Module Three
                                     
                                    
                                    
                                    
                                    Required Readings:
                                    
                                     
                                    
                                    
                                    1. Police Technology
                                    
                                    
                                        a. Chapter 
                                    Thirteen: Technology in Investigations
                                    
                                    
                                        b. Chapter 
                                    Fourteen: Wiretaps
                                    
                                    
                                        c. Chapter 
                                    Fifteen: Tracking and Surveillance
                                    
                                    
                                    2. Computer Forensics and Cyber 
                                    Crime
                                    
                                    
                                        a. Chapter 
                                    Eight: Forensic Terminology and Computer Crime
                                    
                                    
                                        b. Chapter Ten: 
                                    Computer Investigations: Pre-Search Activities
                                    
                                        
                                    c. Chapter Eleven: On-Scene Actvities
                                    1. Electronic 
                                    Crimes Needs Assessment State and Local Law Enforcement
                                    
                                    
                                        National 
                                    Institute for Justice, Research Report, March 2001 
                                    2. Searching/Seizing 
                                    Computers/Obtaining Electronic Evid in Invest
                                    
                                    
                                    
                                    
                                        Department of Justice, Computer Crime and Intellectual Property Section, 
                                    July 
                                        2002
                                    
                                        
                                    a. Part V Evidence.
                                    
                                    3.  
                                    
                                    
                                    Cyberstalking: A New Challenge for Law Enforcement and 
                                    Industry 
                                         A 
                                    Rrt from Attorney Gen. to the Vice President 
                                    
                                    4. 
                                    
                                    
                                    Introduction to Steganography
                                     
                                    
                                    
                                    Recommended Readings:
                                    
                                    
                                    1. The 
                                    Rising Tide of Internet Fraud 
                                    Department of Justice, Computer Crime 
                                        and Intellectual Property Section, 2001 
                                    2 Tracking 
                                    an Internet Hacker 
                                    Department of Justice, Computer Crime and 
                                       Intellectual  Property Section, 2001  
                                    
                                    3. Computer 
                                    Forensics and Cyber Crime.
                                    
                                        
                                    a. Chapter Nine: Developing Computer Forensic Science Capabilities. 
                                    
                                    
                                    August 1999
                                    
                                    
                                    
                                    
                                    
                                    Assignments:
                                            
                                    (Note: Assignment due dates are listed on the 
                                    course homepage)
                                    
                                     
                                    
                                    
                                    
                                    Practical Exercises
                                    
                                    
                                    1. Go to 
                                    http://www.whois.net.  
                                    Determine the Domain Name owner information   
                                        for 
                                    www.hitechcj.com. Send 
                                    the information to the instructor. 
                                    2. Go to 
                                    Symantec Website 
                                     and determine the most three  most recent 
                                    virus to hit 
                                        the Internet. Send the information to the instructor.
                                    3. Throughout the course you have been exposed to terms like hacking, cracking
                                    
                                        and phreaking.  Conduct an Internet search on those terms. 
                                    Find a website that 
                                        offers free downloads.  Do not download any software of which 
                                    you are unsure!  
                                        Write a briefing paper, executive summary or 
                                    intra-departmental memo.  Presume 
                                    
                                    
                                    
                                       
                                    
                                    your audience is the chief executive of your agency.   Write an explanation of
                                    
                                      
                                    
                                     those terms and the  differences between them; and, what you found on the 
                                    Internet. 
                                    
                                       
                                    
                                    Limit your response to one page. Use your agency's format for such 
                                    reports.
                                    
                                    4. Complete a one or 
                                    two page executive summary on Steganography.  Presume this 
                                        briefing is going to be given to the chief executive of your 
                                    law enforcement 
                                        agency. Use your agency's format for such reports.
                                    
                                    5. Law 
                                    enforcement first responders are generalists.  They are often the first 
                                    person to
                                    
                                        
                                    respond to situation that will eventually require different types of experts.  
                                    As an
                                    
                                        
                                    example, many patrol officers are the first to arrive at a homicide scene.  
                                    While the 
                                    
                                        
                                    first responder is unlikely to follow the investigation through to conclusion, 
                                    they are
                                    
                                        
                                    responsible for tasks like making initial inquiries and protecting the scene.  
                                    Throughout
                                    
                                        
                                    your career as a law enforcement officer you will receive training and gain 
                                    experience
                                    
                                        
                                    on protecting different types of crime scenes. As with any expertise, it would 
                                    take
                                    
                                        
                                    the average person a great deal of time to develop (through experience or 
                                    course 
                                    
                                        
                                    work; or a combination of both) the skills necessary to be a computer crime, 
                                    or 
                                    
                                       
                                    computer forensic expert, yet police officers and other law enforcement 
                                    officials
                                    
                                       
                                    likely respond to a multitude of different crimes scenes wherein there is the
                                    
                                       
                                    potential for digital evidence. For the last assignment in Module Three, think 
                                    back
                                    
                                       
                                    to the review you did on seizing digital evidence.  Now, consider all the 
                                    additional 
                                    
                                       
                                    reading and learning in modules two and three. Prepare a one or two page 
                                    outline of
                                    
                                       
                                    a half-hour "roll call" or "briefing training."  Presume your audience is  
                                    uniformed 
                                    
                                       
                                    patrol officers.  What do the first responders need to know about digital 
                                    evidence?
                                    
                                     
                                    
                                    
                                    Participation Assignment
                                    
                                     
                                    
                                    
                                    
                                    
                                    Go to the 
                                    
                                    
                                                  Criminal Justice Online forum 
                                                  and post this 
                                                  threaded discussion.
                                          
                                           
                                      
                                       
                                      
                                      
                                      Submit Module Three 
                                      
                                      Via email by clicking here