“well, if i eat it, and if it makes me grow larger, i can reach the key; and if makes me grow...
TRANSCRIPT
“WELL, IF I EAT IT, AND IF IT MAKES ME GROW LARGER, I CAN REACH THE KEY; AND IF MAKES ME GROW SMALLER, I CAN CREEP UNDER THE DOOR: SO EITHER WAY I'LL GET INTO THE GARDEN, AND I
DON'T CARE WHICH HAPPENS!” - ALICE'S ADVENTURES IN WONDERLAND (1865)
Computer Forensics CJ 317
Dr. Joe Ciccone – Week 6RIP – Dep. Chief Maxwell (photo below – the Lead Inv. For the Rape
Case)
Last Week & Grade Review
Midterm Comments – Time linePractical Application (This Week)PLEASE BE ON TIME with your Project this
week!
Your Comments this week - WOW
Chapter 8 is simply an introduction to techniques for examining Linux and Macintosh file systems.
Chapter 9 explains how to apply your computer forensics skills and techniques to a computing investigation. One of the most critical functions is validating your evidence during the analysis process.?
Rape Case & Technology – what have we learned? Questions Comments
SARA – Project Analyzing Privacy
SARA is a problem-solving model. It stands for Scanning, Analysis, Response, and Assessment.
Project – Week 6 – Due Tomorrow
Case Project 9-2: Combine these cases Several graphic files were transmitted via e-mail from an unknown
source to a suspect in an ongoing investigation. The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem solving and brainstorming skills to determine a procedure to follow.
Case Project 9-3: A drive that you are investigating contains several password-
protected files and other files with headers that do not match the extension. What procedures would you need to follow to retrieve the evidence? Identify the mismatched file headers to extensions and discuss techniques you can apply to recover passwords from the protected files.
3 Pages
Unit 7 : Case 10-3 & 10-4
You are investigating a case involving an employee who is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk drive, you will find a file named orkty.zip, which you suspect is a graphic file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation.
Case Project 10-4: You work for a mid-sized corporation known
for its inventions that does a lot of copyright and patent work. You are investigating an employee suspected of selling and distributing animations created for your corporation. During your investigations of the suspect’s drive, you find some files with an unfamiliar extension of “.cde.” The network administrator mentions that other “.cde” files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for “.cde” files.
For Next Weeks Seminar
Rebuilding File HeadersComplete the exercise to
repair a file header found on pages 414 to 417.
You will notice how straightforward it can be but be aware that this is not always the case.
Check this out before next weeks seminar – let me know what you think.
GIS
GIS (Geographic Information Systems) have a pivotal role in assisting law enforcement in the development of strategic and tactical assessments. The most popular of those systems is ARCVIEW.
Are there Privacy issues with this technology?
How does it effect law enforcement personnel?
Who can see where you are and how?
CompStat – NYPD – Bernie Kerik
CompStat involves the use of computer-generated statistics to analyze crime problems and develop appropriate responses. COMPSTAT is a process.
The success of COMPSTAT as a process is primarily because of the six core components.
Mission Clarification:Internal Accountability:Geographic Organization of Operational
Command:Organizational Flexibility:Data-Driven Problem Identification and
Assessment:Innovative Problem-Solving Tactics
Comments & Questions
We are almost done – check gradesKEEP PROJECTS ON TIME – how have I
changed?Your ~ Questions & Concerns