CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.

Slides:



Advertisements
Similar presentations
Chapter 16 DOCUMENT EXAMINATION.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Forensic Science Questioned Documents
Parts of a Computer.
FRAUD EXAMINATION ALBRECHT, ALBRECHT & ALBRECHT
1 Chapter 16 The Crime scene The Crime scene Chain of Custody Chain of Custody Fingerprints and Trace Evidence Fingerprints and Trace Evidence.
Computer Analysis.
Forensic Science Questioned Documents. Questioned Documents Any object that contains handwritten or typewritten markings whose source or authenticity.
To become a document examiner… Bachelor’s degree followed by an internship under a recognized examiner. 2-3 more years of independent document work Certification.
17-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein DOCUMENT EXAMINATION.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Document Analysis.
By Drudeisha Madhub Data Protection Commissioner Date:
Capturing Computer Evidence Extracting Information.
Parts of the Computer.
17-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein COMPUTER FORENSICS.
The Impact of Physical Security on Network Security
18-1 ©2011, 2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE: An Introduction, 2 nd ed. By Richard Saferstein COMPUTER FORENSICS.
Ch. 16 Document Examination CSI And Document Examination CSI And Document Examination.
Questioned Documents.
Document Analysis Chapter 18.
Document Analysis Students will learn: Students will be able to:
HOnors Forensic Science.  I. Document Examiners  A. Involves examination of handwriting and typewriting to ascertain the source or authenticity of a.
Digital Crime Scene Investigative Process
17- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
Computer main parts. Hardware  It refers to all physical parts of a computer system.
Chapter 17 DOCUMENT EXAMINATION.
Chapter 3 Physical Evidence. Any & all objects that:  establish a crime  link a crime to its victim  link a crime to its perpetrator Must be recognized.
1 Handwriting Analysis, Forgery, and Counterfeiting By the end of these notes you will be able to: describe 12 types of handwriting characteristics that.
COMPUTER MAIN PART DANILO GARCÍA GONZÁLEZ TÉCNICO EN SISTEMAS.
Forensic Science. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of these notes you.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
QUESTIONED DOCUMENTS Forensic Science Course. What is a document? Any fixed method of communication between one individual and another.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensic Science.  I. Document Examiners  A. Involves examination of handwriting and typewriting to ascertain the source or authenticity of a questioned.
Handwriting Analysis EHS BioMed/Forensics. Video links chnique/document-examination/
Forensic Science Chapter 3: Physical Evidence Common Types ExaminationDatabases Crime-Scene reconstruction
Crime Scene Investigation Forensic Science. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
Forensic Science Questioned Documents
Chapter 16 Notes Part 1. The Unabomber  In 1978, a package was sent to a professor at Northwestern University.  It exploded when it was opened by a.
More about Document Examination Forensic Science 3/12/15.
Digital Forensics. Hardware components Motherboard Motherboard System bus System bus CPU CPU ROM ROM RAM RAM HDD HDD Input devices Input devices Output.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Class Name, Instructor Name
Chapter 17 DOCUMENT EXAMINATION.
Question Docs Part 2.
Chapter 17: Document Examination 1.
Chapter 7: Investigating Theft Acts
Chapter 18: Computer Forensics 1.
Latent Print Examiner.
CATALYST Create two copies of the piece of text as neatly as possible.
Parts of a Computer I plan to use this presentation for an introduction at the start of the year. Maybe even create a “word wall” with the cards.
Forensic Science Questioned Documents: Part 1
Questioned Documents Forensic Science.
Chapter 16 DOCUMENT EXAMINATION.
Class Name, Instructor Name
(Discussion – Document and Transcript Comparisons)
OLA HIGH Criminal Justice / Forensic Science
Document Analysis.
describe 12 types of handwriting characteristics
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting
Chapter 17 COMPUTER FORENSICS.
Forensic Science and Criminalistics
Presentation transcript:

CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity is in question. Questioned documents are not restricted to pieces of paper bearing handwritten text, but also include computer printing, typewritten material, and markings such as graffiti on walls, and other surfaces. The single most common activity of the forensic document examiner is the identification of handwriting. High quality known samples of handwriting (exemplars) are required for handwriting comparisons. Document examiners also compare typewritings, photocopier copies, and computer printed documents. Document examiners are also called upon to compare samples of ink and paper.

Unit 8 Seminar-Chapter 19 Questions What is computer forensics? Name some crimes that involve the use of a computer. What is the difference between computer hardware and computer software? What is the main circuit board of a computer called?

Unit 8 Seminar- Chapter 19 Questions What part of a computer, found on the ‘Mother Board’ contains a complex of wires, which serves to carry data from one hardware device to another? What part of a computer is referred to as the ‘brain’ of the computer? Is the operating system in a computer considered to be hardware or software?

Unit 8 Seminar-chapter 19 Questions What does the term ‘bit’ stand for? What is the first thing a crime scene investigator should do when encountering computer forensic evidence? What are the two ways that a computer crime scene must be documented?

Unit 6 chapter 15 Questions What is the difference between visible data and latent data? What is an IP address and what potential value does it have in computer forensics investigations? What is the unauthorized intrusion into a computer called?

Unit 8-Computer Forensics Review The first thing a computer investigator must do is obtain a search warrant Images of a hard disk drive must be captured without altering the drive in any way Latent data is hidden from view The word processing or text-based document files are a common place to look for evidential data A ‘fingerprint’ must be made of the hard disk drive both before and after imaging its contents Cookies, internet history and cache are all potential sources of evidence on a computer