CJE 1686 - Forensic Computer Related Crime Investigations

College of Public Safety Administration

Credit(s): 3
Contact Hours: 47
Effective Term Fall 2015 (505)

Course Description

This course will introduce the student to the principles and practices required to obtain and preserve evidence in forensics computer related crime investigations. Topics will also include the Internet and investigative software tools.

Learning Outcomes and Objectives

  1. The student will know the definition of forensics as applied to computer related crimes by:
    1. applying federal and state laws to computer related crimes.
    2. explaining the definition of forensic as applied to computer related crime.
    3. discussing the elements required in a computer related crime search warrant.
    4. listing the procedures that must be used to preserve computer evidence.
  2. The student will demonstrate how a computer can contain hidden data and how to preserve and locate the hidden data by:
    1. researching the methods used by individuals to hide data on a computer.
    2. describing the methods used by investigators to locate and preserve data on a computer.
    3. explaining how data can be encrypted.
    4. defining how a computer virus can affect data.
    5. giving examples of methods used to conceal data on a computer.
    6. using software tools to find and preserve data on a computer.
    7. retrieving deleted data from a computer storage device.
    8. listing the software tools that may be used to locate data on a computer.
    9. outlining the procedures used to preserve data retrieved from a computer.
    10. describing computer data storage devices.
    11. explaining how passwords can be revealed.
  3. The student will understand the principles of preserving and processing a computer related crime scene by:
    1. defining electronic evidence.
    2. reviewing the standard procedures for the collection of evidence.
    3. explaining the importance of collecting electronic evidence.
    4. describing the chain of custody.
    5. exploring software tools used to retrieve hidden and deleted electronic data from computers and storage media.
    6. processing a computer related crime scene.
    7. inventorying evidence at a computer crime scene.
  4. The student will demonstrate computer forensic software tools by:
    1. locating the sources of computer forensic software tools.
    2. exploring the features of computer forensic software tools.
    3. using computer forensic software tools.
  5. The student will know the requirements of a search warrant in a computer related crime by:
    1. reviewing laws regarding search warrants in a computer related crime.
    2. discussing state search warrants in a computer related crime.
    3. discussing federal search warrants in a computer related crime.
    4. defining the elements required in a search warrant for a computer related crime.
  6. The student will know the location of web sites that can be used as resources in the forensic investigation of a computer related crime by:
    1. locating forensic software tools on the Internet.
    2. obtaining access to secured sources of information regarding forensic software and tools on the Internet.
    3. downloading lists of computer related forensic sources of information.
    4. downloading investigative software tools.
    5. exploring newsgroups related to forensic software sources.

Criteria Performance Standard

Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.

History of Changes

C&I 4/10/01,DBT 5/15/01, eff 20003. Flexible Access 2001. C&I 6/25/02, BOT 7/29/02, eff yrtr 20021. Eff 20051(0355). 3 Year Review 2008. C&I Approval: 01/25/2005, BOT Approval: 03/21/2005, Effective Term: Fall 2005 (355).
C&I Approval: 11/21/2014, BOT Approval: 02/17/2015, Effective Term: Fall 2015 (505)

Related Programs

  1. Computer Related Crime Investigation (CRCI-CT) (625) (Active)
  2. Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
  3. Cybersecurity (ITSC-AS) (640) (Draft)
  4. Cybersecurity (ITSC-AS) (640) (Active)
  5. Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
  6. Public Safety (CJPSS-AS) (645) (Active)
  7. Public Safety Administration (PSA-TR) (670) (Active)