...Juan Gomez Project Management The FBI’s Virtual Case File Project Failure Back in the years between 2001 and 2005, the FBI had started a project called the Virtual Case File. This was part of a larger initiative called Trilogy which was supposed to contain three parts to it: One was to upgrade software and hardware for FBI agents. Another was to be able to upgrade the FBI’s communications network. And the third in which it contained the Virtual Case File, was to significantly upgrade the FBI’s case management system “to enable better access to, and sharing of, case-related information across the FBI.”(WordPress) The first two parts were able to be completed but the Virtual Case File project was faced with high costs and schedule overruns and thus never achieved its goals. This project was compared to the London Stock Exchange’s Taurus Project, where scope creep lead to the termination of the project after huge amounts of cost overruns. The Trilogy program was to modernize the FBI’s information technology infrastructure. The Virtual Case File was intended to replace the FBI’s antiquated case management application, which was the Automated Case Support system. The Virtual Case File was initially designed to improve the FBI’s ability to manage investigative case files, to facilitate data and document resources, and to share information with other FBI offices. In the beginning, The Department of Justice required the FBI to use two contractors for the Trilogy project because the...
Words: 388 - Pages: 2
...The article that I read was about the FBI and how it blew $170 million dollars trying to modernize the FBI’s technology. They had a $581 million dollar budget on this transformation which they called “Trilogy”. They referred to this project as “Tragedy” because the new software that they were trying to use which is called Virtual Case File, was not in production and was said to probably never be in production. With that being said, the September 11 attacks dropped a heavy load of pressure onto the project and derailed the course that they were taking on it. I think that the information provided was great considering that this was an FBI project. There was some information that could not be released and some details that could not be discussed. Overall the article was presented in a very professional manner and I was actually kind of surprised that any issues that occur in the FBI could be discussed. It was an article that they could make a one hour show about on television. The one thing that kind of had me confused was how they could have IT workers whom they considered “not capable” of doing what they were asked to do as far as modernizing the technology infrastructure. After years of failure they did ultimately decide to take the project in another direction but to think that they wasted so much money on software that did not hold up, is just crazy. In my opinion, this article was very informational but at the same time it gives a little insight as to just how much technology...
Words: 316 - Pages: 2
...The FBI started to set up a project to build a new Virtual Case File system (VCF). This VCF project was to be let as one massive contract at a total cost of $379m. It was planned as a classic waterfall project - with a grand design being drawn up before work would start on the development of a monolithic system. Testing would be carried out at the end, and the whole system would go live at once - a classic big-bang implementation approach. Science Applications International Corporation (SAIC) The 9/11 attacks increased political pressure for better homeland security and data sharing between 6 agencies. Responding to this pressure, the FBI made promises to bring forward deployment of the new VCF case management system by 6 months - to December 2002. Then they received an additional $78m of funding and promised to chop off another 6 months from the schedule. The classic symptoms of waterfall project failure started to reveal themselves. Project plans were found to be unrealistic, and the oversight of project spend was inadequate. It became obvious that the project would not meet its accelerated deadlines. A commitment to using unproven thin client technology had been made - and the design for a web-like access to a centralised database was deeply flawed - BUT: up-front contracts with suppliers bound the project to this technology and the testing that could have revealed these flaws came too late to allow a change of direction. After...
Words: 531 - Pages: 3
...The FBI's VCF (Virtual Case Files) IT project is one of the most highly publicized software failure in U.S history. The main goal of the FBI’s VCF project was to automate the FBI's paper driven work environment, allow agents and intelligence analysts to share vital investigative information, and replace the obsolete Automated Case Support (ACS) system. The FBI outsourced the code writing for the VCF project in the year 2001 to contractor Science Applications International Corporation (SAIC) based out of San Diego,CA. SAIC delivered 700,000 lines of code that was overly bug ridden, and functionally off target from what the FBI expected, that the FBI had to terminate the $170 million project which included $105 million worth of unusable code. Various government audits and independent reports show that the FBI did not have the proper IT management and technical expertise, and should share the blame for the VCF project failure. At the termination of the project in 2005, Glenn A. Fine, the U.S. Department of Justice's inspector general, described the main factors that contributed to the VCF's failure. His list included the following factors: poorly defined and slowly evolving design requirements; overly ambitious schedules; and the lack of a plan to guide hardware purchases, network deployments, and software development for the bureau. The FBI announced that it would buy off-the-shelf software to be installed in phases over the next four years from 2005-2009....
Words: 8240 - Pages: 33
...Digital Evidence Fall 2007, Volume 6, Issue 2 Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the limitations of virtual environments leading to the conclusion that this method can not be considered to be a replacement for conventional techniques of computer evidence collection and analysis. We propose a new approach where two environments, conventional and virtual, are used independently. Further we demonstrate that this approach can considerably shorten the time of the computer forensics investigation analysis phase and it also allows for better utilisation of less qualified personnel. Keywords: Computer Forensics, Virtual Machine, computer evidence. Introduction In this paper we examine the application of the VMWare (VMWare, 2007) virtual environment in the analysis phase of a computer forensics investigation. We show that the environment created by VMWare differs considerably from the original computer system, and because of that VMWare by itself is very unlikely to produce court admissible evidence. We propose a new approach when two environments, conventional and virtual, are used concurrently and independently. After the images are collected in a forensically...
Words: 3983 - Pages: 16
...designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the...
Words: 2388 - Pages: 10
...designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the...
Words: 2387 - Pages: 10
...E-COMMERCE – IT430 VU Lesson 01 Course outline E-COMMERCE E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet, Domain name system Networking devices – Bridges, Switches, Routers etc., Role of ISP’s on Internet, Getting Domain name and IP addresses, Understanding electronic mail Markup languages and the Web, Web designing using HTML, CSS and Java Scripting Client side & server side processing, Cookies, Maintaining state in a stateless environment, two tier/ntier architecture Security issues on the internet, Firewalls, Proxy Server, Virtual Private Network Cryptography and Public key infrastructure (PKI), Certification Authorities and Digital Certificates, Digital signatures Technology Electronic Payment Systems – Virtual Pin payment system, Centralized account system, Electronic Check, E-Cash, SSL and SET based payment systems E-business– advantages/disadvantages, Paper and electronic catalogues Electronic Data Interchange (EDI) E-business models Internet marketing Data mining and knowledge discovery Process, OLAP, Types and business application of data mining E-business strategy, supply chain/value chain analysis and Porter’s model, role of e-commerce in competitive strategy E-banking, ERP Legal/policy issues in e-commerce –salient features of Electronic Transactions Ordinance, 2002 in Pakistan Territorial jurisdiction and conflict of laws, online contracts, online defamation, Copyright in...
Words: 9120 - Pages: 37
...primary reason data is lost from a computer system is __________.Answer | | | | | Selected Answer: | lack of good backup strategy. | Correct Answer: | lack of good backup strategy. | | | | | * Question 3 0.5 out of 0.5 points | | | Some systems streamline the backup process by restoring a computer’s operating system, device drivers, settings, and data in a single step--a process called restore pointing.Answer | | | | | Selected Answer: | False | Correct Answer: | False | | | | | * Question 4 0.5 out of 0.5 points | | | Case-Based Critical Thinking Questions Case 4-1 Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way so they can easily be found and shared with others. Tom and Andy both have Microsoft Word. It would be best to store their files in its native format with an extension of ____.Answer | | | | | Selected Answer: | a. .doc or .docx | Correct Answer: | a. .doc or .docx | | | | | * Question 5 0.5 out of 0.5 points | | | An operating system’s ____ capability supports a division of labor among all the processing units.Answer | | | | | Selected Answer: | b. multiprocessing | Correct Answer: | b. multiprocessing | | | | |...
Words: 1763 - Pages: 8
...course tutorials visit www.tutorialrank.com CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit www.tutorialrank.com You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare a presentation on the poor choices users make when working...
Words: 3261 - Pages: 14
...* Reference: ** Basics: *** Getting help: # View the manual for target command man command # Get help with a target command (probably the same as above, but not always): command -h # In case you forget the name of a command, print possible commands relating to any given word: apropos word # View index of help pages: info *** Command Line Utilities: **** Basic File and Directory Operations: # Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a # Recurse into subdirectories and list those as well: ls -R # List files by modification time, most recent first. ls -lt # Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination # Delete target forever (be very careful), use -r recursive flag for directories: rm target # Copy file or directory: cp source destination # Mount filesytem: mount /dev/device_name /media/device_name # Unmount: umount /media/device_name # Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration: # Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command # Become system administrator: sudo...
Words: 1920 - Pages: 8
...was already being done in Linux operating system. With the previous versions, most of the memory management occurred upon login. This slowed the processor down taking up all the resources at one time using the system memory. To address this issue and correct it in Windows 8, Microsoft implemented a start on demand model. What this means is that processes that are needed are delayed until the process is needed verses having all the processes start automatically when the computer is started. This makes more run on scheduled than before which frees up startup memory. According to Microsoft (2013),” Virtual memory combines your computer’s RAM with temporary space on your hard disk. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work (para 1-2)”. Only the most recent files used are keep in...
Words: 876 - Pages: 4
...take what we have learned from our course POS/355 Operating systems and research to compare and contrast the UNIX/Linux, Microsoft Windows, and MacOS systems. In particular we will contrast and compare the different operating systems in regards to memory management, processing, file management and security. Operating systems at the core is all about the kernel. The kernel in all of the operating systems is the main component that is responsible in the management of memory, processing, file management and security. Contrast and Comparison of Memory Management within Operating Systems Memory management in comparison and contrasts between the different operating systems is due to the way the kernel works in conjunction with the memory. Since each operating system has different kernel’s they each have similar and different ways that they manage memory. Contrasts and comparisons on Mac OS, Windows, and UNIX/Linux are described below. 1. UNIX: Though UNIX and Linux are extremely similar when it comes to how things work internally; there are slight differences that make UNIX distinct from its counterpart. One process that UNIX utilizes is known as swapping; this is done by moving chunks of the Virtual Memory (called pages), out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page is expected to be needed in the very near future it is termed...
Words: 3967 - Pages: 16
...Module 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation Common System Components Process Management Main Memory Management Secondary-Storage Management I/O System Management File Management Protection System Networking Command-Interpreter System Process Management A process is a program in execution. A process needs certain resources, including CPU time, memory, files, and I/O devices, to accomplish its task. The operating system is responsible for the following activities in connection with process management. Process creation and deletion. process suspension and resumption. Provision of mechanisms for: process synchronization process communication Main-Memory Management Memory is a large array of words or bytes, each with its own address. It is a repository of quickly accessible data shared by the CPU and I/O devices. Main memory is a volatile storage device. It loses its contents in the case of system failure. The operating system is responsible for the following activities in connections with memory management: Keep track of which parts of memory are currently being used and by whom. Decide which processes to load when memory space becomes...
Words: 1619 - Pages: 7
.... . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . . 1.16 Alternative front-ends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
Words: 143714 - Pages: 575