One research paper will be required.  The student may choose their topic, but it must be related to cybercrimes and approved by the instructor.  The topic must be submitted to the instructor for approval. Submitting a research paper without an approved topic/theme will...

FEMA Certificates Due (IS100, IS200, IS700, & IS800)

January 9, 2018

Welcome to the first class of Investing Cyber Terrorism (AJU 447 / 6647).  This week we will review the syllabus and the requirements of this class.  We will also review the methods in which this class will be taught (hybrid).   There will be four elemen...

January 16, 2018

We started off the week with ice, snow, and a day off.  Unfortunately, we are going to have to play a little "catch-up."  So make sure you are caught up on your reading (Handbook & Cybercrime).

Also,  FEMA had some technical difficulties t...

January 23, 2018

This week we talked about the 16 Sectors of Critical Infrastructure defined by PPD-21.  We also talked about the different types of cybercrimes in more detail.  I have uploaded the PowerPoint for todays class.    I will give 5 extra credit points o...

February 6, 2018

Today we talked about what a cyber warrior looks like and the different types of cyber warriors.  We also talked about DDoS and APDDoS attacks and how botnets are created and used in these attacks.  Thanks to Brad for playing the role of "web server" to...

This week we talked about the process that a terrorist would use to conduct a cyber terrorism operation.  We also talked about the 4th Amendment of U.S. Constitution, open source intelligence gathering, and the collection, examination, analysis, and the reporting of hi...

February 20, 2018

Today, we looked at the types of electronic evidence that could be seized during the execution of a search warrant. 

February 22, 2018

In today online meeting, we reviewed a 2017 Fifth Circuit case, US v. Escamilla_ 852 F.3d 474.

This week we talked about anti-forensics & counter-forensics.  We also discussed how digital images are created and methods used to analyzing digital evidence.   Technical difficulties prevented us from viewing the following digital forensic demonstrations:

TA...

Yesterday we went over the mid-term study guide and we talked about the format of the exam.  If you were not present for class (or even if you were present), you should download the study guide and watch the video below.  We will meet on Zoom on Thursday, prior to the...

March 20, 2018

Welcome back from Spring Break.  It was good to see everybody made it back safely.  This week we talked about CYBERCOM, DHS, and the FBI's response to a cyber attack.  We also talked about the ways that the private sector comes together to help protect cr...

This week we talked about the ways that terrorist use the Internet.  I also announced that there will be a quiz on March 29th.  Also, please take a note of the following deadlines and assignments:

1. Read Chapter 10 “Investigator’s Handbook”

2. Quiz on March 29, 20...

This week we discussed how individuals and small units should prepare for a cyber attack, and what they can do to assist cyber investigation teams.  In addition to the class recording, please make a note of the following items of interest:

1.  Five points were...

This week we talked about "Incident Response Teams" vs. "Cyber Threat Hunting."  Unfortunately, the audio system died half-way through the class and I had to re-record it.  I will also post the PowerPoint on the website.  Everybody should be working hard on their...

April 17, 2018

Today we talked about the current cyber threat landscape and Symantec's 2018 Internet Security Threat Report released in March.  I have posted the PowerPoint for the class.  Everybody should be working on their research paper.

April 19, 2018

Today we talked...

Please reload