Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

3 Scary Possibilities for Cybercrime

 

Rating :

 

Comments

 
  • gmazur
    gmazur at March 26,2015
    Another Department of Defense (DOD) Public Affairs video presenting both the capabilities and complexities of conducting cyber forensics in a military organization. The video does a good job providing an overview of how cyber forensics supports complex military organizations. Within military organizations exists cyber forensic capabilities that serve different purposes because they fall under different federal authorities. Crime is executed under the US Code Title 18 and the services’ law enforcement agencies handle those cases, in day-to-day business there are cyber defenders that operate under Title 10 authorities investigating attacks against DOD networks. Some of those cyber defenders work in austere environments defending the networks so the warfighters are able to do their job. Not to be forgotten are the intelligence organizations doing their part investigating intrusions.
  • jczarny
    jczarny at March 29,2015
    Good DOD publicity video. Covers all the basics of computer forensics. The mock trial was cool to see, and I believe those are important to have for our analysts. They give our analysts a taste of what to expect when they are being hounded on the stand.
  • tristayifei
    tristayifei at April 12,2015
    The video really lets me know that how our course materials can be applied to the crimes involved digital and computers in the real world. These scenes I have seen in the TV shows, but I do appreciate that I had this chance to see agents from Department of Defense and the Military Services was actually doing through the whole process and all the familiar terms in this documentary video. I like their computer classes and mock trail, and this reminds me a great experience that when the IRS came to campus and held a mock event showing the whole process from detecting cases, sending undercover agencies, gathering information, presenting to the court, and arresting convicts.
  • JSahm151
    JSahm151 at April 21,2015
    Interesting video that highlights the fact that computers are involved in most crimes. It also shows that evidence comes in many forms. They showed a video games system, that might have records of who signed in last. Part of the video shows the removal of micro chips. This is helpful if you are working with SSD's and damaged drives.
  • mariawhit8
    mariawhit8 at May 03,2015
    Yet another way our field is in growing demand. Interesting video from DOD and it just shows that luckily criminals usually have a computer angle that can aid in getting the bad person arrested. Horrific crimes in military environments are no different than out in the civilian world...but i'm glad they've trained military on how to find these crimes in their own back yard.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved