Integrating Cyber-Forensics into a Forensic Science Masters Programme

Size: px
Start display at page:

Download "Integrating Cyber-Forensics into a Forensic Science Masters Programme"

Transcription

1 Integrating Cyber-Forensics into a Forensic Science Masters Programme Richard E Overill Department of Computer Science, King s College London, Strand, London WC2R 2LS, U.K. richard.overill@kcl.ac.uk Abstract This paper traces the development of the cyber-forensics content of the MSc in Forensic Science at King s College London. It identifies the key interfaces between cyber-forensics and traditional forensic science, and analyses the rationale for the selection and development of the cyber-forensics curriculum within that context. The complementary issue of defining a forensic computing curriculum is also addressed. Finally it attempts to evaluate the extent to which the integration of cyber-forensics into the Forensic Science MSc programme has been successfully accomplished, using anonymized student feedback data and examination statistics collected over a period of more than a decade. 1.0 Introduction and Background In 1987 King s College London (KCL) launched what was at that time the only university programme in Forensic Science in England. Initially it was co-ordinated by the Department of Biochemistry and more recently by the Department of Forensic Science and Drug Monitoring. This modular, interdisciplinary MSc programme is supported by teaching contributions from a wide range of academic departments within KCL, from other institutions within the University of London federation, and from external organisations such as the Metropolitan Police Forensic Science Service. From the outset the Department of Computer Science was invited to contribute to the MSc in Forensic Science and over the past twenty years its contribution has evolved considerably in both content and extent. However, the present author has retained the responsibility for defining, delivering and examining the computing curriculum within the Masters programme throughout its existence. The number of graduate students recruited to the MSc in Forensic Science has varied from an initial 8 in to a maximum of 44 in The Bachelors level background of the student intake is typically the Biological sciences, Biochemistry or Chemistry. As such the students generally possess the basic ICT

2 literacy and competency that would be expected from a modern UK Bachelors programme in science. Whilst the majority of the students are from the UK, mainland EU, Hong Kong, the West Indies, Canada and the USA also feature significantly in the intake statistics. As a modular, interdisciplinary programme the MSc in Forensic Science is divided into topics taught by lecturers possessing the appropriate expertise, and each topic is allocated a number of contact hours appropriate to the intrinsic nature of the topic. Thus, for example, fibres and fingerprints are both allocated 6 contact hours, while computing is currently allocated 7-8 contact hours. The advantage of this arrangement is that, while cyber-forensics is not regarded as an integral part of the discipline of forensic science by the Forensic Science Society [1], the MSc students nevertheless encounter this topic on exactly the same footing as every other topic covered in the taught programme. Exceptionally, a student can also opt to do their individual summer project / dissertation in this area. 2.0 Developing a Cyber-Forensics Curriculum for Forensic Scientists From the outset it was apparent that two distinct themes would compete for the contact time allocated namely forensic computing (FC) and cyber-forensics (CF). To clarify this distinction, in the forensic computing theme students learn how computational techniques support and enhance the day-to-day work of the forensic scientist, while in the cyber-forensics theme students learn how the principles of forensic science are applied to the investigation of digital crimes. Initially, forensic computing was given more emphasis than cyber-forensics (roughly 5/8) due to the relatively under-developed state of cyber-forensics in the late 1980s. However during the mid- to late 1990s both themes were accorded approximately equal weight. At the present time the balance has shifted slightly in favour of cyberforensics (roughly 5/8) due to recent technical advances in the area and the availability of teaching aids such as the EnCase Forensic demonstrators [2]. At this point it may be helpful to outline the main components of each theme as currently delivered:

3 Forensic Computing crime scene reconstruction, specifically the immersive environment Hydra system [3,4] blood spatter analysis, specifically the DelftTech Visual Sensor Fusion 3D Blood Pattern Analysis module [5] facial reconstruction, specifically the 3D graphics systems by Robin Richards and Peter Vanezis [6] computation and matching of biometrics, specifically fingerprints and iris scans using NAFIS [7] and IrisCode [8] respectively construction and matching of offender profiles, specifically the FBI s VICAP [9] and the Home Office CATCHEM [10] systems Cyber-Forensics scoping and freezing the crime scene bit-wise imaging of memory devices searching for unerased data in temp files, swap space, spool areas, slack space, etc scanning for the presence of Trojans, Remote Administration Tools, root-kits, etc checking system logs / audit trails for evidence of malfeasance performing Internet trace-backs via ISP log-files performing cyber-profiling legal issues, specifically the UK Computer Misuse Act (1990) as modified by the Police and Justice Act (2006) 3.0 Cyber-Forensics: Points of Similarity & Difference An important issue to be addressed at this juncture is the interrelationship between cyber-forensics and traditional forensic science topics. Cyber-forensics, in common with forensic science, adheres to the forensic principles of securing the crime scene, gathering, preserving and analysing the evidence, and (if required) presenting the evidence in a court of law as an expert witness. Thus students of forensic science can be expected to be familiar with the concepts of bag-and-tag, chain of custody, admissible evidence, etc. The forensic process is predicated upon Locard s exchange principle, first enunciated by Edmond Locard in 1910, which is usually summarised as every contact involves an exchange of material or every contact leaves a trace [11]. In the case of traditional forensic science the physical exchange process may occur at the atomic, molecular, cellular or macroscopic sample level and its detection is achieved by performing specific analytical physicochemical tests. With cyber-forensics, on the other hand, when the internal state of a digital computer or network is altered by the intervention of an unauthorised agent, be it human, software or hardware, the mathematical-logical tests required to detect and interpret this state change are of an entirely different category.

4 An important question for discussion with forensic science students is whether Locard s exchange principle applies strictly in cyberspace or, conversely, does a cyber-crime potentially constitute the perfect crime? A second issue that frequently arises from such discussions is precisely what constitutes the suspected cyber-crime scene, particularly if, as is commonly the case, the computer system or network under investigation is (either directly or indirectly) connected to the Internet? Springing directly from this consideration is a third issue relating to freezing the cyber-crime scene. It is apparent that quite different procedures must be adopted to preserve evidence at a cyber-crime scene where (a) a computer is found unattended and powered-off, (b) the computer is unattended but powered-on and possibly online, and (c) the computer is attended, powered-on and possibly online. Scenario (a) most closely resembles the crime scene of traditional forensic science, while scenario (b) requires an assessment of the potential for information loss as a result of either abruptly disconnecting the power supply or alternatively shutting down the computer. Scenario (c) leads naturally to a discussion of hot-key data erasure, and thence to the number of data erasure passes required to yield an insignificant probability of data recovery [12]. Another area of similarity between cyber-forensics and traditional forensic science is that of offender profiling. It has been long been recognised that serial criminals tend to develop an individual MO (modus operandi) which can be used to identify and distinguish their crimes from evidence gathered at the crime scene. However Clifford Stoll s use of a simple form of behavioural profiling in 1986 marked the first attempt to apply these principles to the activities of a cyber-criminal (Markus Hess aka Jaeger) leading ultimately to his arrest and conviction [13,14]. Cyberprofiling has subsequently evolved into a relatively sophisticated discipline comparable with traditional offender profiling, as judged by the number of distinct behavioural attributes that are taken into consideration. Typical useful metrics include: which files / directories / databases are searched what keywords / key-phrases are searched for how frequently / other users activity is monitored the elapsed time of a typical online session the number of systems scanned the system / network scanning tools used which backdoors / Trojans / root-kits are exploited 4.0 Analysis and Evaluation Although the MSc in Forensic Science programme was launched in 1987/8 it is unfortunate that complete examination question marking data are available only from 1995/6 onwards and that student assessment scores are available only from 2000/1 onwards. In each academic year (AY) one non-compulsory examination question from the forensic computing / cyber-forensics (FC/CF) themes is set. The number of

5 students electing to answer this question (n), together with the mean (mean), minimum (min) and minimum (max) percentage marks obtained, are given in Table 1 for each academic year, together with the size of the student cohort (size). Over the past decade or more a roughly equal balance has been intentionally maintained between examination questions from the forensic computing and the cyber-forensics themes. The data in Table 1 appear to show that the students answered the cyber-forensics (CF) questions with a slightly higher overall average (50.5%) than the forensic computing (FC) questions (48.5%). This is both somewhat surprising and rather gratifying as forensic scientists might be expected to find some of the technical aspects of CF quite challenging. A remarkable feature of the data is the dramatic fluctuation in the proportion of the student cohort that elected to answer the FC/CF topic question in the successive years (100%) and (0%). This is most plausibly explained as arising from a period of 4 successive years in which a CF question was set, followed by a FC question the next year. The students may have begun to tacitly assume that the FC material was less likely to be examined than the CF material. AY 95/6 96/7 97/8 98/9 99/0 00/1 01/2 02/3 03/4 04/5 05/6 06/7 size n FC/CF FC CF CF CF CF FC CF CF FC FC CF FC mean min max Table 1: Forensic computing / cyber-forensics module examination question results In Table 2 the aggregate student assessment score for the forensic computing and cyber-forensics module is given for each academic year from 2000/1 onwards and is compared with the average score across all modules of the MSc where this data is available. AY 2000/ / / / / / /07 FC/CF 90% 79% 62% 65% 79% 80% 72% overall % 80% 78% Table 2: Forensic computing / cyber-forensics module student assessment scores Although there is a significant year-to-year variation in these scores, it is not unreasonable to conclude that the forensic computing / cyber-forensics syllabus is as well received by the students as the more traditional forensic science material in the Masters programme.

6 5.0 Summary and Conclusions The empirical data appear to support the contention that it is both possible and desirable to introduce cyber-forensics (and forensic computing) into a traditional Forensic Science Masters (or Bachelors) programme. Since the majority of the principles of conventional forensic science translate directly into the cyber-domain students assimilate them without difficulty. Equally they are intrigued by those properties of the cyber-world that necessitate the reformulation of certain traditional forensic science concepts, such as Locard s exchange principle, and scoping and freezing the crime scene. A natural corollary of these empirical findings for cyber-forensics, as well as forensic computing, would be its acceptance as an integral and valued part of mainstream forensic science by the Forensic Science Society in the UK and by the equivalent professional bodies in other countries. Some progress towards this goal is now being made in the EU under the auspices of the ENFSI Forensic Information Technology Expert Working Group [14]. Acknowledgements The author would like to thank the many cyber-forensic colleagues who have offered him advice and encouragement over the past twenty years, particularly Jim Bates, Tony Sammes, Peter Sommer and Edward Wilding. He would also like to acknowledge the support and encouragement of the members of the MSc Forensic Science course team at King s College London, and in particular David Cowan, Barbara Daniel and Terry Gough. References [1] Forensic Science Society: [2] EnCase Forensic: [3] Goodwin C (1995). Simulation at the Yard, IText (IT in Context) 1(3), 4-8. [4] Hydra: [5] DelftTech VSF 3DBPA: [6] Vanezis P, Blowes R W, Linney A D, Tan A C, Richards R and Neave R (1989). Application of 3-D Computer Graphics for facial reconstruction and comparison with sculpting techniques, Forensic Science International 42, [7 NAFIS: [8] IrisCode: [9] VICAP: [10] CATCHEM: [11] Locard:

7 [12] Gutmann P, Secure Deletion of Data from Magnetic and Solid-state Memory, in Proc. Sixth USENIX Security Symp., pp.77-89, San Jose, California, July 1996 [13] Stoll C (1988). Stalking the Wily Hacker, Comm. ACM, 31(5), [14] Stoll C, The Cuckoo s Egg, Pocket Books, 1998, ISBN [15] ENFSI FIT EWG: (URLs were accessed on 18 July 2007)

Development of masters modules in computer forensics and cybercrime for computer science and forensic science students

Development of masters modules in computer forensics and cybercrime for computer science and forensic science students 132 Int. J. Electronic Security and Digital Forensics, Vol. 2, No. 2, 2009 Development of masters modules in computer forensics and cybercrime for computer science and forensic science students Richard

More information

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Forensics in Nuclear Security. by the Netherlands Forensic Institute Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than

More information

1/26/15. Chapter 2 Crime Scene

1/26/15. Chapter 2 Crime Scene Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence

More information

School of Psychology, Social Work and Human Sciences

School of Psychology, Social Work and Human Sciences School of Psychology, Social Work and Human Sciences Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies. : Our courses are based

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

Forensic Chemistry Curriculum

Forensic Chemistry Curriculum SECTION 1 GENERAL STANDARDS. [Excerpt] Standard 4.3.1 General Curriculum Requirements The undergraduate program in forensic science shall offer a coherent curriculum that reflects the mission and goals

More information

LONDON METROPOLITAN UNIVERSITY Course Specification template

LONDON METROPOLITAN UNIVERSITY Course Specification template LONDON METROPOLITAN UNIVERSITY Course Specification template The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for

More information

Programme Specification. MSc/PGDip Forensic and Legal Psychology

Programme Specification. MSc/PGDip Forensic and Legal Psychology Entry Requirements: Programme Specification MSc/PGDip Forensic and Legal Psychology Applicants for the MSc must have a good Honours degree (2:1 or better) in Psychology or a related discipline (e.g. Criminology,

More information

Programme Specification

Programme Specification Programme Specification Title: Forensic Science Final Award: Master of Science (MSc) With Exit Awards at: Master of Science (MSc) Postgraduate Certificate (PG Cert) Postgraduate Diploma (PG Dip) To be

More information

REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ)

REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ) 917 REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ) (See also General Regulations and Regulations for First Degree Curricula) Definitions BCJ 1 In these Regulations, and in the Syllabuses

More information

Helping the police to support people with vulnerabilities

Helping the police to support people with vulnerabilities Helping the police to support people with vulnerabilities Contents Foreword 1 Mental Health Crisis Care Concordat 3 Mental Health Street Triage 4 Liaison and Diversion 5 Multi Agency Working 6 Drugs 7

More information

Georgia Perimeter College Common Course Outline

Georgia Perimeter College Common Course Outline Georgia Perimeter College Common Course Outline Course Abbreviation & Number: FRSC 2100 Course Title: Credit Hours: 3 Prerequisites: Co-requisites: Introduction to Forensic Science Exit or exemption from

More information

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations

More information

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes Professional Accreditation Handbook For Computer Science Programmes Revised by authority of the Accreditation Committee for Computer Science Programmes as of August 2014 CONTENTS 1. FRAMEWORK FOR ACCREDITATION

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10

More information

MSc Forensic Information Technology

MSc Forensic Information Technology MSc Forensic Information Technology Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Introduction to Crime Scene Dynamics

Introduction to Crime Scene Dynamics Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Psychology, Social Work and Human Sciences

Psychology, Social Work and Human Sciences School of Psychology, Social Work and Human Sciences It is my pleasure to welcome you to the School of Psychology, Social Work and Human Sciences. One of the great benefits of the School is that we have

More information

How To Pass A Criminology Course

How To Pass A Criminology Course Programme Specification MSc in Forensic Psychology Entry Requirements: Applicants for this course must have a good Honours degree (2:1 or better) in Psychology that confers Graduate Basis for Registration

More information

How To Become A State Pol Forensic Tech Leader

How To Become A State Pol Forensic Tech Leader JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,

More information

Using Your Pocket Notebook

Using Your Pocket Notebook Using Your Pocket Notebook Introduction Much of a police officer s time is spent gathering facts and evidence that will be used in court to support a criminal prosecution. The pocket notebook is used to

More information

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Information Technology Audit & Forensic Techniques. CMA Amit Kumar Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques

More information

School of Physical and Geographical Sciences

School of Physical and Geographical Sciences School of Physical and Geographical s 1 About Keele Dual or Single Honours Programs Study TWO subjects Beautiful, safe campus Strong sense of community Low cost of living Student Life union, societies,

More information

Forensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007

Forensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007 Forensic Science Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007 Dorothy Harris Forensic Course Developer Science Teacher and Department Chairman

More information

DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES

DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES 122 / Department of Social and Behavioral Sciences DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) The Bachelor of Arts in Criminal Justice is a four-year

More information

Diablo Valley College Catalog 2014-2015

Diablo Valley College Catalog 2014-2015 ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES Program Overview The M.S. in Biomedical Forensic Sciences trains individuals for a variety of disciplines applied to crime scene investigation and evidence analysis. The only program of its kind based

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS. Criminology and Criminal Justice

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS. Criminology and Criminal Justice PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Criminology and Criminal Justice Award MSc School School of Arts and Social Sciences Department or equivalent Department of Sociology

More information

The Government's Drug Strategy

The Government's Drug Strategy Report by the Comptroller and Auditor General HC 297 SesSIon 2009 2010 march 2010 Tackling problem drug use Report by the Comptroller and Auditor General Tackling problem drug use HC 297 Session 2009-2010

More information

Forensic Science. The student will demonstrate the ability to explain the history and philosophy of forensic science.

Forensic Science. The student will demonstrate the ability to explain the history and philosophy of forensic science. Forensic Science UNIT I: Introduction to Forensic Science and Human Body The student will demonstrate the ability to explain the history and philosophy of forensic science. a. Define forensic science or

More information

Independent Guided Study

Independent Guided Study MODULE DESCRIPTOR TITLE Trace Evidence and Law SI MODULE CODE 66-5769-00L CREDITS 20 LEVEL 5 JACS CODE F410 SUBJECT GROUP Biosciences DEPARTMET Biosciences MODULE LEADER Dr Rosalind Wolstenholme MODULE

More information

FORENSIC SCIENCE COURSE DESCRIPTION

FORENSIC SCIENCE COURSE DESCRIPTION FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES

DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) Mission The University strives to endow students with the skills necessary for critical knowledge, communication,

More information

Modalities for Forensic Review of Computer Related Frauds

Modalities for Forensic Review of Computer Related Frauds Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance

More information

The American Academy of Forensic Sciences

The American Academy of Forensic Sciences The American Academy of Forensic Sciences 2012 Forensic Science Educational Conferences For Middle- and High School Science Teachers The American Academy of Forensic Sciences is pleased to present the

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California

More information

Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College

Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College Programme Specification BSc Honours Electronic Engineering (Final Year Programme) Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College SECTION 1: GENERAL INFORMATION

More information

School of Biological & Chemical Sciences

School of Biological & Chemical Sciences School of Biological & Chemical Sciences Programme Specification Programme Leader: Programme Title: Awarding Institution: Teaching Institutions: Duration of Study: Final Award: Programme Code: Relevant

More information

How To Become A Forensic Scientist

How To Become A Forensic Scientist A c a r e e r i n By Hall Dillon Blood spatters, spent shell casings, and forged signatures are the nuts and bolts of forensic science. Studying the messy details of crime, forensic scientists help identify

More information

Dudesville: A crime scene under the microscope. QUT Extreme Science

Dudesville: A crime scene under the microscope. QUT Extreme Science Dudesville: A crime scene under the microscope QUT Extreme Science Glossary QUT Extreme Science DNA Chromatography Forensic Science Locard s Principle (Deoxyribonucleic acid) an extremely long macromolecule

More information

98 Crime scene examination

98 Crime scene examination 98 Crime scene examination by John Horswell Douglas Elliot BSc (Hons), PhD [Updating author, March 2012] 98-1 EXPERT EVIDENCE Author information Douglas Elliot obtained his Bachelor of Science degree in

More information

City University of Hong Kong

City University of Hong Kong City University of Hong Kong Information on a General Education Course offered by Department of Biology and Chemistry with effect from Semester A in 2008 / 2009 Part I Course Title: Course Code: Course

More information

1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY

1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY 3a Programme accredited by: 3b

More information

Introduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS

Introduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS Introduction to Forensic Science Chapter 1: Intro to FS So what is? In its broadest definition, forensic science is the application of science to criminal and civil laws. We will put emphasize on the applications

More information

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.

More information

PARTNERS IN CRIME: Development of a Short-Term StudyAbroad Program in Forensic Science. through Planning, Preparation and People

PARTNERS IN CRIME: Development of a Short-Term StudyAbroad Program in Forensic Science. through Planning, Preparation and People BUTEX 2014 PARTNERS IN CRIME: Development of a Short-Term StudyAbroad Program in Forensic Science through Planning, Preparation and People Sharon Olson Director, Education Abroad California State University,

More information

A Short Introduction to Digital and File System Forensics

A Short Introduction to Digital and File System Forensics Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) antonio.barili@unipv.it Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -

More information

Cert HE, Bioscience Mode of delivery. UEL on campus UCAS code. Health, Sport and Bioscience Date specification last up-dated May 2014

Cert HE, Bioscience Mode of delivery. UEL on campus UCAS code. Health, Sport and Bioscience Date specification last up-dated May 2014 Forensic Science Final award Intermediate awards available BSc (Hons) Forensic Science BSc (Hons) Bioscience Dip HE, Bioscience Cert HE, Bioscience Mode of delivery UEL on campus UCAS code F410 Details

More information

Lecturer/Senior Lecturer in Crime Scenes Investigation

Lecturer/Senior Lecturer in Crime Scenes Investigation Lecturer/Senior Lecturer in Crime Scenes Investigation 1. ORGANISATION CHART Reports to: Head of School (Biology, Chemistry and Forensic Science) Direct reports: N/A 2. CONTACTS Internal Dean

More information

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM Paula Thomas Faculty of Advanced Technology, University of Glamorgan 2 CF37 1DL, Pontypridd pthomas@glam.ac.uk

More information

Forensic Science: Crime Scene Basics. T. Trimpe 2006 http://sciencespot.net

Forensic Science: Crime Scene Basics. T. Trimpe 2006 http://sciencespot.net Forensic Science: Crime Scene Basics T. Trimpe 2006 http://sciencespot.net Crime Scene Vocabulary CRIME SCENE: Any physical location in which a crime has occurred or is suspected of having occurred. PRIMARY

More information

Introduction. IMF Conference September 2008

Introduction. IMF Conference September 2008 Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer

More information

Introductory Problem Solving in Computer Science

Introductory Problem Solving in Computer Science Introductory Problem Solving in Computer Science David J. Barnes, Sally Fincher, Simon Thompson Computing Laboratory, University of Kent at Canterbury, Kent, CT2 7NF, England E-mail: D.J.Barnes@ukc.ac.uk

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Criminology and Criminal Justice Award MSc School School of Arts and Social Sciences Department or equivalent Department of Sociology

More information

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME IN FORENSIC SCIENCE Chapter 1 Article 1.1 Article

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Programme Specification and Curriculum Map: M.Sc. Forensic Psychology

Programme Specification and Curriculum Map: M.Sc. Forensic Psychology Programme Specification and Curriculum Map: M.Sc. Forensic Psychology 1. Programme title Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University 4.

More information

Teaching Institutions: Institute of Education, University of London

Teaching Institutions: Institute of Education, University of London PROGRAMME SPECIFICATION MA Leadership Awarding body: Institute of Education, University of London Teaching Institutions: Institute of Education, University of London Name of final award Master of Arts

More information

Master of Science in Forensics

Master of Science in Forensics Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational

More information

COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description

COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion

More information

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Police Officers who Commit Domestic Violence-Related Criminal Offences 1 PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police

More information

Psychology, Social Work and Human Sciences

Psychology, Social Work and Human Sciences School of, Social Work and Human Sciences UG PG Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies, based at our Brentford site

More information

CSI: Exploring Forensic Science Level 2

CSI: Exploring Forensic Science Level 2 Short Course for June 2014 Contents Page 3 Short courses and Learning Programmes Page 4 Introduction to junior cycle Page 5 Rationale Page 6 Aim Page 7 Links Page 10 Expectations for students 11 Strand

More information

The Netherlands Forensic Institute. Strengthening the rule of law together

The Netherlands Forensic Institute. Strengthening the rule of law together The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.

More information

Digital Forensics. Larry Daniel

Digital Forensics. Larry Daniel Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters

More information

Postgraduate Studies in Health Informatics in Greece

Postgraduate Studies in Health Informatics in Greece 261 Postgraduate Studies in Health Informatics in Greece John Mantas Laboratory of Health Informatics, Faculty of Nursing, University of Athens, Greece Abstract Health informatics is a well established

More information

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis

More information

CLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO

CLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO CLASS TITLE: CRIMINAL INVESTIGATOR II STATE OF COLORADO invites applications for the position of: CBI Forensic Services Crime Scene Analyst, Grand Junction A residency waiver has been granted for this

More information

Key Forensic provides a one-stop service to support the investigation of Major Crime.

Key Forensic provides a one-stop service to support the investigation of Major Crime. Major Crime Service Key Forensic provides a one-stop service to support the investigation of Major Crime. We have Major Incident Teams (MITs) at all of our locations, operating an on-call, 24-7 scene attendance

More information

Engineering Forensics

Engineering Forensics Engineering Forensics Inter-Faculty Bachelor of Forensic Science Forensic science is the study of evidence in criminal investigation for presentation in courts of law. Crime scene artifacts are frequently

More information

Guiding principles of the Netherlands regarding the implementation of the Council conclusions

Guiding principles of the Netherlands regarding the implementation of the Council conclusions Guiding principles of the Netherlands regarding the implementation of the Council conclusions for the realisation of a European Forensic Science Area by 2020. The Netherlands consider the Council conclusions

More information

Criminal Justice II, August 2013, Page 1 of 5

Criminal Justice II, August 2013, Page 1 of 5 Indiana Department of Education Academic Course Framework CRIMINAL JUSTICE II Criminal Justice II introduces students to concepts and practices in controlling traffic as well as forensic investigation

More information

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):

More information

Brain Segmentation A Case study of Biomedical Cloud Computing for Education and Research

Brain Segmentation A Case study of Biomedical Cloud Computing for Education and Research Brain Segmentation A Case study of Biomedical Cloud Computing for Education and Research Victor Chang Leeds Metropolitan University (and University of Southampton) School of Computing and Creative Technologies,

More information

The UK s European university. MSc FORENSIC SCIENCE. Canterbury. Graduate study

The UK s European university. MSc FORENSIC SCIENCE. Canterbury. Graduate study The UK s European university MSc FORENSIC SCIENCE Canterbury Graduate study 2 www.kent.ac.uk/physical-sciences INTRODUCTION The MSc in Forensic Science is an exciting new taught Master s programme which

More information

Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies

Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Proposed Program Forensic Investigations Program Criminal Justice Department Date of Implementation: August

More information

Somers Public Schools Somers, Connecticut 06071 Science Curriculum

Somers Public Schools Somers, Connecticut 06071 Science Curriculum Survey in Forensics Grades 11 and 12 F.1 Teamwork and deductive reasoning play an important role in forensic science. Core Theme: Understanding forensic science. What is forensic science and why are teamwork

More information

MA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL

MA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL Programme Specification MA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL PGCert Artist Teacher PGCert Challenging

More information

Open Source Digital Forensics Tools

Open Source Digital Forensics Tools The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

Large Scale Cloud Forensics

Large Scale Cloud Forensics Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam

More information

PROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice

PROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice PROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice Awarding body: Institute of Education, University of London / City University London Teaching Institutions:

More information

MA Knowledge and Interaction in Online Environments

MA Knowledge and Interaction in Online Environments MA Knowledge and Interaction in Online Environments A new, fully online course for professionals in online education, communication and information to be launched in October 2009 What is this course about?

More information

Monfort College of Business Semester Course Syllabus (2015-2016)

Monfort College of Business Semester Course Syllabus (2015-2016) Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 371 Introduction to Computer Forensics Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 300 or

More information

A LONG-TERM STUDY OF THE OUTCOMES OF DRUG USERS LEAVING TREATMENT SEPTEMBER 2010

A LONG-TERM STUDY OF THE OUTCOMES OF DRUG USERS LEAVING TREATMENT SEPTEMBER 2010 National Treatment Agency for Substance Misuse Long-term results for those who have been treated in one year found that nearly half who leave neither need further treatment nor were found to be involved

More information

Programme Specification and Curriculum Map for BA Criminology (Criminal Justice)

Programme Specification and Curriculum Map for BA Criminology (Criminal Justice) Programme Specification and Curriculum Map for BA Criminology (Criminal Justice) 1. Programme title BA Criminology (Criminal Justice) 2. Awarding institution Middlesex University 3. Teaching institution

More information

AS FORENSIC SCIENCE ACADEMY

AS FORENSIC SCIENCE ACADEMY TE AS FORENSIC SCIENCE ACADEMY TM "BETTER SCIENCE LEADS TO BETTER JUSTICE FOR ALL" I strongly feel the courses offered through the Texas Forensic Science Academy certificate program are a true benefit

More information

EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science

EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science Certificate Description This certificate provides professionals the opportunity to enhance specialized skills in Forensic Science. Arson Investigation CRJS 350 This course will explore criminal and scientific

More information

10128/16 LB/dk 1 DGD 1C

10128/16 LB/dk 1 DGD 1C Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

THE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING

THE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING THE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING Jonathan Crellin School of Computing, University of Portsmouth Buckingham Building Portsmouth, PO1 3HE jonathan.crellin@port.ac.uk http://userweb.port.ac.uk/~crellinj/in

More information