Top Banner
THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317
9

THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Dec 30, 2015

Download

Documents

Erik Neal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO!

Unit 8 – E-Mail & Cell Phones

Dr. Joe Ciccone – CJ 317

Page 2: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Last Week

Data Recovery and Investigations – How this could have been avoided? Who am I?

Sharing Information vs.ConfidentialityAny Last Minute IssueOne More Seminar to Go

Page 3: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Cell Phone & Mobile Device Forensics

Communication risks and issues for police officer

What challenges to official communications have in the world of forensics?

How can our own tools be used again us (police)?

Page 4: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Key Terms – Unit 8

Enhanced Simple Mail Transport Protocol (ESMTP): An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that’s added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value. See also Simple Mail Transfer Protocol (SMTP).

Phishing: A type of e-mail scam that’s typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.

Spoofing: Transmitting an e-mail message with its header information altered so that its point of origin appears to be from a different sender. Spoofed e-mails are also referred to as forged e-mail. Spoofing is typically used in phishing and spamming to hide the sender’s identity.

Global System for Mobile Communications (GSM): A second-generation cellular network standard; currently the most popular cellular network type in the world.

Subscriber Identity Module (SIM) card: A removable card in GSM phones that contains information for identifying the phone’s subscriber. It might also store other information, such as messages and call history.

Page 5: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Cybercrime – how dangerous is it?

E-mail tampering is a serious offense and can result in court battles and much more.

Munshani v. Signal Lake Venture Capital Fund

Terrorizing as this one Where is this?What happened here?

Page 6: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

What would we do with their cell-phones?

Issues with cell phones Criminal Use Victim Use Witnesses to crimes

Who are the Victims?Type of PC Crime?Can we take a life?How can we stop it?Who are we

Page 7: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Project – Case 12-1 (2 page Report)

You receive a call from a high school student named Marco, who claims he has just received an e-mail from another student threatening to commit suicide. Marco is not sure where the student sent the e-mail from. Write a brief report on how you would proceed, including what you should do first in this situation.

Page 8: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Project Part II – COMBINE both

A mother calls you to report that her 15 year-old daughter has run away from home. She has access to her daughters’ e-mail account and says that her daughter has several e-mails in her inbox suggesting that she has run away to be with a 35 year old woman. Write a brief report on how you should proceed.

Page 9: THE WILD WILD WEST – WEEK 8 AND ONLY ONE MORE TO GO! Unit 8 – E-Mail & Cell Phones Dr. Joe Ciccone – CJ 317.

Almost done - YOUR Questions

ALL LATE WORK DUE THIS WEEK!Questions and CommentsGrade book reviewSuggestions for the FINAL SeminarNext Week LAST seminarWeek 10 – NO seminar