This is one of the best social media websites dedicated to tracking the social media posts about Hurricane Irene. The ESRI map can be described below:
One of the best parts of being a professor is preparing courses before the semester begins. It’s a time to reflect on the last time you taught the course and make improvements/enhancements in the content. One of the fun projects I did last year was scoped an analysis (and created evidence) surrounding the Wikileaks case. Here was the project scope:
You are tasked with investigating a military computer system that has been alleged to be apart of the recent classified information disclosure to the infamous Wikileaks website. The computer system you’re examining was permitted to have classified information and you can determine if a file was classified by following the below:· Confidential files have [CO] in the file name· Secret files have [SC] in the file nameYour Scope:The users accessing this system had no expectation of privacy. Your expected deliverables are:1) Determine if any classified files were sent/saved/distributed to any other digital device2) Determine if any user on this computer communicated/researched regarding how to distribute/share/obtain the information on the leaked information described on the Wikileaks website3) Provide a recommendation for other data sources / suspects / email accounts /aliases to consider in this investigation
Students had to examine evidence and provide a comprehensive report. The best part was trying to get students to take their analysis to the next level, that is, beyond what was taught in the course. As digital forensic examiners, we will always encounter something new and we need to be ready/prepared to figure things out. I was pleased to see some of the students do this — and even more pleased to hear that some of those Juniors had amazing internships this summer and most of them already have job offers — before they even entered their Senior year.
This term in Operating System Forensics we will be spending a lot of time examining a few digital devices we’ve been building and “crafting” for the past 6 months. It’s key for a digital forensic professor teach both theory and practice and there is no better way, in my opinion than to build custom assessments for each class so students are not only engaged, but excited to learn.
Needless to say, I’m excited to start teaching on Monday 🙂
Last May (2011) I rewrote the undergraduate digital forensic curriculum at Champlain College. I collaborated with the many people to complete this monumental task including but not limited to Mike Wilkinson, Cristian Balan, Ali Rafieymehr, Michelle Miller, Jim Hoag and others who will be named at a future date (we are waiting to release these names).
This Fall is the first incoming class to experience the newly designed material. Current students will also be able to take advantage of the new curriculum as its developed (we plan to have all of the courses ready by Fall 2013).
The new curriculum will include newly designed content which will be updated each semester to stay current/leading edge. One of the most exciting parts of the curriculum are the 10 (that’s right. ten) digital forensic classes. Don’t confuse these digital forensic classes for “networking” or “security” courses either, these are full blown digital forensic focused classes. Below is a list of the new courses:
- Cyber Crime – Criminal and Civil Investigations
- Introduction to Digital Forensics
- Digital Forensic Tool Evaluation
- Anti-Forensics and Network Forensics
- File System Forensics
- Operating System Forensics
- Mobile Device Forensics
- E-Discovery and Data Analytics
- Advanced Practice in Digital Forensics
- Capstone (Senior Thesis)
- Digital Forensic Internship (optional)
- Introduction to Networking and Security
- Introduction to Computer Theory (programming/scripting)
- Operating Systems (Not learning how to use Windows, more focused on how OS’s manage Memory/threads etc)
- Introduction to Forensic Science
- Technical Writing
- Law of Searching and Seizing Digital Evidence
- Criminal Law
- Information Assurance
- Criminal Justice
- Economic Crime Investigation
- Computer Science
- Digital Forensic Science 4+1 — you can graduate with a masters degree in Digital Forensic Science in 5 years!!!!!
- Choose your own – work with your adviser to build your own specialization/minor
A rare example of an official source contradicting China’a repeated assertions that it doesn’t engage in cyberattacks……
At one point, as a narrator discusses various forms of cyberattack, a cursor is shown moving on a computer screen with a software application that is identified in Chinese characters as a “distributed denial-of-service” attack. Also known as DDOS, such attacks are relatively unsophisticated tools of cyberwarfare that involve bombarding websites with data to disable them.
The next screen says at the top, in Chinese, “Attack system..PLA Electronic Engineering Institute.” PLA stands for People’s Liberation Army.
The “Official source” referenced above can be viewed in this video
I love to use current topics in my classes to help reinforce concepts. In my CyberCrime class last year, I lectured on Operation Aurora (Google Hack of 2009) and highlighted the report Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation which was prepared for the US-Chain Economic and Security Review Commission authored by Northrop Grumman. If you read the entire report, which I highly recommend, you will find that Northrop was spot on – back in 2009 – about what was reported in the above referenced Page’s August 2011 article.