December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh Computer Forensic Investigation School to be offered to law enforcement agencies, starting September 10 th, 2007. Overview The School of Computer Forensic Investigation at Eastern Michigan University is quickly gaining a national reputation for excellence. Designed for the law enforcement community, this unique educational/training program has been developed with cooperation from our instructors in law enforcement, business and industry. These professionals provide comprehensive instruction relevant to the recent developments in the field of computer forensics. The classroom experience is supplemented with lecture and textbook materials. Considerable time is spent developing hands-on skills in an academic lab setting. Participants spend the majority of their class time doing analysis and implementing new techniques rather than talking about forensics. This hands-on training enhances the student s ability to return to their departments and start processing cases without the need for additional training. The School of Computer Forensic Investigation has been built upon our over 15 year history of Eastern Michigan University s efforts to provide advanced training within the law enforcement community of Michigan. The Center for Regional and National Security at E.M.U. is continuing to incorporate and develop new technologies in their educational programs. Participants in the School of Computer Forensic Investigation will be exposed to a new paradigm of criminal investigation rooted in the technological process. Students can immediately transfer the skills and knowledge learned in the program to their workplace. Instructors The School of Computer Forensic Investigation has developed relationships with leading edge industry professionals. Our faculty consists of professionals from the Department of Defense, the State Attorney General s Office, Air Force Intrusion Testing, Sprint Communications, as well as other private technology companies, and law enforcement personnel. In the private sector these individuals hold positions as Systems Engineers, Senior Systems Security Professionals, Cybercrime Investigators, Computer Forensics Examiners, Network Security Administrators,
teachers and trainers. Our faculty is content experts in their respective fields, many hold advanced degrees. Certification Students who successfully complete the entire program including required examinations and projects will be granted a certificate of successful completion as a Basic Certified Computer Forensic Examiner. Forensic Evidence Computer In week one of the program the students will build their own Forensic Computer. This accomplishes two goals. 1) The students learn about hardware issues and the need to have a sound basis of the internal workings of the computer. 2) The student will leave with a computer that they built as part of their studies. This is a state of the art machine that they will take back to their respective agency and do the analysis required of computer forensic examiners. This machine has been designed by one of Michigan s leading computer forensic examiners. While it is not required that each student purchase this machine, it affords those departments an opportunity to not only have an individual trained but he/she will have the necessary hardware tools once they graduate to start conducting forensic analysis when they return to their respective agencies. Estimated cost for this device is pending; please call 734-487-1590 for further information (EST under $4,000, which is a considerable savings over commercially produced Forensic Devices with a price tag of over $6,500.) All machines are state of the art. The Deadline for Ordering is August 10, 2007 If you desire to have us purchase the components for your student to assemble this computer please fill out the attached consent form and mail it with your registration. The curriculum of study has been developed with feedback from a number of working law enforcement computer forensic examiners. The curriculum is presented for your review:
Curriculum of Instruction Week 1: September 10-14 Topic Hours Introduction to Forensics School... 2 Building the Forensic Computer... 19 Windows XP... 7 Linux Software Installation & Setup... 7 Week 2: September 17-21 Physical/Logical Disk Structure... 3.5 DOS Basics/Advanced, Disk Edit... 10.5 FAT 12-16-32... 3.5 Windows Operating Systems... 3.5 Windows XP, NTFS, Logs... 7 Windows Registry File/Artifacts... 7 Week 3: October 8-12 Using Linux for Forensic Analysis... 31.5 Practical Examination... 3.5 Week 4: October 15-19 Topic Hours Validation of Forensic Hardware/Software... 7 External Media- CD/DVD + Digital Film... 7 Report Writing... 3.5 Network Investigations... 14 Practical Examination... 3.5 Week 5: October 29 November 2 Preparation of Analysis Media... 3.5 Image Restoration... 3.5 Automated Forensic Tools for Image Analysis... 28 Week 6: November 5-9 Field Acquisition Kit and Methodology... 7 Search and Seizure Electronic Media...3.5 Legal Issues in Forensic Investigations...3.5 Access Data Password Cracking Software... 7 Encryption/Steganography... 7 Final Examination....3.5 Evaluations and Graduation... 3.5 Times Classes will meet Monday through Friday from 8:00 a.m. to 4:00 p.m. The course is 6-weeks in length. Location Classes will be held in Room 8, Roosevelt Hall. Application Information Applicants are required to complete a formal application in its entirety. All applications must be typed before being submitted to the address below. Cost $800.00** The majority** of the costs have been funded by a grant from the Michigan Justice Training Commission. Additional program fees for this course are $800.00** per applicant excluding the costs for the computer. The computer cost will be determined, costs to not exceed $4,000. Compare these costs with other nationally recognized one week courses. **Pending Final Approval from the Michigan Justice Training Commission.
No refunds will be honored after the registration date. Student substitutions will be permitted. Selection Criteria 1. Applicants from departments demonstrating significant need will be given first priority for admissions. 2. Qualified federal, state, and local police and sheriff department personnel receive preferential consideration. 3. It is necessary that applicants have an understanding of computers and a background in criminal investigations. 4. It is suggested that all applicants have completed the School of Computer Cyber Crime Investigations. (Similar or related training can be substituted.) 5. All applicants are subject to background investigation. College Credit Eastern Michigan University offers participants in the School of Computer Forensic Investigation an opportunity to receive university credit. Details can be obtained by contacting the Center for Regional and National Security at the numbers indicated below. Further Registration Information. Deadline for Program Registration only August 31, 2007 Michael Yauk, mike.yauk@emich.edu Skip Lawver, skip.lawver@emich.edu Phone 734-487-1590 Fax 734-487-1620 Respectfully, Mike Yauk Platform Associate, Information Assurance
Authorization to Purchase Computer Components Authorization is hereby granted to Eastern Michigan University to purchase the following computer components for The School of Computer Forensic Investigation. The computer will be the property of Police Department upon completion of the training course. Eastern Michigan University is authorized to bill my Department not to exceed $4,000 for this Forensic Evidence Computer. Purchase Order Number: Signed Date NOTE: No refunds will be allowed after receipt of signed authorization.
All applicants will be subjected to a background investigation. Deadline Date: August 10, 2007 for Forensic Computer Purchase & Student Application Deadline Date for Program Only: August 31, 2007 PLEASE TYPE/PRINT. DATE Name Last First Middle Rank/Title Present address Number Street City State Zip Telephone : ( ) - E-mail address: Department Name: Street Address: MCOLES License Number City State Zip Fax Number: ( ) Telephone : ( ) Computer Ability: (Please check one) Beginner Intermediate Check the systems/software which you are familiar with and rate your ability level (i.e. beginner, intermediate, advanced) Windows 95/2000 MS-DOS Windows NT Macintosh Novell Norton Utilities Advanced List other software programs and/or operating systems with which you have a working knowledge: How many years in Law Enforcement How many years as an Investigator/Detective or position with extensive investigative responsibilities State your current job responsibilities/duties (Specifically state investigator tasks ) Signature of applicant Date: Signature of Chief or Designate Date: