Course list:
http://www.c-jump.com/bcc/
Computer Crimes
- Computer Crimes
- Privacy vs. Security and Forensics
- Privacy vs. Security and Forensics, cont.
- Digital Investigation
- Evidence Preservation Procedures
- Digital Crime Scene Process
- Evidence Searching Phase
- Event Reconstruction Phase
- Case Example -- Mucko McDermott
- Comm. V. Michael "Mucko" McDermott
- Comm. V. Michael "Mucko" McDermott, cont.
- Comm. V. Michael "Mucko" McDermott, cont.
- Comm. V. Michael "Mucko" McDermott, cont.
- Dennis Rader -– The BTK Killer
- Zaccarias Moussaoui – "The 20th 9/11 Hijacker"
- Exhibit FO05521.11 01-455-A
- Overview Of Forensic Toolkits
- Extensive List of Tools
- Challenges
- Challenges, cont.
- Illegal traffic
- California, 2003, case example
- California, 2003, case example, cont.
- Identity theft
- Maryland, 1996, case example
- Good to Know...
- Digital Evidence
- Terrorism
- Civil Cases
- Enron and other corporate misdeeds
- Digital Evidence
- Digital Evidence, cont.
- Categories of Computer Systems
- Categories of Computer Systems, cont.
- Categories of Computer Systems, cont.
- Digital Evidence, cont.
- Challenges
- Facts about Digital evidence
- Challenges
- Internet crimes
- Ebay fraud example
- Internet
- Internet
- Corporate networks
- Cybertrail challenge
- Forensic Science Goals
- Forensic Science Purpose
- Homework
- How to Submit the Homework