sliu23at November 19,2015 It is near the end of semester. I am very glad to watch this video, because lots of things talked in this video have been covered in our class. This is a not quite new video, which mainly talks about the situation in 2011. Therefore, these techniques can be taught in this our course and not just known by several government experts. Besides those cases and techniques talked about in this video, we could realize that the cyber-crime becomes more and more popular as this video predicted and computer forensics has become one of the key techniques in the investigation nowadays.
zsesayat November 19,2015 I am not sure if this video is helping me to continue with this field of study or giving me more encouragement to catch the bad guys. I think I can deal with the computer analysis investigation but not sure of been a front liner (first-responder). I love the forensic examination on the hard drives, but to be a first-responder, I am not sure about it. Very interesting field
hanna88at November 22,2015 Cool to see concepts in the class show up in the video such as hashing, exif data, images, and network intrusions. Some of the recovery tools they showed look really interesting, especially the ones used when the hard drives appear to be badly damaged. So much to learn in a field that is constantly evolving.
haygaffat November 24,2015 Technology, Investigation, Computers, and actions of others. It is amazing that we have went from massive mainframes that took up rooms and held small amounts of data compared to today's standards. Now you can have a smart phone with as much horse power as the first mainframes. For the most part. Not bit to bit. The technology footprint is just as important these days as the carbon footprint. We all have to manage it.
tshafiat November 28,2015 I like how they mention that the majority of their cases that have a computer component to it.
The computer is a crime scene itself. I think that in addition to what is thought of as DOD territory, that is national defense, there is a tremendous battleground with regards to organized crime. Cellphones are easily accessible, portable and affordable so it is no surprise that you will see them in war zones, everybody carries them. Especially interesting is the acquisition and recovery of data from damaged drives and equipment. I also found it valuable to have mock trails and the Attorney Advisor. I like how the mock judge said to own your mistakes, to prevent them from hurting you at trail. Bad guys are always leveraging new technology and we are fighting “Invisible battles”, that is one of the most intriguing elements of this discipline for me. I want to be helpful in this regard. It is incredible how an attacker can utilize a presumably benign device to attack. In addition, I think it is important to note that security includes safeguarding personally identifiable information. This video makes me want to join up!