CRIME BOUNCE crime@private: Non-member submission from [Christine Siedsma <csiedsm@private>] (fwd)

From: Mark Morrissey (markem@private)
Date: Wed Sep 22 2004 - 16:20:04 PDT


---------- Forwarded message ----------
Date: Tue, 21 Sep 2004 12:35:37 -0700 (PDT)
From: owner-crime@private
To: crime-approval@private
Subject: BOUNCE crime@private:    Non-member submission from [Christine
    Siedsma <csiedsm@private>]

>From crime-approval@private Tue Sep 21 12:35:30 2004
Received: from mail.utica.edu (mail.utica.edu [65.220.79.115])
	by mournblade.cat.pdx.edu (8.13.1/8.13.1) with ESMTP id i8LJZHlu026005
	for <crime@private>; Tue, 21 Sep 2004 12:35:18 -0700 (PDT)
Received: from mail.utica.edu (localhost [127.0.0.1])
 by mail.utica.edu (iPlanet Messaging Server 5.2 Patch 2 (built Jul 14 2004))
 with ESMTP id <0I4E00FCTP2NP9@private> for crime@private; Tue,
 21 Sep 2004 15:35:12 -0400 (EDT)
Received: from mail.utica.edu (localhost [127.0.0.1])
	by mail.utica.edu (8.12.11/8.12.11) with ESMTP id i8LJZ8ME028981	for
 <crime@private>; Tue, 21 Sep 2004 15:35:08 -0400 (EDT)
Received: from utica.edu (localhost [127.0.0.1])
 by mail.utica.edu (iPlanet Messaging Server 5.2 Patch 2 (built Jul 14 2004))
 with ESMTP id <0I4E00FDMP2KPL@private> for crime@private; Tue,
 21 Sep 2004 15:35:08 -0400 (EDT)
Received: from [65.220.79.105] by mail.utica.edu (mshttpd); Tue,
 21 Sep 2004 15:35:08 -0400
Date: Tue, 21 Sep 2004 15:35:08 -0400
From: Christine Siedsma <csiedsm@private>
Subject: Re: CRIME wireless case study URLs?
To: Priscilla Oppenheimer <po@private>
Cc: CRIME <crime@private>
Message-id: <cb14635d.635dcb14@private>
MIME-version: 1.0
X-Mailer: iPlanet Messenger Express 5.2 Patch 2 (built Jul 14 2004)
Content-type: text/plain; charset=us-ascii
Content-language: en
Content-transfer-encoding: 7BIT
Content-disposition: inline
X-Accept-Language: en
Priority: normal
X-Scanned-By: MIMEDefang 2.44
X-Antivirus: Scanned by F-Prot Antivirus (http://www.f-prot.com)
X-Antivirus-Summary: Mod score: 0
X-Virus-Scanned: by amavisd-new

Greetings,

By sheer coincidence, I was looking at just such a case earlier.

Enter the following search parameters into Google

site:http://www.cybercrime.gov wireless

It will link you to a couple of interesting cases at CCIPS

Regards,

Christine Siedsma
www.e-evidence.info
Program Director
Computer Forensic Research & Development Center at Utica College

----- Original Message -----
From: Priscilla Oppenheimer <po@private>
Date: Tuesday, September 21, 2004 1:22 pm
Subject: CRIME wireless case study URLs?

> Hello,
>
> This is my first post. If I break the protocol in any way, just
> yell at
> me! I'm not sensitive. :-)
>
> I'm teaching Computer Forensics at Southern Oregon University with
> a
> colleague. The class starts next week.
>
> My colleague asked me to develop a case study related to wireless
> networking, in particular a legal case that resulted from someone
> sniffing a wireless network. This could either be a case related
> to a
> cracker obtaining confidential data without authorization, or a
> case
> related to a cracker gaining access to a wireless network and
> using
> bandwidth without authorization.
>
> Any suggestions on how to find info on cases of this sort? URLs?
> Good
> Google key words to search on?
>
> Thank-you very much.
>
> _______________________________________________
>
> Priscilla Oppenheimer
> www.priscilla.com
> http://www.sou.edu/CS/newsite/faculty/oppenheimer/info.htm
>
>



This archive was generated by hypermail 2.1.3 : Wed Sep 22 2004 - 16:58:18 PDT