Course and Reading Material

Lecture

What is Information? What is Computer?

Decimal To Binary

History of Computing Links


Intel Innovation in Education- Link1
A History of the Computer from PBS
Computer History Images
An Illustrated History of Computers
Computer History Museum Exhibits
The History of Computing by Michelle A. Hoyle
History of computing hardware from Wikipedia
History of Computing, Virginia Montecino Education and Technology Resources
Intel 4004

Lectures

Binary System Web Resources


Binary-Decimal-Binary Converter
Binary Viewer

Storing Characters and ASCII CODE

Storing Characters - Encoding and Decoding
ASCII TABLE
ASCII Graded Lab

History of Computers Activity and In Class Presentations: Monday/Wed

Lecture

Introduction to Computer Forensics

Lectures: Introduction to Criminal Justice

Bureau of Justice Statistics The Criminal Justice System Flowchart

Introduction to Criminal Justice

CJS and the wedding cake model

Nature of the Criminal Law

Crime Data Sources

Structure and Conduct of Investigations

Links for Criminal Justice Test

Uniform Crime Reporting Statistics - U.S Department of Justice

Uniform Crime Reports (from FBI website)


Homework 1

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (New Version 2009)

Old versions

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (2002)

Computer Crime & Intellectual Property Section United States Department of Justice

FEDERAL GUIDELINES FOR SEARCHING AND SEIZING COMPUTERS (1994)




Homework 2
The following homework is based on the questions you submitted. Answer the following questions. You don't need to answer your own question. In case your question is not included in the homework, you must to answer ALL questions.
Due Day, Friday, Sept. 16, 2011
Send the Word file with your answers to ykortsarts@mail.widener.edu


Homework Questions



Introduction to Criminal Justice Part 1

Introduction to Criminal Justice Part 2

Introduction to Criminal Justice Part 3

The seven objectives from "The Challenge of Crime in a Free Society" that would shape criminal justice for some time.

  1. Focus on crime prevention
  2. Broaden the range of techniques available to deal with offenders.
  3. Eliminate injustices in the criminal justice system.
  4. Attract more and better qualified persons to work in the System
  5. Increase research and development directed toward crime and administration
  6. More money to components
  7. Foster a community approach to crime, criminal justice, and change.

Encryption and Forensics


History of Cryptography Web Resources
Introduction to Cryptology
Affine Cipher Web Resources by Marc Renault
Crypto Lab Practice

Steganography and Forensics

Introduction to Steganography

Steganography Web Resources

Articles by Hal Berghel, Professor and Director of the School of Informatics and Professor of Computer Science at the University of Nevada, Las Vegas
Niels Provos and Peter Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security & Privacy Magazine, May/June 2003.
HUAIQING WANG AND SHUOZHONG WANG, Cyber Warfare: Steganography vs. Steganalysis, COMMUNICATIONS OF THE ACM October 2004/Vol. 47, No. 10 - See link to the article on Campus Cruiser
An Overview Steganography for the Computer Forensics Examiner, Gary C. Kessler
Steganography: How to Send a Secret Message By Bryan Clair
Recent News
Steganography: Hiding Data Within Data Gary C. Kessler
Steganography and Cyber Terrorism Communications, Dancho Danchev

Steganography Article Summary In Class Presentation

Additional Steganography Links


MP3Stego
Hide4PGP

Files for the Lab

picture 1
picture 2

Steganography Lab Practice



Lab Practice - Preparation for the Lab Assignment


Lab Practice Description

Files for the LAB


data.htm.isc
pic.jpg

Steganography Lab Assignment


ForensicsStegLabAssignment.doc

Files for the Lab Assignment
hidePic.jpg
info.htm.isc


MD5 and Forensics

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (New Version 2009)
MD5 and Computer Examination Process Summary
MD5/SHA Lab Assignment

How to use MD5deep/SHAdeep

Computer Ethics


Computer Ethics Lab

RSA


RSA.doc
RSA.docx
Andrew Burns Program to Find Multiplicative Inverse