Integrating Cyber-Forensics into a Forensic Science Masters Programme
|
|
- Erin Dean
- 8 years ago
- Views:
Transcription
1 Integrating Cyber-Forensics into a Forensic Science Masters Programme Richard E Overill Department of Computer Science, King s College London, Strand, London WC2R 2LS, U.K. richard.overill@kcl.ac.uk Abstract This paper traces the development of the cyber-forensics content of the MSc in Forensic Science at King s College London. It identifies the key interfaces between cyber-forensics and traditional forensic science, and analyses the rationale for the selection and development of the cyber-forensics curriculum within that context. The complementary issue of defining a forensic computing curriculum is also addressed. Finally it attempts to evaluate the extent to which the integration of cyber-forensics into the Forensic Science MSc programme has been successfully accomplished, using anonymized student feedback data and examination statistics collected over a period of more than a decade. 1.0 Introduction and Background In 1987 King s College London (KCL) launched what was at that time the only university programme in Forensic Science in England. Initially it was co-ordinated by the Department of Biochemistry and more recently by the Department of Forensic Science and Drug Monitoring. This modular, interdisciplinary MSc programme is supported by teaching contributions from a wide range of academic departments within KCL, from other institutions within the University of London federation, and from external organisations such as the Metropolitan Police Forensic Science Service. From the outset the Department of Computer Science was invited to contribute to the MSc in Forensic Science and over the past twenty years its contribution has evolved considerably in both content and extent. However, the present author has retained the responsibility for defining, delivering and examining the computing curriculum within the Masters programme throughout its existence. The number of graduate students recruited to the MSc in Forensic Science has varied from an initial 8 in to a maximum of 44 in The Bachelors level background of the student intake is typically the Biological sciences, Biochemistry or Chemistry. As such the students generally possess the basic ICT
2 literacy and competency that would be expected from a modern UK Bachelors programme in science. Whilst the majority of the students are from the UK, mainland EU, Hong Kong, the West Indies, Canada and the USA also feature significantly in the intake statistics. As a modular, interdisciplinary programme the MSc in Forensic Science is divided into topics taught by lecturers possessing the appropriate expertise, and each topic is allocated a number of contact hours appropriate to the intrinsic nature of the topic. Thus, for example, fibres and fingerprints are both allocated 6 contact hours, while computing is currently allocated 7-8 contact hours. The advantage of this arrangement is that, while cyber-forensics is not regarded as an integral part of the discipline of forensic science by the Forensic Science Society [1], the MSc students nevertheless encounter this topic on exactly the same footing as every other topic covered in the taught programme. Exceptionally, a student can also opt to do their individual summer project / dissertation in this area. 2.0 Developing a Cyber-Forensics Curriculum for Forensic Scientists From the outset it was apparent that two distinct themes would compete for the contact time allocated namely forensic computing (FC) and cyber-forensics (CF). To clarify this distinction, in the forensic computing theme students learn how computational techniques support and enhance the day-to-day work of the forensic scientist, while in the cyber-forensics theme students learn how the principles of forensic science are applied to the investigation of digital crimes. Initially, forensic computing was given more emphasis than cyber-forensics (roughly 5/8) due to the relatively under-developed state of cyber-forensics in the late 1980s. However during the mid- to late 1990s both themes were accorded approximately equal weight. At the present time the balance has shifted slightly in favour of cyberforensics (roughly 5/8) due to recent technical advances in the area and the availability of teaching aids such as the EnCase Forensic demonstrators [2]. At this point it may be helpful to outline the main components of each theme as currently delivered:
3 Forensic Computing crime scene reconstruction, specifically the immersive environment Hydra system [3,4] blood spatter analysis, specifically the DelftTech Visual Sensor Fusion 3D Blood Pattern Analysis module [5] facial reconstruction, specifically the 3D graphics systems by Robin Richards and Peter Vanezis [6] computation and matching of biometrics, specifically fingerprints and iris scans using NAFIS [7] and IrisCode [8] respectively construction and matching of offender profiles, specifically the FBI s VICAP [9] and the Home Office CATCHEM [10] systems Cyber-Forensics scoping and freezing the crime scene bit-wise imaging of memory devices searching for unerased data in temp files, swap space, spool areas, slack space, etc scanning for the presence of Trojans, Remote Administration Tools, root-kits, etc checking system logs / audit trails for evidence of malfeasance performing Internet trace-backs via ISP log-files performing cyber-profiling legal issues, specifically the UK Computer Misuse Act (1990) as modified by the Police and Justice Act (2006) 3.0 Cyber-Forensics: Points of Similarity & Difference An important issue to be addressed at this juncture is the interrelationship between cyber-forensics and traditional forensic science topics. Cyber-forensics, in common with forensic science, adheres to the forensic principles of securing the crime scene, gathering, preserving and analysing the evidence, and (if required) presenting the evidence in a court of law as an expert witness. Thus students of forensic science can be expected to be familiar with the concepts of bag-and-tag, chain of custody, admissible evidence, etc. The forensic process is predicated upon Locard s exchange principle, first enunciated by Edmond Locard in 1910, which is usually summarised as every contact involves an exchange of material or every contact leaves a trace [11]. In the case of traditional forensic science the physical exchange process may occur at the atomic, molecular, cellular or macroscopic sample level and its detection is achieved by performing specific analytical physicochemical tests. With cyber-forensics, on the other hand, when the internal state of a digital computer or network is altered by the intervention of an unauthorised agent, be it human, software or hardware, the mathematical-logical tests required to detect and interpret this state change are of an entirely different category.
4 An important question for discussion with forensic science students is whether Locard s exchange principle applies strictly in cyberspace or, conversely, does a cyber-crime potentially constitute the perfect crime? A second issue that frequently arises from such discussions is precisely what constitutes the suspected cyber-crime scene, particularly if, as is commonly the case, the computer system or network under investigation is (either directly or indirectly) connected to the Internet? Springing directly from this consideration is a third issue relating to freezing the cyber-crime scene. It is apparent that quite different procedures must be adopted to preserve evidence at a cyber-crime scene where (a) a computer is found unattended and powered-off, (b) the computer is unattended but powered-on and possibly online, and (c) the computer is attended, powered-on and possibly online. Scenario (a) most closely resembles the crime scene of traditional forensic science, while scenario (b) requires an assessment of the potential for information loss as a result of either abruptly disconnecting the power supply or alternatively shutting down the computer. Scenario (c) leads naturally to a discussion of hot-key data erasure, and thence to the number of data erasure passes required to yield an insignificant probability of data recovery [12]. Another area of similarity between cyber-forensics and traditional forensic science is that of offender profiling. It has been long been recognised that serial criminals tend to develop an individual MO (modus operandi) which can be used to identify and distinguish their crimes from evidence gathered at the crime scene. However Clifford Stoll s use of a simple form of behavioural profiling in 1986 marked the first attempt to apply these principles to the activities of a cyber-criminal (Markus Hess aka Jaeger) leading ultimately to his arrest and conviction [13,14]. Cyberprofiling has subsequently evolved into a relatively sophisticated discipline comparable with traditional offender profiling, as judged by the number of distinct behavioural attributes that are taken into consideration. Typical useful metrics include: which files / directories / databases are searched what keywords / key-phrases are searched for how frequently / other users activity is monitored the elapsed time of a typical online session the number of systems scanned the system / network scanning tools used which backdoors / Trojans / root-kits are exploited 4.0 Analysis and Evaluation Although the MSc in Forensic Science programme was launched in 1987/8 it is unfortunate that complete examination question marking data are available only from 1995/6 onwards and that student assessment scores are available only from 2000/1 onwards. In each academic year (AY) one non-compulsory examination question from the forensic computing / cyber-forensics (FC/CF) themes is set. The number of
5 students electing to answer this question (n), together with the mean (mean), minimum (min) and minimum (max) percentage marks obtained, are given in Table 1 for each academic year, together with the size of the student cohort (size). Over the past decade or more a roughly equal balance has been intentionally maintained between examination questions from the forensic computing and the cyber-forensics themes. The data in Table 1 appear to show that the students answered the cyber-forensics (CF) questions with a slightly higher overall average (50.5%) than the forensic computing (FC) questions (48.5%). This is both somewhat surprising and rather gratifying as forensic scientists might be expected to find some of the technical aspects of CF quite challenging. A remarkable feature of the data is the dramatic fluctuation in the proportion of the student cohort that elected to answer the FC/CF topic question in the successive years (100%) and (0%). This is most plausibly explained as arising from a period of 4 successive years in which a CF question was set, followed by a FC question the next year. The students may have begun to tacitly assume that the FC material was less likely to be examined than the CF material. AY 95/6 96/7 97/8 98/9 99/0 00/1 01/2 02/3 03/4 04/5 05/6 06/7 size n FC/CF FC CF CF CF CF FC CF CF FC FC CF FC mean min max Table 1: Forensic computing / cyber-forensics module examination question results In Table 2 the aggregate student assessment score for the forensic computing and cyber-forensics module is given for each academic year from 2000/1 onwards and is compared with the average score across all modules of the MSc where this data is available. AY 2000/ / / / / / /07 FC/CF 90% 79% 62% 65% 79% 80% 72% overall % 80% 78% Table 2: Forensic computing / cyber-forensics module student assessment scores Although there is a significant year-to-year variation in these scores, it is not unreasonable to conclude that the forensic computing / cyber-forensics syllabus is as well received by the students as the more traditional forensic science material in the Masters programme.
6 5.0 Summary and Conclusions The empirical data appear to support the contention that it is both possible and desirable to introduce cyber-forensics (and forensic computing) into a traditional Forensic Science Masters (or Bachelors) programme. Since the majority of the principles of conventional forensic science translate directly into the cyber-domain students assimilate them without difficulty. Equally they are intrigued by those properties of the cyber-world that necessitate the reformulation of certain traditional forensic science concepts, such as Locard s exchange principle, and scoping and freezing the crime scene. A natural corollary of these empirical findings for cyber-forensics, as well as forensic computing, would be its acceptance as an integral and valued part of mainstream forensic science by the Forensic Science Society in the UK and by the equivalent professional bodies in other countries. Some progress towards this goal is now being made in the EU under the auspices of the ENFSI Forensic Information Technology Expert Working Group [14]. Acknowledgements The author would like to thank the many cyber-forensic colleagues who have offered him advice and encouragement over the past twenty years, particularly Jim Bates, Tony Sammes, Peter Sommer and Edward Wilding. He would also like to acknowledge the support and encouragement of the members of the MSc Forensic Science course team at King s College London, and in particular David Cowan, Barbara Daniel and Terry Gough. References [1] Forensic Science Society: [2] EnCase Forensic: [3] Goodwin C (1995). Simulation at the Yard, IText (IT in Context) 1(3), 4-8. [4] Hydra: [5] DelftTech VSF 3DBPA: [6] Vanezis P, Blowes R W, Linney A D, Tan A C, Richards R and Neave R (1989). Application of 3-D Computer Graphics for facial reconstruction and comparison with sculpting techniques, Forensic Science International 42, [7 NAFIS: [8] IrisCode: [9] VICAP: [10] CATCHEM: [11] Locard:
7 [12] Gutmann P, Secure Deletion of Data from Magnetic and Solid-state Memory, in Proc. Sixth USENIX Security Symp., pp.77-89, San Jose, California, July 1996 [13] Stoll C (1988). Stalking the Wily Hacker, Comm. ACM, 31(5), [14] Stoll C, The Cuckoo s Egg, Pocket Books, 1998, ISBN [15] ENFSI FIT EWG: (URLs were accessed on 18 July 2007)
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students
132 Int. J. Electronic Security and Digital Forensics, Vol. 2, No. 2, 2009 Development of masters modules in computer forensics and cybercrime for computer science and forensic science students Richard
More informationForensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
More information1/26/15. Chapter 2 Crime Scene
Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence
More informationSchool of Psychology, Social Work and Human Sciences
School of Psychology, Social Work and Human Sciences Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies. : Our courses are based
More informationDIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
More informationForensic Chemistry Curriculum
SECTION 1 GENERAL STANDARDS. [Excerpt] Standard 4.3.1 General Curriculum Requirements The undergraduate program in forensic science shall offer a coherent curriculum that reflects the mission and goals
More informationLONDON METROPOLITAN UNIVERSITY Course Specification template
LONDON METROPOLITAN UNIVERSITY Course Specification template The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for
More informationProgramme Specification. MSc/PGDip Forensic and Legal Psychology
Entry Requirements: Programme Specification MSc/PGDip Forensic and Legal Psychology Applicants for the MSc must have a good Honours degree (2:1 or better) in Psychology or a related discipline (e.g. Criminology,
More informationProgramme Specification
Programme Specification Title: Forensic Science Final Award: Master of Science (MSc) With Exit Awards at: Master of Science (MSc) Postgraduate Certificate (PG Cert) Postgraduate Diploma (PG Dip) To be
More informationREGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ)
917 REGULATIONS FOR THE DEGREE OF BACHELOR OF CRIMINAL JUSTICE (BCJ) (See also General Regulations and Regulations for First Degree Curricula) Definitions BCJ 1 In these Regulations, and in the Syllabuses
More informationHelping the police to support people with vulnerabilities
Helping the police to support people with vulnerabilities Contents Foreword 1 Mental Health Crisis Care Concordat 3 Mental Health Street Triage 4 Liaison and Diversion 5 Multi Agency Working 6 Drugs 7
More informationGeorgia Perimeter College Common Course Outline
Georgia Perimeter College Common Course Outline Course Abbreviation & Number: FRSC 2100 Course Title: Credit Hours: 3 Prerequisites: Co-requisites: Introduction to Forensic Science Exit or exemption from
More informationThe Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
More informationRESTRICTED. Professional Accreditation Handbook For Computer Science Programmes
Professional Accreditation Handbook For Computer Science Programmes Revised by authority of the Accreditation Committee for Computer Science Programmes as of August 2014 CONTENTS 1. FRAMEWORK FOR ACCREDITATION
More informationKnowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
More informationREGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM])
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM]) (See also General Regulations) Any publication based on work approved for a higher degree should contain
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
More informationMSc Forensic Information Technology
MSc Forensic Information Technology Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
More informationIntroduction to Crime Scene Dynamics
Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation
More informationMSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
More informationPsychology, Social Work and Human Sciences
School of Psychology, Social Work and Human Sciences It is my pleasure to welcome you to the School of Psychology, Social Work and Human Sciences. One of the great benefits of the School is that we have
More informationHow To Pass A Criminology Course
Programme Specification MSc in Forensic Psychology Entry Requirements: Applicants for this course must have a good Honours degree (2:1 or better) in Psychology that confers Graduate Basis for Registration
More informationHow To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
More informationUsing Your Pocket Notebook
Using Your Pocket Notebook Introduction Much of a police officer s time is spent gathering facts and evidence that will be used in court to support a criminal prosecution. The pocket notebook is used to
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationSchool of Physical and Geographical Sciences
School of Physical and Geographical s 1 About Keele Dual or Single Honours Programs Study TWO subjects Beautiful, safe campus Strong sense of community Low cost of living Student Life union, societies,
More informationForensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007
Forensic Science Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007 Dorothy Harris Forensic Course Developer Science Teacher and Department Chairman
More informationDEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
122 / Department of Social and Behavioral Sciences DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) The Bachelor of Arts in Criminal Justice is a four-year
More informationDiablo Valley College Catalog 2014-2015
ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,
More informationOverview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
More informationMASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES
Program Overview The M.S. in Biomedical Forensic Sciences trains individuals for a variety of disciplines applied to crime scene investigation and evidence analysis. The only program of its kind based
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS. Criminology and Criminal Justice
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Criminology and Criminal Justice Award MSc School School of Arts and Social Sciences Department or equivalent Department of Sociology
More informationThe Government's Drug Strategy
Report by the Comptroller and Auditor General HC 297 SesSIon 2009 2010 march 2010 Tackling problem drug use Report by the Comptroller and Auditor General Tackling problem drug use HC 297 Session 2009-2010
More informationForensic Science. The student will demonstrate the ability to explain the history and philosophy of forensic science.
Forensic Science UNIT I: Introduction to Forensic Science and Human Body The student will demonstrate the ability to explain the history and philosophy of forensic science. a. Define forensic science or
More informationIndependent Guided Study
MODULE DESCRIPTOR TITLE Trace Evidence and Law SI MODULE CODE 66-5769-00L CREDITS 20 LEVEL 5 JACS CODE F410 SUBJECT GROUP Biosciences DEPARTMET Biosciences MODULE LEADER Dr Rosalind Wolstenholme MODULE
More informationFORENSIC SCIENCE COURSE DESCRIPTION
FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on
More informationBOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:
BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime
More informationDEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) Mission The University strives to endow students with the skills necessary for critical knowledge, communication,
More informationModalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
More informationThe American Academy of Forensic Sciences
The American Academy of Forensic Sciences 2012 Forensic Science Educational Conferences For Middle- and High School Science Teachers The American Academy of Forensic Sciences is pleased to present the
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic
More informationTo Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California
More informationValid from: September 2016 Faculty of Technology Design & Environment/ Solihull College
Programme Specification BSc Honours Electronic Engineering (Final Year Programme) Valid from: September 2016 Faculty of Technology Design & Environment/ Solihull College SECTION 1: GENERAL INFORMATION
More informationSchool of Biological & Chemical Sciences
School of Biological & Chemical Sciences Programme Specification Programme Leader: Programme Title: Awarding Institution: Teaching Institutions: Duration of Study: Final Award: Programme Code: Relevant
More informationHow To Become A Forensic Scientist
A c a r e e r i n By Hall Dillon Blood spatters, spent shell casings, and forged signatures are the nuts and bolts of forensic science. Studying the messy details of crime, forensic scientists help identify
More informationDudesville: A crime scene under the microscope. QUT Extreme Science
Dudesville: A crime scene under the microscope QUT Extreme Science Glossary QUT Extreme Science DNA Chromatography Forensic Science Locard s Principle (Deoxyribonucleic acid) an extremely long macromolecule
More information98 Crime scene examination
98 Crime scene examination by John Horswell Douglas Elliot BSc (Hons), PhD [Updating author, March 2012] 98-1 EXPERT EVIDENCE Author information Douglas Elliot obtained his Bachelor of Science degree in
More informationCity University of Hong Kong
City University of Hong Kong Information on a General Education Course offered by Department of Biology and Chemistry with effect from Semester A in 2008 / 2009 Part I Course Title: Course Code: Course
More information1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY
PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY 3a Programme accredited by: 3b
More informationIntroduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS
Introduction to Forensic Science Chapter 1: Intro to FS So what is? In its broadest definition, forensic science is the application of science to criminal and civil laws. We will put emphasize on the applications
More informationCONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
More informationPARTNERS IN CRIME: Development of a Short-Term StudyAbroad Program in Forensic Science. through Planning, Preparation and People
BUTEX 2014 PARTNERS IN CRIME: Development of a Short-Term StudyAbroad Program in Forensic Science through Planning, Preparation and People Sharon Olson Director, Education Abroad California State University,
More informationA Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) antonio.barili@unipv.it Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
More informationCert HE, Bioscience Mode of delivery. UEL on campus UCAS code. Health, Sport and Bioscience Date specification last up-dated May 2014
Forensic Science Final award Intermediate awards available BSc (Hons) Forensic Science BSc (Hons) Bioscience Dip HE, Bioscience Cert HE, Bioscience Mode of delivery UEL on campus UCAS code F410 Details
More informationLecturer/Senior Lecturer in Crime Scenes Investigation
Lecturer/Senior Lecturer in Crime Scenes Investigation 1. ORGANISATION CHART Reports to: Head of School (Biology, Chemistry and Forensic Science) Direct reports: N/A 2. CONTACTS Internal Dean
More informationAN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM
AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM Paula Thomas Faculty of Advanced Technology, University of Glamorgan 2 CF37 1DL, Pontypridd pthomas@glam.ac.uk
More informationForensic Science: Crime Scene Basics. T. Trimpe 2006 http://sciencespot.net
Forensic Science: Crime Scene Basics T. Trimpe 2006 http://sciencespot.net Crime Scene Vocabulary CRIME SCENE: Any physical location in which a crime has occurred or is suspected of having occurred. PRIMARY
More informationIntroduction. IMF Conference September 2008
Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer
More informationIntroductory Problem Solving in Computer Science
Introductory Problem Solving in Computer Science David J. Barnes, Sally Fincher, Simon Thompson Computing Laboratory, University of Kent at Canterbury, Kent, CT2 7NF, England E-mail: D.J.Barnes@ukc.ac.uk
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Criminology and Criminal Justice Award MSc School School of Arts and Social Sciences Department or equivalent Department of Sociology
More informationTEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE
UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME IN FORENSIC SCIENCE Chapter 1 Article 1.1 Article
More informationICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
More informationProgramme Specification and Curriculum Map: M.Sc. Forensic Psychology
Programme Specification and Curriculum Map: M.Sc. Forensic Psychology 1. Programme title Forensic Psychology 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University 4.
More informationTeaching Institutions: Institute of Education, University of London
PROGRAMME SPECIFICATION MA Leadership Awarding body: Institute of Education, University of London Teaching Institutions: Institute of Education, University of London Name of final award Master of Arts
More informationMaster of Science in Forensics
Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational
More informationCOMMUNITY UNIT SCHOOL DISTRICT 200. Course Description
Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion
More informationPolice Officers who Commit Domestic Violence-Related Criminal Offences 1
PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police
More informationPsychology, Social Work and Human Sciences
School of, Social Work and Human Sciences UG PG Our courses provide our students with an exciting and diverse education in scientific discovery and social and health studies, based at our Brentford site
More informationCSI: Exploring Forensic Science Level 2
Short Course for June 2014 Contents Page 3 Short courses and Learning Programmes Page 4 Introduction to junior cycle Page 5 Rationale Page 6 Aim Page 7 Links Page 10 Expectations for students 11 Strand
More informationThe Netherlands Forensic Institute. Strengthening the rule of law together
The Netherlands Forensic Institute Strengthening the rule of law together The Netherlands Forensic Institute The Netherlands Forensic Institute (NFI) is one of the world s leading forensic laboratories.
More informationDigital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
More informationPostgraduate Studies in Health Informatics in Greece
261 Postgraduate Studies in Health Informatics in Greece John Mantas Laboratory of Health Informatics, Faculty of Nursing, University of Athens, Greece Abstract Health informatics is a well established
More informationDigital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
More informationCLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO
CLASS TITLE: CRIMINAL INVESTIGATOR II STATE OF COLORADO invites applications for the position of: CBI Forensic Services Crime Scene Analyst, Grand Junction A residency waiver has been granted for this
More informationKey Forensic provides a one-stop service to support the investigation of Major Crime.
Major Crime Service Key Forensic provides a one-stop service to support the investigation of Major Crime. We have Major Incident Teams (MITs) at all of our locations, operating an on-call, 24-7 scene attendance
More informationEngineering Forensics
Engineering Forensics Inter-Faculty Bachelor of Forensic Science Forensic science is the study of evidence in criminal investigation for presentation in courts of law. Crime scene artifacts are frequently
More informationGuiding principles of the Netherlands regarding the implementation of the Council conclusions
Guiding principles of the Netherlands regarding the implementation of the Council conclusions for the realisation of a European Forensic Science Area by 2020. The Netherlands consider the Council conclusions
More informationCriminal Justice II, August 2013, Page 1 of 5
Indiana Department of Education Academic Course Framework CRIMINAL JUSTICE II Criminal Justice II introduces students to concepts and practices in controlling traffic as well as forensic investigation
More informationPREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
More informationBrain Segmentation A Case study of Biomedical Cloud Computing for Education and Research
Brain Segmentation A Case study of Biomedical Cloud Computing for Education and Research Victor Chang Leeds Metropolitan University (and University of Southampton) School of Computing and Creative Technologies,
More informationThe UK s European university. MSc FORENSIC SCIENCE. Canterbury. Graduate study
The UK s European university MSc FORENSIC SCIENCE Canterbury Graduate study 2 www.kent.ac.uk/physical-sciences INTRODUCTION The MSc in Forensic Science is an exciting new taught Master s programme which
More informationWashburn University School of Applied Studies Department of Criminal Justice and Legal Studies
Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Proposed Program Forensic Investigations Program Criminal Justice Department Date of Implementation: August
More informationSomers Public Schools Somers, Connecticut 06071 Science Curriculum
Survey in Forensics Grades 11 and 12 F.1 Teamwork and deductive reasoning play an important role in forensic science. Core Theme: Understanding forensic science. What is forensic science and why are teamwork
More informationMA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL
Programme Specification MA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL PGCert Artist Teacher PGCert Challenging
More informationOpen Source Digital Forensics Tools
The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
More informationThe purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.
National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this
More informationSufficiency of Windows Event log as Evidence in Digital Forensics
Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK
More informationLarge Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
More informationPROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice
PROGRAMME SPECIFICATION MSc Speech, Language and Communication Needs in Schools: Advanced Practice Awarding body: Institute of Education, University of London / City University London Teaching Institutions:
More informationMA Knowledge and Interaction in Online Environments
MA Knowledge and Interaction in Online Environments A new, fully online course for professionals in online education, communication and information to be launched in October 2009 What is this course about?
More informationMonfort College of Business Semester Course Syllabus (2015-2016)
Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 371 Introduction to Computer Forensics Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 300 or
More informationA LONG-TERM STUDY OF THE OUTCOMES OF DRUG USERS LEAVING TREATMENT SEPTEMBER 2010
National Treatment Agency for Substance Misuse Long-term results for those who have been treated in one year found that nearly half who leave neither need further treatment nor were found to be involved
More informationProgramme Specification and Curriculum Map for BA Criminology (Criminal Justice)
Programme Specification and Curriculum Map for BA Criminology (Criminal Justice) 1. Programme title BA Criminology (Criminal Justice) 2. Awarding institution Middlesex University 3. Teaching institution
More informationAS FORENSIC SCIENCE ACADEMY
TE AS FORENSIC SCIENCE ACADEMY TM "BETTER SCIENCE LEADS TO BETTER JUSTICE FOR ALL" I strongly feel the courses offered through the Texas Forensic Science Academy certificate program are a true benefit
More informationEXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science
Certificate Description This certificate provides professionals the opportunity to enhance specialized skills in Forensic Science. Arson Investigation CRJS 350 This course will explore criminal and scientific
More information10128/16 LB/dk 1 DGD 1C
Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:
More informationPart one: Programme Specification
Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationTHE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING
THE USE OF SIMULATION IN DIGITAL FORENSICS TEACHING Jonathan Crellin School of Computing, University of Portsmouth Buckingham Building Portsmouth, PO1 3HE jonathan.crellin@port.ac.uk http://userweb.port.ac.uk/~crellinj/in
More information