Course and Reading Material

Lecture 1

Introduction to Computer Forensics

Lectures 2 - 7: Introduction to Criminal Justice

Bureau of Justice Statistics The Criminal Justice System Flowchart

Introduction to Criminal Justice Fall 2007 Power Point Presentation

Nature of the Criminal Law

Crime Data Sources

Structure and Conduct of Investigations


Homework for Monday, Sept. 24: Please, read the following articles

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

Computer Crime & Intellectual Property Section United States Department of Justice

FEDERAL GUIDELINES FOR SEARCHING AND SEIZING COMPUTERS

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations



Introduction to Criminal Justice Part 1

Introduction to Criminal Justice Part 2

Introduction to Criminal Justice Part 3

The seven objectives from "The Challenge of Crime in a Free Society" that would shape criminal justice for some time.

  1. Focus on crime prevention
  2. Broaden the range of techniques availavble to deal with offenders.
  3. Eliminate injustices in the criminal justice system.
  4. Attract more and better qualified persons to work in the System
  5. Increase research and development directed toward crime and administration
  6. More money to components
  7. Foster a community approach to crime, criminal jsutice, and change.
Lecture

What is Inofrmation? What is Computer?

History of Computing Links


Intel Innovation in Education
A History of the Computer from PBS
Computer History Images
An Illustrated History of Computers
Computer History Museum Ehibits
The History Chanel Video Gallery
Timeline of Computing History
The History of Computing by Michelle A. Hoyle
History of computing hardware from Wikipedia
History of Computing, Virginia Montecino Education and Technology Resources
Intel 4004

Lectures

Big Endian and Little Endian: Links

Gulliver's Travels by Jonathan Swift
Gulliver's Travels by Jonathan Swift
Gulliver's Travel (1939)
Big Endian, Little Endian
Big Endian, Little Endian from Wikipedia

Binary System Web Resourses


Binary-Decimal-Binary Converter

ASCII CODE


ASCII TABLE
ASCII Lab Practice

Computer Ethics Test - Wed, Nov 21, 2007 - in class

Encryption and Forensics


History of Cryptography Web Resources
Introduction to Cryptology
Affine Cipher Web Resources by Marc Renault
Crypto Lab Practice

Steganography and Forensics

Introduction to Steganography

Steganography Web Resourses

Niels Provos and Peter Honeyman, Hide and Seek: AnIntroduction to Steganography, IEEE Security & Privacy Magazine, May/June 2003.
An Overview Steganography for the Computer Forensics Examiner, Gary C. Kessler
Steganography: How to Send a Secret Message By Bryan Clair
Steganography: Hiding Data Within Data Gary C. Kessler
Steganography and Cyber Terrorism Communications, Dancho Danchev
MP3Stego
Hide4PGP

Files for the Lab

picture 1
picture 2

Test 2 Preparation


ForensicsTest2ReviewFall2007.doc

Steganography Homework. Due Day: Monday, Oct 29

.


Steganography Lab Practice



Lab Practice - Preparation for the Lab Assignment


Lab Practice Description

Files for the LAB


data.htm.isc
pic.jpg

Steganography Lab Assignment


ForensicsStegLabAssignmentFall2007.doc

Files for the Lab Assignmen
hidePic.jpg
info.htm.isc

Introduction to Computer Ethics


Introduction to Computer Ethics, text: Ethics in Information Technology, George Reynolds
Introduction to Computer Ethics: Privacy, text: Ethics in Information Technology, George Reynolds
Computer Ethics Web Resourcs
Computer Ethics and Privacy Issues Test

MD5 and Forensics


MD5 Summary

Files for MD5 practice


ForensicsMD5Lab.doc
forensicsMD5PracticeEncrypted.doc
forensicsMD5practice.doc
forensicsMD5practiceNew.doc


forensics MD5 practice - Monday, Dec 3


Computer Examination Process


forensics MD5 practice - Wed, Dec 5


MD5 Lab Assignment