|
|
Click Here for the powerpoint slides from the last day of class.
Sample Essay Questions - Final Examination 1) You are sitting at your office computer doing as you normally do at work (playing solitaire on the computer or surfing the Internet) when your co-workers begin to discuss the BTK killer's case. One of the individuals notes that the crime was solved in part because BTK sent a computer disk to a local news media outlet. This individual then explains that computer forensics was apparently used in the investigation; however, he cannot explain what computer forensics is. You rise and tell your fellow co-workers to gather round, that you can explain the mysterious computer forensics of which they have been discussing. Your co-workers want you to explain what computer forensics is, how a simple computer disk could break open such a high profile case and what agencies or companies could use such a service? 2) Explain at least four problems that have hindered the development of the field of computer forensics. Why are these considerations classified as a hindrance and what can be done to address each of these concerns? 3) Late one night your girlfriend/boyfriend/spouse makes you sit down and watch television with them. Your partner's favorite program is about to begin - Law and Order Special Victims Unit. The detectives on the show are working a child pornography ring that involves a computer. The majority of the show is focused on the department's computer forensics team. As you watch the show you become increasingly upset because having taken Dr. Moore's Technology Crime course you know that the procedures have not been properly followed. Your partner finally becomes fed up and demands that since you know so much about computer forensics you should tell her exactly (in detail since you have ruined her show) how the computer forensics process should work. 4) Discuss the act of saving a file to a disk. What are the various parts that make up the disk and what are the various components that make up the actual file? After your discussion is complete, provide a brief examination of how computer forensics experts use this information and where they look for evidence of criminal (or inappropriate) activity? 5) Having finally completed your study at Delta State University you are excited to accept a new position as a special agent with the Drug Enforcement Agency (DEA). During your first week on the job you assist in the seizure of a computer during an investigation relating to a major narcotics ring operating out of Houston, Texas. As part of your training you are required to take part (assist would be a better word) in the computer forensics analysis. After five hours of looking through the computer's hard drive the investigator discovers an image of child pornography that has been renamed to appear as a Microsoft Word file. The investigator makes a notation concerning the location of the file and continues searching the disk. After fifteen hours the two of you have discovered over 100 images of child pornography. Unfortunately, your supervisor comes in and tells you that none of the child pornography is admissible because the search warrant was for narcotics related records (names, addresses and account numbers of clients). You object to this and argue that you in fact did have the authority to seize the child pornography. Prepare a memorandum to your supervisor explaining why you understand his point of view, but also why you feel you and the investigator acted appropriately. Be sure to include any relevant court decisions that could assist your arguments. |