CyberLaw

Assignments

June 5, 2018

One research paper will be required.  The student may choose their topic, but it must be related to cybercrimes and approved by the instructor.  The topic must be submitted to the instructor for approval. Submitting a research paper without an approved topic/theme will automatically receive a 10 point deduction.

June 5, 2018

FEMA Certificates Due (IS100, IS200, IS700, & IS800)

December 29, 2017

January 9, 2018

Welcome to the first class of Investing Cyber Terrorism (AJU 447 / 6647).  This week we will review the syllabus and the requirements of this class.  We will also review the methods in which this class will be taught (hybrid).   There will be four elements of instruction:

1.  Classroom -  We will meet in the classroom (Jennings 208) every Tuesday at 3:00 PM, with the exception of scheduled holidays...

December 24, 2017

January 16, 2018

We started off the week with ice, snow, and a day off.  Unfortunately, we are going to have to play a little "catch-up."  So make sure you are caught up on your reading (Handbook & Cybercrime).

Also,  FEMA had some technical difficulties this week, but everybody should have the first FEMA certificate submitted this week.   Some of you may have noticed that there is a delay between the time you tak...

December 22, 2017

January 23, 2018

This week we talked about the 16 Sectors of Critical Infrastructure defined by PPD-21.  We also talked about the different types of cybercrimes in more detail.  I have uploaded the PowerPoint for todays class.    I will give 5 extra credit points on Quiz #2 (not scheduled) for anybody that brings a printed copy of the EULA for Facebook or Twitter to our next class.  There are 2 "Easter Eggs" available for...

December 20, 2017

February 6, 2018

Today we talked about what a cyber warrior looks like and the different types of cyber warriors.  We also talked about DDoS and APDDoS attacks and how botnets are created and used in these attacks.  Thanks to Brad for playing the role of "web server" today.  I will post the PowerPoint and post the recording (see embedded video).  I am posting Assignment #4 on Moodle.

FOLLOW-UP

I mentioned a video that I...

December 16, 2017

This week we talked about the process that a terrorist would use to conduct a cyber terrorism operation.  We also talked about the 4th Amendment of U.S. Constitution, open source intelligence gathering, and the collection, examination, analysis, and the reporting of high-tech evidence.  We had some audio problems during the February 13th class, so this week's class video will be in two parts.

PART I

PART...

December 10, 2017

February 20, 2018

Today, we looked at the types of electronic evidence that could be seized during the execution of a search warrant. 

February 22, 2018

In today online meeting, we reviewed a 2017 Fifth Circuit case, US v. Escamilla_ 852 F.3d 474.

December 6, 2017

This week we talked about anti-forensics & counter-forensics.  We also discussed how digital images are created and methods used to analyzing digital evidence.   Technical difficulties prevented us from viewing the following digital forensic demonstrations:

TABLEAU IMAGING
By Guidance Software
Unpublished Link: https://www.youtube.com/watch?time_continue=90&v=rK_8m9ObgIs

FORENSIC TOOLKIT (FTK)
Mobile Phone Examiner
By...

December 1, 2017

Yesterday we went over the mid-term study guide and we talked about the format of the exam.  If you were not present for class (or even if you were present), you should download the study guide and watch the video below.  We will meet on Zoom on Thursday, prior to the mid-term exam.  Feel free to contact me if you have any questions.

November 15, 2017

March 20, 2018

Welcome back from Spring Break.  It was good to see everybody made it back safely.  This week we talked about CYBERCOM, DHS, and the FBI's response to a cyber attack.  We also talked about the ways that the private sector comes together to help protect critical cyber assets and promotes a defense through education. 

March 22, 2018

This week's cases studies involved a West Coast power company and...

November 2, 2017

This week we talked about the ways that terrorist use the Internet.  I also announced that there will be a quiz on March 29th.  Also, please take a note of the following deadlines and assignments:

1. Read Chapter 10 “Investigator’s Handbook”

2. Quiz on March 29, 2018 (open notes)

3. Research paper OUTLINE due April 12, 2018 – (10%)

4. No Class on April 12, 2018:  MC Cyber Security Summit

5. Research paper due April 24, 201...

October 31, 2017

This week we discussed how individuals and small units should prepare for a cyber attack, and what they can do to assist cyber investigation teams.  In addition to the class recording, please make a note of the following items of interest:

1.  Five points were awarded to whoever answer the quiz question, "List four (4) ways that terrorists use the Internet."   I realize the question was too open-ended.

2.  Fi...

October 15, 2017

This week we talked about "Incident Response Teams" vs. "Cyber Threat Hunting."  Unfortunately, the audio system died half-way through the class and I had to re-record it.  I will also post the PowerPoint on the website.  Everybody should be working hard on their paper.

October 1, 2017

April 17, 2018

Today we talked about the current cyber threat landscape and Symantec's 2018 Internet Security Threat Report released in March.  I have posted the PowerPoint for the class.  Everybody should be working on their research paper.

April 19, 2018

Today we talked about the Aurora generator test and the hacking of a tech journalist from Wired magazine.  Everybody should visit the following web sites:  Muckrock F...

Please reload

Classroom Tools