Course and Reading
Material
Lecture
What is Information? What is Computer?
Decimal
To Binary
History of Computing Links
Intel Innovation in Education- Link1
A History of the
Computer from PBS
Computer History Images
An Illustrated History of Computers
Computer History
Museum Exhibits
The History of Computing by
Michelle A. Hoyle
History of
computing hardware from Wikipedia
History of
Computing, Virginia Montecino Education and Technology Resources
Intel 4004
Lectures
Binary System Web Resources
Binary-Decimal-Binary
Converter
Binary Viewer
Storing Characters and ASCII CODE
Storing Characters - Encoding and Decoding
ASCII TABLE
ASCII Graded Lab
History of Computers Activity and In Class
Presentations: Monday/Wed
- Rachel: Ancient History - 1939
- Veronica: Computers during WWII (briefly mention Enigma). The Women of
Bletchley Park
- Nicole: 1946 - 1986 (only mention ENIAC)
- Erica: Women in Computing contribution, including ENIAC Programmers -
Kathleen McNulty
Mauchly Antonelli, Jean Jennings
Bartik, Frances Snyder Holberton, Marlyn Wescoff Meltzer, Frances Bilas
Spence and Ruth Lichterman Teitelbaum.
- Matthew: 1986 - 2011, including ethical issues that come with the wide use
of
computers
- Zack: History of the Internet, including World Wide Web (WWW),
e-mails, and E-Commerce
- Joe: Pioneer Computer Scientists: (including description of Enigma and
Turing contribution)
- Each student will prepare 4 - 5 Power Point slides with the
summary of
the assigned
historical period - Homework and Monday in class
- Wed - In class presentations
Lecture
Introduction to Computer Forensics
Lectures: Introduction to Criminal Justice
Bureau of Justice Statistics
The Criminal Justice System
Flowchart
Introduction to Criminal Justice
CJS
and the wedding cake model
Nature of the Criminal Law
Crime Data
Sources
Structure and Conduct of Investigations

Links for Criminal Justice Test
Uniform Crime Reporting Statistics -
U.S Department of Justice
Uniform Crime Reports (from FBI
website)
Homework 1
- Read the first document - 2009 Version of the Searching
and Seizing
Computers and Obtaining Electronic Evidence in Criminal Investigations
- Write 3 questions with ANSWERS. Questions will be used for peer assessment. Try to avoid
very specific questions. Try to concentrate on general rules and regulations.
- Send your questions and answers to ykortsarts@mail.widener.edu by 11:00 AM Friday, Sept 9,
2011 (Word file)
- Challenge: Try to find changes and new rules that were introduced in 2009 (compare with
2002
and 1994 versions)
Searching
and Seizing
Computers and Obtaining Electronic Evidence in Criminal Investigations
(New Version 2009)
Old versions
Searching and Seizing Computers and Obtaining Electronic Evidence in
Criminal Investigations (2002)
Computer Crime &
Intellectual Property Section
United States Department of Justice
FEDERAL GUIDELINES
FOR
SEARCHING AND SEIZING COMPUTERS (1994)
Homework 2
The following homework is based on the questions you submitted.
Answer the following questions. You don't need to answer your own
question. In case your question is not included in the homework, you
must to answer ALL questions.
Due Day, Friday, Sept. 16, 2011
Send the Word file with your answers to ykortsarts@mail.widener.edu
Homework Questions
Introduction to Criminal Justice Part 1
Introduction to Criminal Justice Part 2
Introduction to Criminal Justice Part 3
The seven objectives from "The
Challenge of Crime in a Free Society"
that would shape criminal justice for some time.
-
Focus on crime prevention
- Broaden the range of techniques available to deal with offenders.
- Eliminate injustices in the criminal justice system.
- Attract more and better qualified persons to work in the System
- Increase research and development directed toward crime
and administration
- More money to components
- Foster a community approach to crime, criminal justice, and change.
Encryption and Forensics
History of
Cryptography Web Resources
Introduction to Cryptology
Affine
Cipher Web Resources by Marc Renault
Crypto Lab Practice
Steganography and Forensics
Introduction to Steganography
Steganography Web Resources
Articles by Hal
Berghel, Professor and Director of the School of Informatics and Professor
of Computer Science at the University of Nevada, Las Vegas
Niels Provos and Peter
Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security &
Privacy Magazine, May/June
2003.
HUAIQING WANG AND SHUOZHONG WANG, Cyber Warfare: Steganography vs.
Steganalysis, COMMUNICATIONS OF THE ACM October 2004/Vol. 47, No. 10 - See link to the article
on Campus Cruiser
An Overview
Steganography for the Computer Forensics Examiner, Gary C. Kessler
Steganography:
How to Send a Secret Message
By Bryan Clair
Recent News
Steganography:
Hiding Data Within Data
Gary C. Kessler
Steganography and Cyber Terrorism Communications, Dancho Danchev
Steganography Article Summary In Class Presentation
- Each student will read research papers from ACM digital library
or
from other sources related to
the topic of steganography and computer forensics
- Each student will design Power Point presentation that will include
the
following
- Title and Author of the Papers and the Short Summary of the Papers
- Your personal oppinion about the papers.
- 4 questions to assess understanding of the presentation by the peers
- Schedule: Wed - Friday - Reading the Article and and Power Point design
- Monday, Oct 10 - In class presentations
- Send your Power Point to ykortsarts@mail.widener.edu by 11 AM Oct 10,
2011
Additional Steganography Links
MP3Stego
Hide4PGP
Files for the Lab
picture 1
picture 2
Steganography Lab Practice
- The lab practice instructions were decrypted in the following
file ForensicsLabPractice.doc.isc
- Save this file to your desktop
- Decrypt the following file that was encrypted with Invisible
Secrets software using AES encryption algorithm. In order to find the
password for decryption you need to decrypt the word RZPEDYBO that was
encrypted by Shift Cipher with Multiply 5 and Add 7
- After decryption, you would be able to open the file and read the
message.
- Follow instructions that you just read to find the treasure.
- You would need to use an additional file picture.bmp to find a
treasure
- Here is the file: picture.bmp
Lab Practice - Preparation for the Lab Assignment
Lab Practice Description
Files for the LAB
data.htm.isc
pic.jpg
Steganography Lab Assignment
ForensicsStegLabAssignment.doc
MD5 and Forensics
Searching
and Seizing
Computers and Obtaining Electronic Evidence in Criminal Investigations
(New Version 2009)
MD5 and Computer Examination Process Summary
MD5/SHA Lab Assignment
How to use MD5deep/SHAdeep
- START - RUN - CMD - OK
- While in the CMD window, to change to Desktop type:
cd Desktop ENTER
- To see what folders/files on your Desktop, type
dir ENTER
- To run md5deep on the folder you created and all subfolders and files,
type:
md5deep -r CSCI130YOURLASTNAME > resultMD5.rtf ENTER
- Pay attention, file result.rtf will include all md5 sums and it should
be on your Desktop
- To run other HASH functions:
sha1deep -r CSCI130YOURLASTNAME > resultSHA1.rtf ENTER
sha256deep -r CSCI130YOURLASTNAME > resultSHA256.rtf ENTER
Computer Ethics