IT IS ALL ABOUT THE CRIME Unit 7 – Recovering files & Network Forensics CJ 317 - Dr. Joe Ciccone.

Slides:



Advertisements
Similar presentations
Indianapolis, Indiana Offender Notification Meetings.
Advertisements

File Management Chapter 3
Class Name, Instructor Name Date, Semester Chapter 2 The Crime Picture Criminal Justice Today.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
UNCLASSIFIED Implementing the New Definition of Rape in the FBI Uniform Crime Reporting (UCR) Program 1 Mary P. Reese Crime Statistics Management Unit.
Law III Chapter Two: The nature and extent of crime.
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Chapter 10 Recovering Graphics Files Guide to Computer Forensics and Investigations Third Edition.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Format Scandisk Defragmentation Antivirus Compression Software
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Crime Victims: An Introduction to Victimology Seventh Edition
Bureau of Justice Statistics. Conducting Victimization and Community Safety Surveys: Using Web-based Technology U.N. Meeting on Crime Statistics Geneva.
Public affairs and the media Part 1: Crime, law enforcement, courts, obituaries.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
© 2001 Vito & Blankenship. Learning Objectives In this chapter you will learn role of statistical analysis in criminal justice how crime in measured in.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
The Office Procedures and Technology
Chapter 1: Crime in California Georgia Spiropoulos Copyright © 2014 Carolina Academic Press. All rights reserved.
What is FORENSICS? Why do we need Network Forensics?
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Criminal Justice Today Twelfth Edition CHAPTER Criminal Justice Today: An Introductory Text for the 21st Century, 12e Frank Schmalleger Copyright © 2014.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1 Methods of Measuring Crime Uniform Crime Reports Self- Report Surveys Victim Surveys.
Measuring Crime CJ 601 Research Methodology in Criminal Justice Dr. Louis Veneziano.
Chapter 2 Adapted from: Frank Schmalleger’s CRIMINAL JUSTICE TODAY, 9E.PRENTICE HALL, Education Inc. ©2007 Pearson Education, Inc.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Copyright © 2012 Carolina Academic Press Chapter 1: Crime in California Georgia Spiropoulos.
Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep
The Crime Picture Welcome to Unit 2!!!! Welcome to Unit 2!!!!
CJ210: Unit 3 Obtaining Information. Follow Up: Unit 2 Mishandling of evidence; intentional and mistake Consequences Criminal charges & disciplinary action.
UNIT THREE SEMINAR: Narrow Your Topic and Make Your Point! CM103: Effective Writing I for Criminal Justice Majors Welcome to seminar! We will begin at.
Criminal Investigation: An Overview
Public affairs and the media Part 2: Crime, law enforcement, courts, obituaries.
Internet Safety Internet Safety LPM
IT IS ALL ABOUT THE CRIME UCR/NIBRS/NCVS Dr. Joe Ciccone.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
CJ 317 – Computer Forensics
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Aim: How much crime is there in the United States?
CJ 102 Unit 2. Primary Sources of Crime Data Uniform Crime Reports (UCR) National Incident-Based Reporting System (NIBRS) National Crime Victimization.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
© 2015 Cengage Learning Chapter 3 Defining and Measuring Crime Chapter 3 Defining and Measuring Crime © 2015 Cengage Learning.
CJ 102 Criminology. Chapter Two: The Nature and Extent of Crime.
UNIT THREE SEMINAR: Narrow Your Topic and Make Your Point! CM103: Effective Writing I for Criminal Justice Majors Welcome to seminar! We will begin at.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Criminal Justice Today CHAPTER 2 Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights.
Chapter 3 Juvenile Crime, Criminals, and Victims Copyright © 2011 by The McGraw-Hill Companies, Inc. All Rights Reserved.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
How do we know when crime is “up” or “down?”
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Introduction to Computer Forensics
Chapter 2 The Incidence of Crime
Methods of Measuring Crime
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Presentation transcript:

IT IS ALL ABOUT THE CRIME Unit 7 – Recovering files & Network Forensics CJ Dr. Joe Ciccone

Last Week & FERPA How to locate and recover graphic files How to identify unknown file formats The types of data compression The standard procedures for performing a live acquisition The standard procedures for network forensics

Key Terms & Places Carving: The process of recovering file fragments that are scattered across a disk. See also salvaging. Lossless Compression: A compression method in which no data is lost. With this type of compression, a large file can be compressed to take up less space and then uncompressed without any loss of information. Loss Compression: A compression method that permanently discards bits of information in a file. The removed bits of information reduce image quality. Defense in Depth (DiD): The NSA’s approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations. Network Forensics: The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.

UCR Links – Federal Law Enforcement 2008 Report Crime Clock - Crime Map Crime ClockCrime Map k.html k.html Violent Crime – 23 second Property Crime – 3 second

National Incident-Based Reporting System (NIBRS) – Crp. Mike Roberts Consists of individual incident records for the 8 Index crimes and 38 other offenses with details on  Offense  Victim  Offender  Property Records each offense occurring in incident Distinguishes between attempted and completed crimes Expands burglary hotel rule to include rental storage facilities Records rape of males and females Restructures definition of assault Collects weapon information for all violent offenses Provides details on arrests for the 8 Index crimes and 49 other offenses.

Link- Papers Rules for Writers, 6th ed. Hacker, D. (2008). Rules for writers (6th ed.). Boston, MA: Bedford/St. Martin's Press. Plagiarism Policy Kaplan University considers academic honesty to be one of its highest values. Students are expected to be the sole authors of their work. Use of another person’s work or ideas must be accompanied by specific citations and references.

Unit 7 Projects Case Project 10-3: You are investigating a case involving an employee who is allegedly sending inappropriate photos via in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk drive, you will find a file named orkty.zip, which you suspect is a graphic file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation.

Case Part II & Name that Criminal You work for a mid-sized corporation known for its inventions that does a lot of copyright and patent work. You are investigating an employee suspected of selling and distributing animations created for your corporation. During your investigations of the suspect’s drive, you find some files with an unfamiliar extension of “.cde.” The network administrator mentions that other “.cde” files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for “.cde” files.

Crime and Change~What will happen tomorrow?

Times are Changing ! In this unit, you got a feel for how quickly things are changing and how important procedures are in dealing with the new challenges. Network forensics and live acquisitions are just the tip of the iceburg. Data carving and steganalysis are procedures that take time and care to perform. And they are not exact sciences. In many cases you will get false positives.

Thank you for all of your work this term! Changes in Tech Crime Problems & Questions from you? THANK YOU Have a great week Check your Grade book