Course and Reading
Material
Lecture 1
Introduction to Computer Forensics
Lectures 2 - 7: Introduction to Criminal Justice
Bureau of Justice Statistics
The Criminal Justice System
Flowchart
Introduction to Criminal Justice Fall 2007 Power
Point Presentation
Nature of the Criminal Law
Crime Data
Sources
Structure and Conduct of Investigations
Homework for Monday, Sept. 24:
Please,
read the following articles
Searching and Seizing Computers and Obtaining Electronic Evidence in
Criminal Investigations
Computer Crime &
Intellectual Property Section
United States Department of Justice
FEDERAL GUIDELINES
FOR
SEARCHING AND SEIZING COMPUTERS
Searching
and Seizing
Computers and Obtaining Electronic Evidence in Criminal Investigations
Introduction to Criminal Justice Part 1
Introduction to Criminal Justice Part 2
Introduction to Criminal Justice Part 3
The seven objectives from "The Challenge of Crime in a Free Society"
that would shape criminal justice for some time.
-
Focus on crime prevention
- Broaden the range of techniques availavble to deal with offenders.
- Eliminate injustices in the criminal justice system.
- Attract more and better qualified persons to work in the System
- Increase research and development directed toward crime
and administration
- More money to components
- Foster a community approach to crime, criminal jsutice, and change.
Lecture
What is Inofrmation? What is Computer?
History of Computing Links
Intel Innovation in Education
A History of the
Computer from PBS
Computer History Images
An Illustrated History of Computers
Computer History
Museum Ehibits
The History Chanel Video Gallery
Timeline of Computing History
The History of Computing by
Michelle A. Hoyle
History of
computing hardware from Wikipedia
History of
Computing, Virginia Montecino Education and Technology Resources
Intel 4004
Lectures
Big Endian and Little Endian: Links
Gulliver's Travels by
Jonathan Swift
Gulliver's Travels by
Jonathan Swift
Gulliver's Travel (1939)
Big Endian, Little
Endian
Big
Endian, Little
Endian from Wikipedia
Binary System Web Resourses
Binary-Decimal-Binary
Converter
ASCII CODE
ASCII TABLE
ASCII Lab Practice
Steganography Lab Practice
- The lab practice instructions were edcrypted in the following
file ForensicsLabPractice.doc.isc
- Save this file to your desktop
- Decrypt the following file that was encrypted with Invisible
Secrets software using AES encryption algorithm. In order to find the
password for decryption you need to decrypt the word RZPEDYBO that was
encrypted by Shuft Cipher with Muptiply 5 and Add 7
- After decryption, you would be able to open the file and read the
message.
- Follow instuctions that you just read to find the treasure.
- You would need to use an additional file picture.bmp to find a
treasure
- Here is the file: picture.bmp
Lab Practice - Preparation for the Lab Assignment
Lab Practice Description
Files for the LAB
data.htm.isc
pic.jpg
Steganography Lab Assignment
ForensicsStegLabAssignmentFall2007.doc
Files for the Lab Assignmen
hidePic.jpg
info.htm.isc
Introduction to Computer Ethics
Introduction to Computer Ethics, text: Ethics
in Information Technology, George Reynolds
Introduction to Computer Ethics: Privacy, text: Ethics
in Information Technology, George Reynolds
Computer Ethics Web
Resourcs
Computer Ethics
and Privacy Issues Test
MD5 and Forensics
MD5 Summary
Files for MD5 practice
ForensicsMD5Lab.doc
forensicsMD5PracticeEncrypted.doc
forensicsMD5practice.doc
forensicsMD5practiceNew.doc
forensics MD5
practice - Monday, Dec 3
Computer Examination Process
forensics MD5
practice - Wed, Dec 5
MD5 Lab Assignment