SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Chapter 17

Computer Crime




                 Hess 17-1
Introduction
• Computer crimes are relatively easy to commit and
  difficult to detect
• Most computer crimes are not prosecuted
• Crimes involving computers have become much more
  sophisticated
• Most computers on the planet are connected via the
  Internet
• A new breed of detective—the cybercrime investigator

                                           Hess 17-2
The Scope and Cost of the Problem
SOURCES
•   IC3 2010 Internet Crime Report
•   2010 CyberSecurity Watch Survey
•   2010/2011 CSI Computer Crime and Security Survey
•   Created a fundamental change in law enforcement
    agencies



                                             Hess 17-3
Terminology and Definitions
COMMON TERMS
•   Cybercrime
•   Cybertechnology
•   Cyberspace
•   E-crime




                                  Hess 17-4
Terminology and Definitions
THE NET VERSUS THE WEB
• Net is a network of networks
• Web is an abstract space of
  information
LIVE CHAT AND
INSTANT MESSAGING
• Two or more people
• Talk online in real time
                                 Hess 17-5
Classification and Types of Computer Crimes
  OVERVIEW
  •   Computer as target
  •   Computer as tool
  •   Computer as incidental to an offense
  •   Be aware of the ever-expanding ways




                                             Hess 17-6
Classification and Types of Computer Crimes
  COMPUTER AS TARGET
  • Viruses and worms
  • Invariably involves hacking
  COMPUTER AS TOOL
  • Traditional methods elevated
  • Many offenses overlap



                                   Hess 17-7
Special Challenges in Investigation
OVERVIEW
•   Reluctance or failure to report crime
•   Lack of training
•   Need for specialists
•   Fragility of the evidence
•   Jurisdictional issues



                                            Hess 17-8
Special Challenges in Investigation
NONREPORTING OF COMPUTER CRIMES
• Did not think law enforcement could help
• Too insignificant to report
LACK OF INVESTIGATOR TRAINING
• Cybercriminals are more technologically sophisticated
• Law enforcement needs additional training



                                              Hess 17-9
Special Challenges in Investigation
NEED FOR SPECIALISTS AND TEAMWORK
• Cybercrime unit
FRAGILITY AND SENSITIVITY OF EVIDENCE
• Computer evidence is very fragile
• Can be altered or damaged easily
• Could be rendered unusable



                                        Hess 17-10
Special Challenges in Investigation
JURISDICTIONAL ISSUES
•   Traditional boundaries are complicated
•   Double criminality
•   Need for unified global approach
•   Federal versus state
•   Growing pains for this area of law



                                             Hess 17-11
The Preliminary Investigation
COMMON PROTOCOL
•   Secure, evaluate and document crime scene
•   Obtain a search warrant
•   Recognize, identify, collect and preserve the evidence
•   Package, transport and store evidence
•   Submit digital evidence
•   Document in an incident report


                                                Hess 17-12
The Preliminary Investigation
SECURING AND EVALUATING THE SCENE
•   Basic ON/OFF tenet
•   Follow departmental policy
•   Ensure that no unauthorized person has access
•   Ensure condition of electronic device is not altered
•   Properly document



                                                 Hess 17-13
The Preliminary Investigation
OBTAINING A SEARCH WARRANT
•   Searches may be conducted by consent
•   Suspect unknown, warrant must be obtained
•   Have both a consent search form and a search warrant
•   Avoid destruction of evidence




                                             Hess 17-14
The Preliminary Investigation
RECOGNIZING EVIDENCE
•   Conventional
     
         Fingerprints
        Documents
        Hard drive
•   Digital
     
         Electronic files
     
         E-mails

                                    Hess 17-15
The Preliminary Investigation
DOCUMENTING DIGITAL EVIDENCE
•   Thorough notes, sketches and photographs
•   Document condition and location of computer system
•   Photograph the entire scene
•   Photograph the front and back of the computer




                                            Hess 17-16
The Preliminary Investigation
COLLECTING PHYSICAL AND DIGITAL EVIDENCE
•   Evidence often contained on disks
•   Devices may have fingerprints
•   Avoid contact with recording surfaces
•   Evidence log
•   Chain of custody issues



                                            Hess 17-17
The Preliminary Investigation
PACKAGING, TRANSPORTING AND STORING
   DIGITAL EVIDENCE
•   Keep away from magnetic fields
•   Store away from humidity extremes
•   Do not use plastic bags
•   Be aware of battery needs



                                        Hess 17-18
Forensic Examination of Computer Evidence
 DATA ANALYSIS AND RECOVERY
 •   Deleted files remain on hard drive
 •   Forensic expert can make viewable
 •   Recycle bin
 •   Data remanence




                                          Hess 17-19
Legal Considerations in Collecting
   and Analyzing Computer Evidence
WARRANT EXCEPTIONS
• Contraband, fruits or instrumentalities of the crime
• Prevent death or serious bodily injury
• Has committed or is committing a criminal offense to
  which the materials relate




                                             Hess 17-20
Follow-Up Investigation
DEVELOPING SUSPECTS
• Most cybercrimes committed by outsiders
• Three categories
   
       Crackers
   
       Vandals
   
       Criminals




                                            Hess 17-21
Follow-Up Investigation
ORGANIZED CYBERCRIME GROUPS
• Generally not loyal to one another
• Operate in countries with weak hacking laws
UNDERCOVER INVESTIGATION AND SURVEILLANCE
• Headed by computer expert
• Online undercover officer



                                            Hess 17-22
Security of the Police Department’s Computers
   VULNERABILITY
   •   Access via phone lines
   •   Critical nature of law enforcement data
   •   Agency’s network should be a top priority
   •   Evidence logs
   •   Other valuable data



                                                   Hess 17-23
Legislation
GOVERNMENT MEASURES
•   USA PATRIOT Act
•   Foreign Intelligence Surveillance Act (FISA)
•   National Security Letter (NSL)
•   Child Protection and Sexual Predator Punishment Act
•   All states have enacted tough computer crime control
    laws


                                              Hess 17-24
The Investigative Team
CYBER SPECIALISTS
• Often requires a team
  approach
• Equipment owner
• Database technicians
• Auditors
• Computer experts
• Programmers
                                   Hess 17-25
Resources Available
SOURCES
•   National Cybercrime Training Partnership (NCTP)
•   Electronic Crimes Task Forces (ECTFs)
•   Perverted Justice
•   NetSmartz




                                              Hess 17-26
Preventing Computer Crime
STRATEGIES
•   Educating top management
•   Educating employees
•   Instituting internal security precautions
•   Management
     
         Commitment to defend against computer crime
     
         Organization-wide policies


                                                Hess 17-27
Summary
• Computer crimes are relatively easy to commit and
  difficult to detect
• Basic tenet for first responders at computer crime
  scenes is to observe the ON/OFF rule
• Most cybercrimes against businesses are committed by
  outsiders
• Investigating such crimes often requires a team
  approach


                                          Hess 17-28

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)GAURAV. H .TANDON
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityNeha Raju k
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comrobertleew4
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comHarrisGeorg5
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 

Was ist angesagt? (20)

Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Computer Reliability
Computer ReliabilityComputer Reliability
Computer Reliability
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
File000116
File000116File000116
File000116
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.com
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.com
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 

Andere mochten auch

Andere mochten auch (7)

Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 

Ähnlich wie Chapter 17

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.pptFaiz430036
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Muzzammil Wani
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftDamir Delija
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 

Ähnlich wie Chapter 17 (20)

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Digital forensics by vimal priya.s
Digital forensics  by vimal priya.sDigital forensics  by vimal priya.s
Digital forensics by vimal priya.s
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Hess10 chap1
Hess10 chap1Hess10 chap1
Hess10 chap1
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Srini
SriniSrini
Srini
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Schmall crim today8e_ppt_ch15
Schmall crim today8e_ppt_ch15Schmall crim today8e_ppt_ch15
Schmall crim today8e_ppt_ch15
 

Mehr von SUNY Ulster

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses finalSUNY Ulster
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipmentSUNY Ulster
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesiaSUNY Ulster
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjunctsSUNY Ulster
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementSUNY Ulster
 
Patient preparation
Patient preparationPatient preparation
Patient preparationSUNY Ulster
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to AnesthesiaSUNY Ulster
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds SUNY Ulster
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring SUNY Ulster
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 SUNY Ulster
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes SUNY Ulster
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrientsSUNY Ulster
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseSUNY Ulster
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and catsSUNY Ulster
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary InstrumentsSUNY Ulster
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)SUNY Ulster
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014SUNY Ulster
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212SUNY Ulster
 

Mehr von SUNY Ulster (20)

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses final
 
Analgesia
AnalgesiaAnalgesia
Analgesia
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipment
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesia
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjuncts
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy management
 
Patient preparation
Patient preparationPatient preparation
Patient preparation
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to Anesthesia
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrients
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac disease
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and cats
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary Instruments
 
Sutures
SuturesSutures
Sutures
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212
 

Chapter 17

  • 2. Introduction • Computer crimes are relatively easy to commit and difficult to detect • Most computer crimes are not prosecuted • Crimes involving computers have become much more sophisticated • Most computers on the planet are connected via the Internet • A new breed of detective—the cybercrime investigator Hess 17-2
  • 3. The Scope and Cost of the Problem SOURCES • IC3 2010 Internet Crime Report • 2010 CyberSecurity Watch Survey • 2010/2011 CSI Computer Crime and Security Survey • Created a fundamental change in law enforcement agencies Hess 17-3
  • 4. Terminology and Definitions COMMON TERMS • Cybercrime • Cybertechnology • Cyberspace • E-crime Hess 17-4
  • 5. Terminology and Definitions THE NET VERSUS THE WEB • Net is a network of networks • Web is an abstract space of information LIVE CHAT AND INSTANT MESSAGING • Two or more people • Talk online in real time Hess 17-5
  • 6. Classification and Types of Computer Crimes OVERVIEW • Computer as target • Computer as tool • Computer as incidental to an offense • Be aware of the ever-expanding ways Hess 17-6
  • 7. Classification and Types of Computer Crimes COMPUTER AS TARGET • Viruses and worms • Invariably involves hacking COMPUTER AS TOOL • Traditional methods elevated • Many offenses overlap Hess 17-7
  • 8. Special Challenges in Investigation OVERVIEW • Reluctance or failure to report crime • Lack of training • Need for specialists • Fragility of the evidence • Jurisdictional issues Hess 17-8
  • 9. Special Challenges in Investigation NONREPORTING OF COMPUTER CRIMES • Did not think law enforcement could help • Too insignificant to report LACK OF INVESTIGATOR TRAINING • Cybercriminals are more technologically sophisticated • Law enforcement needs additional training Hess 17-9
  • 10. Special Challenges in Investigation NEED FOR SPECIALISTS AND TEAMWORK • Cybercrime unit FRAGILITY AND SENSITIVITY OF EVIDENCE • Computer evidence is very fragile • Can be altered or damaged easily • Could be rendered unusable Hess 17-10
  • 11. Special Challenges in Investigation JURISDICTIONAL ISSUES • Traditional boundaries are complicated • Double criminality • Need for unified global approach • Federal versus state • Growing pains for this area of law Hess 17-11
  • 12. The Preliminary Investigation COMMON PROTOCOL • Secure, evaluate and document crime scene • Obtain a search warrant • Recognize, identify, collect and preserve the evidence • Package, transport and store evidence • Submit digital evidence • Document in an incident report Hess 17-12
  • 13. The Preliminary Investigation SECURING AND EVALUATING THE SCENE • Basic ON/OFF tenet • Follow departmental policy • Ensure that no unauthorized person has access • Ensure condition of electronic device is not altered • Properly document Hess 17-13
  • 14. The Preliminary Investigation OBTAINING A SEARCH WARRANT • Searches may be conducted by consent • Suspect unknown, warrant must be obtained • Have both a consent search form and a search warrant • Avoid destruction of evidence Hess 17-14
  • 15. The Preliminary Investigation RECOGNIZING EVIDENCE • Conventional  Fingerprints  Documents  Hard drive • Digital  Electronic files  E-mails Hess 17-15
  • 16. The Preliminary Investigation DOCUMENTING DIGITAL EVIDENCE • Thorough notes, sketches and photographs • Document condition and location of computer system • Photograph the entire scene • Photograph the front and back of the computer Hess 17-16
  • 17. The Preliminary Investigation COLLECTING PHYSICAL AND DIGITAL EVIDENCE • Evidence often contained on disks • Devices may have fingerprints • Avoid contact with recording surfaces • Evidence log • Chain of custody issues Hess 17-17
  • 18. The Preliminary Investigation PACKAGING, TRANSPORTING AND STORING DIGITAL EVIDENCE • Keep away from magnetic fields • Store away from humidity extremes • Do not use plastic bags • Be aware of battery needs Hess 17-18
  • 19. Forensic Examination of Computer Evidence DATA ANALYSIS AND RECOVERY • Deleted files remain on hard drive • Forensic expert can make viewable • Recycle bin • Data remanence Hess 17-19
  • 20. Legal Considerations in Collecting and Analyzing Computer Evidence WARRANT EXCEPTIONS • Contraband, fruits or instrumentalities of the crime • Prevent death or serious bodily injury • Has committed or is committing a criminal offense to which the materials relate Hess 17-20
  • 21. Follow-Up Investigation DEVELOPING SUSPECTS • Most cybercrimes committed by outsiders • Three categories  Crackers  Vandals  Criminals Hess 17-21
  • 22. Follow-Up Investigation ORGANIZED CYBERCRIME GROUPS • Generally not loyal to one another • Operate in countries with weak hacking laws UNDERCOVER INVESTIGATION AND SURVEILLANCE • Headed by computer expert • Online undercover officer Hess 17-22
  • 23. Security of the Police Department’s Computers VULNERABILITY • Access via phone lines • Critical nature of law enforcement data • Agency’s network should be a top priority • Evidence logs • Other valuable data Hess 17-23
  • 24. Legislation GOVERNMENT MEASURES • USA PATRIOT Act • Foreign Intelligence Surveillance Act (FISA) • National Security Letter (NSL) • Child Protection and Sexual Predator Punishment Act • All states have enacted tough computer crime control laws Hess 17-24
  • 25. The Investigative Team CYBER SPECIALISTS • Often requires a team approach • Equipment owner • Database technicians • Auditors • Computer experts • Programmers Hess 17-25
  • 26. Resources Available SOURCES • National Cybercrime Training Partnership (NCTP) • Electronic Crimes Task Forces (ECTFs) • Perverted Justice • NetSmartz Hess 17-26
  • 27. Preventing Computer Crime STRATEGIES • Educating top management • Educating employees • Instituting internal security precautions • Management  Commitment to defend against computer crime  Organization-wide policies Hess 17-27
  • 28. Summary • Computer crimes are relatively easy to commit and difficult to detect • Basic tenet for first responders at computer crime scenes is to observe the ON/OFF rule • Most cybercrimes against businesses are committed by outsiders • Investigating such crimes often requires a team approach Hess 17-28