Module Three
Required Readings:
1. Police Technology
a. Chapter
Thirteen: Technology in Investigations
b. Chapter
Fourteen: Wiretaps
c. Chapter
Fifteen: Tracking and Surveillance
2. Computer Forensics and Cyber
Crime
a. Chapter
Eight: Forensic Terminology and Computer Crime
b. Chapter Ten:
Computer Investigations: Pre-Search Activities
c. Chapter Eleven: On-Scene Actvities
1. Electronic
Crimes Needs Assessment State and Local Law Enforcement
National
Institute for Justice, Research Report, March 2001
2. Searching/Seizing
Computers/Obtaining Electronic Evid in Invest
Department of Justice, Computer Crime and Intellectual Property Section,
July
2002
a. Part V Evidence.
3.
Cyberstalking: A New Challenge for Law Enforcement and
Industry
A
Rrt from Attorney Gen. to the Vice President
4.
Introduction to Steganography
Recommended Readings:
1. The
Rising Tide of Internet Fraud
Department of Justice, Computer Crime
and Intellectual Property Section, 2001
2 Tracking
an Internet Hacker
Department of Justice, Computer Crime and
Intellectual Property Section, 2001
3. Computer
Forensics and Cyber Crime.
a. Chapter Nine: Developing Computer Forensic Science Capabilities.
August 1999
Assignments:
(Note: Assignment due dates are listed on the
course homepage)
Practical Exercises
1. Go to
http://www.whois.net.
Determine the Domain Name owner information
for
www.hitechcj.com. Send
the information to the instructor.
2. Go to
Symantec Website
and determine the most three most recent
virus to hit
the Internet. Send the information to the instructor.
3. Throughout the course you have been exposed to terms like hacking, cracking
and phreaking. Conduct an Internet search on those terms.
Find a website that
offers free downloads. Do not download any software of which
you are unsure!
Write a briefing paper, executive summary or
intra-departmental memo. Presume
your audience is the chief executive of your agency. Write an explanation of
those terms and the differences between them; and, what you found on the
Internet.
Limit your response to one page. Use your agency's format for such
reports.
4. Complete a one or
two page executive summary on Steganography. Presume this
briefing is going to be given to the chief executive of your
law enforcement
agency. Use your agency's format for such reports.
5. Law
enforcement first responders are generalists. They are often the first
person to
respond to situation that will eventually require different types of experts.
As an
example, many patrol officers are the first to arrive at a homicide scene.
While the
first responder is unlikely to follow the investigation through to conclusion,
they are
responsible for tasks like making initial inquiries and protecting the scene.
Throughout
your career as a law enforcement officer you will receive training and gain
experience
on protecting different types of crime scenes. As with any expertise, it would
take
the average person a great deal of time to develop (through experience or
course
work; or a combination of both) the skills necessary to be a computer crime,
or
computer forensic expert, yet police officers and other law enforcement
officials
likely respond to a multitude of different crimes scenes wherein there is the
potential for digital evidence. For the last assignment in Module Three, think
back
to the review you did on seizing digital evidence. Now, consider all the
additional
reading and learning in modules two and three. Prepare a one or two page
outline of
a half-hour "roll call" or "briefing training." Presume your audience is
uniformed
patrol officers. What do the first responders need to know about digital
evidence?
Participation Assignment
Go to the
Criminal Justice Online forum
and post this
threaded discussion.
Submit Module Three
Via email by clicking here