3.1 This section covers using the query window in design view to create a query and sorting & filtering data while in a datasheet view. Microsoft.
26 Mar 04 1 Application Software Practical 5/6 MS Access.
Forms and Subforms 5.02 Understand database queries, forms, and reports used in business.
Basics and Photography.  The goal of a crime scene investigation is to recognize, document, and collect evidence at the scene of a crime.  This information.
DAY 15: ACCESS CHAPTER 1 Rahul Kavi October 6,
Investigative Report: Directions SAVE THIS POWERPOINT TO COMPUTER The following 5 slides are a template for your final presentation. Delete this slide.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Databases Letts Chapter 11. A database program can be used to:  sort a file into a different order;  search through the records for a matching string.
1 MS Access. 2 Database – collection of related data Relational Database Management System (RDBMS) – software that uses related data stored in different.
Forensic Science Chapter 3: Physical Evidence Common Types ExaminationDatabases Crime-Scene reconstruction
Criminal Investigations 1.The Crime Scene 2.ID Suspect 3.Informants.
Do it now activity Activity: A travel agent is trying to create a database to collect information about people who are booking a flight. He is having a.
Work with Tables and Database Records Lesson 3. NAVIGATING AMONG RECORDS Access users who prefer using the keyboard to navigate records can press keys.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 8: ROBBERY.
Data report Pull Andre Naylor| Account Manager 15 th August 2011 TMS Reports.
Crime Stoppers now uses the most up to date, encrypted mobile reporting system available – P3 Tips. Tipsters can send crime information and engage in.
Database Relationships Objective 5.01 Understand database tables used in business.
Empowering Your Collections Team. The Collections Management Query Process Design, organize, Implement 1 The Collections Query 2 How Can We Use a Query.
SEC 430 OUTLET The learning interface/sec430outletdotcom.
SEC 430 master Expect Success/sec430masterdotcom FOR MORE CLASSES VISIT
I2 Camp training New York, April 24 th to 26 th, 2014 Courtesy: i2 Camp Facebook Photo Priyadarshini Singha, Spring 2014, UC, Irvine.
Digital Forensics and Hand Held Devices Robert Trimble COSC
PTC Project Update 13 th June Advantages of Services of PTC – By Chin Szi Chu’en 2.PC GTN Process Flow– By May (PC Mgr) 4. PTC Update – By Zaid.
BSA 385 Week 3 Individual Assignment Frequent Shopper Program Part 2 Check this A+ tutorial guideline at
Unit 3: Impression Evidence tool marks
Project Model-Based Systems Engineering: Documentation and Analysis
Databases Chapter 16.
Message Center Training
Crime Scene Investigation
Criminal Investigations
Aim: How is physical evidence packaged
Click on the assignment you wish to complete
Protecting Personal Information Guidance for Business.
Welcome to Byrne Creek Library
Chapter 2 and 3 Evidence and Crime Scene
Extra credit – swim lane
QGIS, the data model, use and storage
Friday September 29, 2017 (Discussion – Crime Scene Reconstruction; Forensic Files – Material Evidence)
Year 2 Summer Term Week 13 Lesson 4
Are you one of those people who writes information (birthdates, phone numbers and addresses, assignment due dates) on scraps of paper? Ever have trouble.
Police Report  City Council Report April 2018 
More to Learn Viewing file details
Tuesday February 13, 2018 (??).
CSI: Crime Science Investigation
Processing the Crime Scene
2-1 the Crime Scene Forensics.
Problems encountered in account Presentation stuck in conversion.
Nagendra Vemulapalli Access chapters 1&2 Nagendra Vemulapalli
Extra credit – swim lane
Presentation transcript:

Investigation: Thefts at downtown Japanese Restaurants

Map of Restaurant Locations

Sushi Fish Thefts 3 separate incidents at Japanese restaurants – theft of valuable sushi fish Dates June 7, Aug 26, Sept 15 Downtown Phoenix area Estimated time of thefts: midnight – 5 am Reward for information leading to an arrest

Current Evidence and Information Collected Device IDs from the towers covering the cells for the restaurants – subpoenaed databases for these towers. Found at crime scene on Sept 15: empty Fry’s grocery bag with red residue on the handle – residue confirmed to be “Flamin Hot Cheetos” powder. Subpoenaed database’s from all Fry’s grocery stores in a 5-mile radius.

Cellular Network Cells

Assignment Work alone or in teams of 2 Download database/evidence files from: alearningresource.com Document your investigation in a Word document (see example file). Include at least 3 screenshots of Access -- relationships, queries, sorts, or filters on the data. Extra Credit for finding information about legitimate suspects. Save and upload the Word document to Canvas.