Leadership: Texas Hold 'Em Style
Andrew J. Harvey  More Info

computer crime virus and trojan protection

Home | Computer Repair | Computer Basics | Hi Tech Crime | Digital Evidence | Future Trends | CyberCrime and Schemes | Course Resources | About the Instructor | Computer Crime Books | Site Map | Contact Us


Module Three


Required Readings:


1. Police Technology

    a. Chapter Thirteen: Technology in Investigations

    b. Chapter Fourteen: Wiretaps

    c. Chapter Fifteen: Tracking and Surveillance

2. Computer Forensics and Cyber Crime

    a. Chapter Eight: Forensic Terminology and Computer Crime

    b. Chapter Ten: Computer Investigations: Pre-Search Activities

    c. Chapter Eleven: On-Scene Actvities
Electronic Crimes Needs Assessment State and Local Law Enforcement

    National Institute for Justice, Research Report, March 2001
Searching/Seizing Computers/Obtaining Electronic Evid in Invest

    Department of Justice, Computer Crime and Intellectual Property Section, July

    a. Part V Evidence.

3.  Cyberstalking: A New Challenge for Law Enforcement and Industry
     A Rrt from Attorney Gen. to the Vice President

Introduction to Steganography


Recommended Readings:

The Rising Tide of Internet Fraud  Department of Justice, Computer Crime
    and Intellectual Property Section, 2001
Tracking an Internet Hacker Department of Justice, Computer Crime and
   Intellectual  Property Section, 2001 

3. Computer Forensics and Cyber Crime.

    a. Chapter Nine: Developing Computer Forensic Science Capabilities.

August 1999

(Note: Assignment due dates are listed on the course homepage)


Practical Exercises

1. Go to
http://www.whois.net.  Determine the Domain Name owner information  
www.hitechcj.com. Send the information to the instructor.
2. Go to Symantec Website
 and determine the most three  most recent virus to hit
    the Internet. Send the information to the instructor.
3. Throughout the course you have been exposed to terms like hacking, cracking
    and phreaking.  Conduct an Internet search on those terms. Find a website that
    offers free downloads.  Do not download any software of which you are unsure! 
    Write a briefing paper, executive summary or intra-departmental memo.  Presume

    your audience is the chief executive of your agency.   Write an explanation of

    those terms and the  differences between them; and, what you found on the Internet. 

    Limit your response to one page. Use your agency's format for such reports.

4. Complete a one or two page executive summary on Steganography.  Presume this
    briefing is going to be given to the chief executive of your law enforcement
    agency. Use your agency's format for such reports.

5. Law enforcement first responders are generalists.  They are often the first person to

    respond to situation that will eventually require different types of experts.  As an

    example, many patrol officers are the first to arrive at a homicide scene.  While the

    first responder is unlikely to follow the investigation through to conclusion, they are

    responsible for tasks like making initial inquiries and protecting the scene.  Throughout

    your career as a law enforcement officer you will receive training and gain experience

    on protecting different types of crime scenes. As with any expertise, it would take

    the average person a great deal of time to develop (through experience or course

    work; or a combination of both) the skills necessary to be a computer crime, or

   computer forensic expert, yet police officers and other law enforcement officials

   likely respond to a multitude of different crimes scenes wherein there is the

   potential for digital evidence. For the last assignment in Module Three, think back

   to the review you did on seizing digital evidence.  Now, consider all the additional

   reading and learning in modules two and three. Prepare a one or two page outline of

   a half-hour "roll call" or "briefing training."  Presume your audience is  uniformed

   patrol officers.  What do the first responders need to know about digital evidence?


Participation Assignment


Go to the Criminal Justice Online forum and post this threaded discussion.



Submit Module Three Via email by clicking here

©  2013 High Priority Targeting, Inc.