gmazurat March 26,2015 Another Department of Defense (DOD) Public Affairs video presenting both the capabilities and complexities of conducting cyber forensics in a military organization. The video does a good job providing an overview of how cyber forensics supports complex military organizations. Within military organizations exists cyber forensic capabilities that serve different purposes because they fall under different federal authorities. Crime is executed under the US Code Title 18 and the services’ law enforcement agencies handle those cases, in day-to-day business there are cyber defenders that operate under Title 10 authorities investigating attacks against DOD networks. Some of those cyber defenders work in austere environments defending the networks so the warfighters are able to do their job. Not to be forgotten are the intelligence organizations doing their part investigating intrusions.
jczarnyat March 29,2015 Good DOD publicity video. Covers all the basics of computer forensics. The mock trial was cool to see, and I believe those are important to have for our analysts. They give our analysts a taste of what to expect when they are being hounded on the stand.
tristayifeiat April 12,2015 The video really lets me know that how our course materials can be applied to the crimes involved digital and computers in the real world. These scenes I have seen in the TV shows, but I do appreciate that I had this chance to see agents from Department of Defense and the Military Services was actually doing through the whole process and all the familiar terms in this documentary video. I like their computer classes and mock trail, and this reminds me a great experience that when the IRS came to campus and held a mock event showing the whole process from detecting cases, sending undercover agencies, gathering information, presenting to the court, and arresting convicts.
JSahm151at April 21,2015 Interesting video that highlights the fact that computers are involved in most crimes. It also shows that evidence comes in many forms. They showed a video games system, that might have records of who signed in last. Part of the video shows the removal of micro chips. This is helpful if you are working with SSD's and damaged drives.
mariawhit8at May 03,2015 Yet another way our field is in growing demand. Interesting video from DOD and it just shows that luckily criminals usually have a computer angle that can aid in getting the bad person arrested. Horrific crimes in military environments are no different than out in the civilian world...but i'm glad they've trained military on how to find these crimes in their own back yard.