You are on page 1of 10

Computer Forensics CJ 317

Dr. Joe Ciccone Week 6


RIP Dep. Chief Maxwell (photo below the Lead Inv. For the Rape Case)

WELL, IF I EAT IT, AND IF IT MAKES ME GROW LARGER, I CAN REACH THE KEY; AND IF MAKES ME GROW SMALLER, I CAN CREEP UNDER THE DOOR: SO EITHER WAY I'LL GET INTO THE GARDEN, AND I DON'T CARE WHICH HAPPENS! - ALICE'S ADVENTURES IN WONDERLAND (1865)

Last Week & Grade Review


Midterm Comments Time line Practical Application (This Week) PLEASE BE ON TIME with your Project this week!

Your Comments this week - WOW


Chapter 8 is simply an introduction to techniques for

examining Linux and Macintosh file systems. Chapter 9 explains how to apply your computer forensics skills and techniques to a computing investigation. One of the most critical functions is validating your evidence during the analysis process.? Rape Case & Technology what have we learned?

Questions Comments

SARA Project Analyzing Privacy


SARA is a problem-solving model. It stands for

Scanning, Analysis, Response, and Assessment.

Project Week 6 Due Tomorrow


Case Project 9-2: Combine these cases
Several graphic files were transmitted via e-mail from an unknown

source to a suspect in an ongoing investigation. The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem solving and brainstorming skills to determine a procedure to follow.

Case Project 9-3:


A drive that you are investigating contains several password-protected

files and other files with headers that do not match the extension. What procedures would you need to follow to retrieve the evidence? Identify the mismatched file headers to extensions and discuss techniques you can apply to recover passwords from the protected files.
3

Pages

Unit 7 : Case 10-3 & 10-4


You are investigating a case involving an employee who is allegedly sending inappropriate photos via email in attachments that have been compressed with a zip utility. As you examine the employees hard disk drive, you will find a file named orkty.zip, which you suspect is a graphic file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation. Case Project 10-4: You work for a mid-sized corporation known for its inventions that does a lot of copyright and patent work. You are investigating an employee suspected of selling and distributing animations created for your corporation. During your investigations of the suspects drive, you find some files with an unfamiliar extension of .cde. The network administrator mentions that other .cde files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for .cde files.

For Next Weeks Seminar


Rebuilding File Headers Complete the exercise to repair

a file header found on pages 414 to 417. You will notice how straightforward it can be but be aware that this is not always the case. Check this out before next weeks seminar let me know what you think.

GIS
GIS (Geographic Information Systems) have a

pivotal role in assisting law enforcement in the development of strategic and tactical assessments. The most popular of those systems is ARCVIEW. Are there Privacy issues with this technology? How does it effect law enforcement personnel? Who can see where you are and how?

CompStat NYPD Bernie Kerik


CompStat involves the use of computer-

generated statistics to analyze crime problems and develop appropriate responses. COMPSTAT is a process. primarily because of the six core components. Mission Clarification: Internal Accountability: Geographic Organization of Operational Command: Organizational Flexibility: Data-Driven Problem Identification and Assessment: Innovative Problem-Solving Tactics

The success of COMPSTAT as a process is

Comments & Questions


We are almost done check grades KEEP PROJECTS ON TIME how have I changed? Your ~ Questions & Concerns

You might also like