Course list: http://www.c-jump.com/bcc/

Computer Crimes


  1. Computer Crimes
  2. Privacy vs. Security and Forensics
  3. Privacy vs. Security and Forensics, cont.
  4. Digital Investigation
  5. Evidence Preservation Procedures
  6. Digital Crime Scene Process
  7. Evidence Searching Phase
  8. Event Reconstruction Phase
  9. Case Example -- Mucko McDermott
  10. Comm. V. Michael "Mucko" McDermott
  11. Comm. V. Michael "Mucko" McDermott, cont.
  12. Comm. V. Michael "Mucko" McDermott, cont.
  13. Comm. V. Michael "Mucko" McDermott, cont.
  14. Dennis Rader -– The BTK Killer
  15. Zaccarias Moussaoui – "The 20th 9/11 Hijacker"
  16. Exhibit FO05521.11 01-455-A
  17. Overview Of Forensic Toolkits
  18. Extensive List of Tools
  19. Challenges
  20. Challenges, cont.
  21. Illegal traffic
  22. California, 2003, case example
  23. California, 2003, case example, cont.
  24. Identity theft
  25. Maryland, 1996, case example
  26. Good to Know...
  27. Digital Evidence
  28. Terrorism
  29. Civil Cases
  30. Enron and other corporate misdeeds
  31. Digital Evidence
  32. Digital Evidence, cont.
  33. Categories of Computer Systems
  34. Categories of Computer Systems, cont.
  35. Categories of Computer Systems, cont.
  36. Digital Evidence, cont.
  37. Challenges
  38. Facts about Digital evidence
  39. Challenges
  40. Internet crimes
  41. Ebay fraud example
  42. Internet
  43. Internet
  44. Corporate networks
  45. Cybertrail challenge
  46. Forensic Science Goals
  47. Forensic Science Purpose
  48. Homework
  49. How to Submit the Homework