1. Police Technology
Thirteen: Technology in Investigations
Fifteen: Tracking and Surveillance
2. Computer Forensics and Cyber
Eight: Forensic Terminology and Computer Crime
b. Chapter Ten:
Computer Investigations: Pre-Search Activities
c. Chapter Eleven: On-Scene Actvities
Crimes Needs Assessment State and Local Law Enforcement
Institute for Justice, Research Report, March 2001
Computers/Obtaining Electronic Evid in Invest
Department of Justice, Computer Crime and Intellectual Property Section,
a. Part V Evidence.
Cyberstalking: A New Challenge for Law Enforcement and
Rrt from Attorney Gen. to the Vice President
Introduction to Steganography
Rising Tide of Internet Fraud
Department of Justice, Computer Crime
and Intellectual Property Section, 2001
an Internet Hacker
Department of Justice, Computer Crime and
Intellectual Property Section, 2001
Forensics and Cyber Crime.
a. Chapter Nine: Developing Computer Forensic Science Capabilities.
(Note: Assignment due dates are listed on the
1. Go to
Determine the Domain Name owner information
the information to the instructor.
2. Go to
and determine the most three most recent
virus to hit
the Internet. Send the information to the instructor.
3. Throughout the course you have been exposed to terms like hacking, cracking
and phreaking. Conduct an Internet search on those terms.
Find a website that
offers free downloads. Do not download any software of which
you are unsure!
Write a briefing paper, executive summary or
intra-departmental memo. Presume
your audience is the chief executive of your agency. Write an explanation of
those terms and the differences between them; and, what you found on the
Limit your response to one page. Use your agency's format for such
4. Complete a one or
two page executive summary on Steganography. Presume this
briefing is going to be given to the chief executive of your
agency. Use your agency's format for such reports.
enforcement first responders are generalists. They are often the first
respond to situation that will eventually require different types of experts.
example, many patrol officers are the first to arrive at a homicide scene.
first responder is unlikely to follow the investigation through to conclusion,
responsible for tasks like making initial inquiries and protecting the scene.
your career as a law enforcement officer you will receive training and gain
on protecting different types of crime scenes. As with any expertise, it would
the average person a great deal of time to develop (through experience or
work; or a combination of both) the skills necessary to be a computer crime,
computer forensic expert, yet police officers and other law enforcement
likely respond to a multitude of different crimes scenes wherein there is the
potential for digital evidence. For the last assignment in Module Three, think
to the review you did on seizing digital evidence. Now, consider all the
reading and learning in modules two and three. Prepare a one or two page
a half-hour "roll call" or "briefing training." Presume your audience is
patrol officers. What do the first responders need to know about digital
Go to the
Criminal Justice Online forum
and post this
Submit Module Three
Via email by clicking here