Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317

Similar presentations


Presentation on theme: "Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317"— Presentation transcript:

1 Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317
The WilD wild west – Week 8 and Only one more to go!

2 Last Week Data Recovery and Investigations – How this could have been avoided? Who am I? Sharing Information vs. Confidentiality Any Last Minute Issue One More Seminar to Go

3 Cell Phone & Mobile Device Forensics
Communication risks and issues for police officer What challenges to official communications have in the world of forensics? How can our own tools be used again us (police)?

4 Key Terms – Unit 8 Enhanced Simple Mail Transport Protocol (ESMTP): An enhancement of SMTP for sending and receiving messages. ESMTP generates a unique, nonrepeatable number that’s added to a transmitted . No two messages transmitted from an server have the same ESMTP value. See also Simple Mail Transfer Protocol (SMTP). Phishing: A type of scam that’s typically sent as spam soliciting personal identity information that fraudsters can use for identity theft. Spoofing: Transmitting an message with its header information altered so that its point of origin appears to be from a different sender. Spoofed s are also referred to as forged . Spoofing is typically used in phishing and spamming to hide the sender’s identity. Global System for Mobile Communications (GSM): A second-generation cellular network standard; currently the most popular cellular network type in the world. Subscriber Identity Module (SIM) card: A removable card in GSM phones that contains information for identifying the phone’s subscriber. It might also store other information, such as messages and call history.

5 Cybercrime – how dangerous is it?
tampering is a serious offense and can result in court battles and much more. Munshani v. Signal Lake Venture Capital Fund Terrorizing as this one  Where is this? What happened here?

6 What would we do with their cell-phones?
Issues with cell phones Criminal Use Victim Use Witnesses to crimes Who are the Victims? Type of PC Crime? Can we take a life? How can we stop it? Who are we 

7 Project – Case 12-1 (2 page Report)
You receive a call from a high school student named Marco, who claims he has just received an from another student threatening to commit suicide. Marco is not sure where the student sent the from. Write a brief report on how you would proceed, including what you should do first in this situation.

8 Project Part II – COMBINE both
A mother calls you to report that her 15 year-old daughter has run away from home. She has access to her daughters’ account and says that her daughter has several s in her inbox suggesting that she has run away to be with a 35 year old woman. Write a brief report on how you should proceed.

9 Almost done - YOUR Questions
ALL LATE WORK DUE THIS WEEK! Questions and Comments Grade book review Suggestions for the FINAL Seminar Next Week LAST seminar Week 10 – NO seminar


Download ppt "Unit 8 – & Cell Phones Dr. Joe Ciccone – CJ 317"

Similar presentations


Ads by Google