CJ317: Computer Forensics

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

Evidence Collection & Admissibility Computer Forensics BACS 371.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Larry J. Siegel Joe Morris Northwestern State University Cherly Gary North Central Texas College Lisa Ann Zilney Montclair State.
Police Investigator Vlada Aboymova. Table of Contents Slide 3: – What They Do Slide 4: – Similar Jobs Slide 5: – I AM Slide 6: – Skills Needed Slide 7:
FORENSIC ACCOUNTING - BA124 - Spring 2011Slide 8-1 Today’s Topics n Concealment Investigation Methods.
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
L EE & A LLEN F ORENSIC C OMPUTING S ERVICES A CAREER IN FORENSIC COMPUTING CRAIG G EARNSHAW L EE & A LLEN F ORENSIC C OMPUTING S ERVICES.
By: Ryan Hamilton.  Criminalist supervise, evaluate, investigate, and analyze crime scenes  Investigate all types of crime scenes  Robbery, murder,
By Drudeisha Madhub Data Protection Commissioner Date:
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
GARDINER POLICE DEPARTMENT SERVING SINCE 1849 SERVING SINCE 1849 Chief James M. Toman.
Guide to Computer Forensics and Investigations, Second Edition
Internet Safety Portage Department of Public Safety.
Fire Investigator e-book. Fire Investigators collect and analyze evidence from the scene of a fire.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317
Computer Forensics Principles and Practices
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
American Society of Crime Laboratory Directors Conference Media Relations Seminar Downtown Marriott Louisville, KY Tuesday, June 25, :00 p.m. Helene.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
The Crime Scene. Vocabulary Make a vocabulary page in your notebook for each of the following terms: Primary Crime Scene Secondary Crime Scene Physical.
Group E Productions Presents Group E Productions Presents.
The USA PATRIOT Act An Overstatement of ALA Concerns?
CJ227: Criminal Procedure Instructor: Patrick Coughlin, J.D. Make sure you adjust your speakers and audio settings on your computer so you can hear the.
“If you inspect the bowls of jello at the buffet to get the slice with no fingerprint on top…you might be a latent print examiner.” -Jim McNutt, Sedgwick.
Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep
CJ210: Unit 3 Obtaining Information. Follow Up: Unit 2 Mishandling of evidence; intentional and mistake Consequences Criminal charges & disciplinary action.
IT461 Advanced Visual Basic Unit 1: Course Introduction Sydney Liles AIM: sydneyliles.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
By Kat Weber 5/22/12 For 8 th grade career unit..
©2012 Cengage Learning. All Rights Reserved. Chapter 7 Social Studies “Children’s everyday experiences are the foundation of their social studies learning.”
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
CJ 317 – Computer Forensics
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
1 Introduction to Forensic Science and the Law Fourth amendment protects citizens against “unreasonable search and seizures” Police and crime scene investigators.
CJ 305 Unit 3. Housekeeping  Coming up in Unit 4  DB questions  Seminar  No U4 quiz  No U4 writing assignment.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Basic Forensics The Scene of the Crime. I. Forensic vocabulary A. Crime Scene: Physical location where a crime may have occurred. 1. Primary Crime Scene:
INTERNET INVESTIGATIONS. GOAL:  Identify different people by using online tools / information  Gather information about different people  Gather information.
Newly Released State Department Report Is Highly Critical of Hillary Clinton’s Private Usage CLINTON REPORT May 26, 2016 | Ben Booker Sources:
Presentation subhead March 3, 2011 Criminal Justice Investigations – Unit 9.
Patricia Dahl, Ph.D.. 2 Things to do! Work on the Professional Development Journal Journal due by midnight/Feb. 15th Complete the Unit 8 Discussion Board.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Limiting the Right of Search
Criminal Prosecutors with Computer Forensics
Computer Forensics 1 1.
Customer Service CUSTOMER SERVICE.
Using the Scientific Method to Solve Crimes
Crime Scene Basics STEM Forensics.
Forensic Science The Crime Scene.
Malware, Phishing and Network Policies
Forensics Week 7.
Forensics Week 2.
Ethics Communication Channels
On-Site Investigations
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

CJ317: Computer Forensics Computer Forensics & career Dr. Joe Ciccone

Last Week Review Week 1 review Questions & Concerns Resource s & References Evaluation Focused Interaction, Questions, and Feedback Questions & Concerns

What type of IT Skills were there in 1965?

Last weeks Discussion - Overview Computer forensics is a field in which your reputation is critical. You will be handling sensitive information and may end up in court as a technical or expert witness. How can things such as a DUI, charges of domestic violence, and other items affect your career? What did you learn and feel about the interaction, why?

What did I have in this RMP in 1985? My Crime Lab?

Project I – 5-3 Case Project 5-3: A murder in a downtown office building has been widely publicized. You are a police detective and receive a phone call from a computer forensics investigator, Gary Owens, who says he has information that might relate to the murder case. Gary says he ran across a few files while investigating a policy violation at a company in the same office building. Considering the silver platter doctrine, what procedures might you, as a public official, have to follow?

Case Project 5-5 As a computing investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that received a bomb threat in an anonymous e-mail. The detective already has information from a subpoena sent to the last know ISP where the anonymous e-mail originated, and the message was sent from a residence in the school neighborhood. The detective tells you that the school principle also stated that the school’s web server had been defaced by an unknown computer attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence that the ISP identified. Prepare a list of items that should be included in an initial response field kit to ensure that the preservation of computer evidence is maintained when the warrant is executed.

Technology Dependent Web-field Trips this week Computer Forensics Computer Security ASCLD (American Society of Crime Lab Directors) FOIA – US Dept. of State & the Freedom of Information Act YOUR STORIES from last weeks field trips

Can We Police Without Technology Today? Arguments for less technology intrusion in police work Return to foundations of police work Arguments for more technology inclusion into police work. COMPSTAT and Proactive Policing One more slide to go 

Questions What do you have for me? Suggestions for next weeks Seminar?