SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Module LII - How to Become a Digital
Detective
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Study of Internet Crimes
Against People and Children
Mid-Missouri task force sees great potential for growth.
By JOE MEYER of the Tribune’s staff
Published Sunday, January 18, 2009
As the Mid-Missouri Internet Crimes Task Force enters its third year, investigators said there is plenty of
work to do as online predators come up with new ways of preying on children.
"It’s just going to get crazy," task force Detective Tracy Perkins said. "Technology is going to eat us alive,
but we’ll just have to combat it however we can."
One of 10 Internet task forces in the state, the Mid-Missouri group serves seven Mid-Missouri counties
and has partnerships with 20 area law enforcement agencies, Detective Andy Anderson said.
It started in January 2007 investigating online crimes against children and now employs three Boone
County sheriff’s detectives as well as a University of Missouri police captain who works part time with
the task force. A Columbia police detective is expected to rejoin the unit this year after completing a tour
of duty in Kosovo.
In their offices south of Columbia, at 5551 S. Highway 63, task force detectives keep on each desk several
computer monitors to use in conducting undercover online investigations. They also use the computers
in their examinations of computer hardware seized with court-ordered search warrants.
Anderson has led the local effort in pursuing online predators, working Internet crimes since 1999. He
has been investigating crimes against children for more than 20 years with the sheriff’s department.
Anderson hopes additional state grant funding can lead to expansion of the task force.
Cases investigated by the task force have a broad reach, resulting in suspects arrested across Missouri as
well as other states on state and federal charges. And earlier this month, felony charges were filed
against a Missouri man serving as an Army reservist in Iraq. He is accused of exposing himself over the
Web to a task force investigator posing online as a teenage girl.
Source: http://www.columbiatribune.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Herhold: Digital Clues Add Insight
to Achilli Slaying in Los Gatos
By Scott Herhold
Posted: 01/05/2009 07:31:17 PM PST
In the old days, detectives used physical clues to solve crimes: Colonel Mustard killed Miss Scarlet in
the living room with a candlestick because nothing else made sense.
In our brave new electronic world, we employ Google searches, BIOS clocks and text messages. And
nothing illustrates the tracks left in the digital snow better than the Mark Achilli murder case.
The prosecution wrapped up its testimony Monday in the preliminary hearing for three men accused of
Achilli's murder: Esequiel "Paul" Garcia, 30, the bar and restaurant owner alleged to have paid for the
killing; Miguel Chaidez, 22, a Southern Californian who allegedly arranged logistics; and Lucio Estrada,
25, the suspected triggerman.
Online evidence
The prosecution's witnesses centered on one powerful piece of digital evidence — a Metroactive.com
picture of the victim, Achilli, outside the 180 Restaurant & Lounge before he sold the club and
Mountain Charley's saloon to Garcia in September 2007.
Police say the gunman used a copy of that picture to identify his mark in the March 14 murder at 18400
Overlook Road in Los Gatos. The image was left torn in two in bushes not far from the scene.
What was new Monday were the details of who had sought to view the same online picture of the
somewhat bedraggled entrepreneur standing next to the logo for his club.
Source: http://www.mercurynews.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Digital Detective
• Roles and Responsibilities of Digital Detectives
• Traits of a Digital Detective
• Technical Skills of Digital Detective
• Qualification of Digital Detectives
• Wider Competencies of a Digital Detective
• Computer Forensics Training and Certification
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Digital Detective
Technical Skills of
Digital Detective
Computer Forensics Training
and Certification
Qualification of Digital Detectives
Wider Competencies of
a Digital Detective
Traits of a Digital Detective
Roles and Responsibilities of
Digital Detectives
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Detective
Digital detective is an agency or person specialized in
computer forensics and network security
They are trained experts to detect and investigate
crimes ranging from crimes against children to file
system recovery on computers that have been damaged
or hacked
They act as expert witness in criminal and civil litigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Roles and Responsibilities of
Digital Detectives
Handling, investigation, management, protection, detection
and reaction of computer and network security incidents
Examining and recovering information from computers and
other data storage devices
Taking apart computers and reconstructing damaged systems
to find and locate evidence on the machine
Preparing reports on information found or located on
computers, hard-drives and other memory devices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Roles and Responsibilities of
Digital Detectives (cont’d)
Testifying in court regarding evidence collected and the methods
used to collect the evidence
Presenting digital evidence in the court of law during trial of the
case
Study of Internet crimes against people and children
Research and keeping updated of Internet and computer crimes
and methods used to gather evidence
Training other police and law enforcement officers on how to
handle computer related issues and collect evidence from
computers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Traits of a Digital Detective
Physically and psychologically fit with
an analytical bent of mind
Understanding of criminology that
involves knowledge of nature of crime
and methods to verify criminal acts
Understanding of psychology of
criminals
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Technical Skills
• Knowledge and skills of computer forensics, including
the use of computer forensic tools, techniques and
methodologies
• Knowledge and skills in operating systems and/or
computer and network security
• Ability to research and develop electronic investigation
methodologies, tools and legislative requirements as
required
Digital detectives should have:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Qualification of Digital Detectives
Digital detective should have strong interest in computers
and technology, and the zeal to learn new things
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Wider Competencies
Complex thinking
Interdisciplinary thinking
Flexibility
Ability to concentrate
Able to react/respond quickly
Observant
Creativity
Accuracy
Ability to co-ordinate
Logical/analytical thinking
Able to think abstractly
Good communication skills
Good social skills
Able to work in a team
Sense of responsibility
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Computer Forensics Training
and Certification
Training and Certification give credence to
the ability of investigators
It helps in career growth as an investigator
Courts accept evidence from the certified
professionals
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Join Online Forums
Online forums have lot of information regarding new techniques
and new ways of investigating crime
Study of newsletters and previous cases helps during investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Knowledge About Law
Digital detectives should be aware of forensic laws and jurisdictional
issues
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Digital detective is an agency or person specialized in computer forensics and network
security
Handling, investigation, management, protection, detection and reaction of computer and
network security incidents are the main roles and responsibilities of digital detectives
Digital detectives may be required to testify in court regarding evidence collected and the
methods used to collect the evidence
Digital detectives should have knowledge and skills in computer forensics, including the
use of computer forensic tools, techniques and methodologies
Digital detective should have strong interest in computers and technology, and the will to
continue learning
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Weitere ähnliche Inhalte

Was ist angesagt?

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One CityFelicia Nelson
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 

Was ist angesagt? (20)

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
File000098
File000098File000098
File000098
 
CHFI
CHFICHFI
CHFI
 
File000166
File000166File000166
File000166
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
File000168
File000168File000168
File000168
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
File000116
File000116File000116
File000116
 
File000164
File000164File000164
File000164
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
File000095
File000095File000095
File000095
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
File000097
File000097File000097
File000097
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 

Andere mochten auch (20)

File000163
File000163File000163
File000163
 
File000174
File000174File000174
File000174
 
File000170
File000170File000170
File000170
 
File000175
File000175File000175
File000175
 
File000142
File000142File000142
File000142
 
File000149
File000149File000149
File000149
 
File000128
File000128File000128
File000128
 
File000117
File000117File000117
File000117
 
File000152
File000152File000152
File000152
 
File000136
File000136File000136
File000136
 
File000135
File000135File000135
File000135
 
File000141
File000141File000141
File000141
 
File000150
File000150File000150
File000150
 
File000169
File000169File000169
File000169
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
File000171
File000171File000171
File000171
 
File000148
File000148File000148
File000148
 
File000113
File000113File000113
File000113
 
File000172
File000172File000172
File000172
 
File000145
File000145File000145
File000145
 

Ă„hnlich wie How to Become a Digital Detective

Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.pptHODCSEKncet
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrimeRoel Palmaers
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsICFECI
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesAnamZunaira
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 

Ă„hnlich wie How to Become a Digital Detective (20)

Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
File000114
File000114File000114
File000114
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
The digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigationsThe digital forensic examinations and criminal investigations
The digital forensic examinations and criminal investigations
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 

Mehr von Desmond Devendran

Mehr von Desmond Devendran (12)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000173
File000173File000173
File000173
 
File000162
File000162File000162
File000162
 
File000156
File000156File000156
File000156
 
File000153
File000153File000153
File000153
 

KĂĽrzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

KĂĽrzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

How to Become a Digital Detective

  • 1. Module LII - How to Become a Digital Detective
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Study of Internet Crimes Against People and Children Mid-Missouri task force sees great potential for growth. By JOE MEYER of the Tribune’s staff Published Sunday, January 18, 2009 As the Mid-Missouri Internet Crimes Task Force enters its third year, investigators said there is plenty of work to do as online predators come up with new ways of preying on children. "It’s just going to get crazy," task force Detective Tracy Perkins said. "Technology is going to eat us alive, but we’ll just have to combat it however we can." One of 10 Internet task forces in the state, the Mid-Missouri group serves seven Mid-Missouri counties and has partnerships with 20 area law enforcement agencies, Detective Andy Anderson said. It started in January 2007 investigating online crimes against children and now employs three Boone County sheriff’s detectives as well as a University of Missouri police captain who works part time with the task force. A Columbia police detective is expected to rejoin the unit this year after completing a tour of duty in Kosovo. In their offices south of Columbia, at 5551 S. Highway 63, task force detectives keep on each desk several computer monitors to use in conducting undercover online investigations. They also use the computers in their examinations of computer hardware seized with court-ordered search warrants. Anderson has led the local effort in pursuing online predators, working Internet crimes since 1999. He has been investigating crimes against children for more than 20 years with the sheriff’s department. Anderson hopes additional state grant funding can lead to expansion of the task force. Cases investigated by the task force have a broad reach, resulting in suspects arrested across Missouri as well as other states on state and federal charges. And earlier this month, felony charges were filed against a Missouri man serving as an Army reservist in Iraq. He is accused of exposing himself over the Web to a task force investigator posing online as a teenage girl. Source: http://www.columbiatribune.com/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Herhold: Digital Clues Add Insight to Achilli Slaying in Los Gatos By Scott Herhold Posted: 01/05/2009 07:31:17 PM PST In the old days, detectives used physical clues to solve crimes: Colonel Mustard killed Miss Scarlet in the living room with a candlestick because nothing else made sense. In our brave new electronic world, we employ Google searches, BIOS clocks and text messages. And nothing illustrates the tracks left in the digital snow better than the Mark Achilli murder case. The prosecution wrapped up its testimony Monday in the preliminary hearing for three men accused of Achilli's murder: Esequiel "Paul" Garcia, 30, the bar and restaurant owner alleged to have paid for the killing; Miguel Chaidez, 22, a Southern Californian who allegedly arranged logistics; and Lucio Estrada, 25, the suspected triggerman. Online evidence The prosecution's witnesses centered on one powerful piece of digital evidence — a Metroactive.com picture of the victim, Achilli, outside the 180 Restaurant & Lounge before he sold the club and Mountain Charley's saloon to Garcia in September 2007. Police say the gunman used a copy of that picture to identify his mark in the March 14 murder at 18400 Overlook Road in Los Gatos. The image was left torn in two in bushes not far from the scene. What was new Monday were the details of who had sought to view the same online picture of the somewhat bedraggled entrepreneur standing next to the logo for his club. Source: http://www.mercurynews.com/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Digital Detective • Roles and Responsibilities of Digital Detectives • Traits of a Digital Detective • Technical Skills of Digital Detective • Qualification of Digital Detectives • Wider Competencies of a Digital Detective • Computer Forensics Training and Certification This module will familiarize you with:
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Digital Detective Technical Skills of Digital Detective Computer Forensics Training and Certification Qualification of Digital Detectives Wider Competencies of a Digital Detective Traits of a Digital Detective Roles and Responsibilities of Digital Detectives
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Digital Detective Digital detective is an agency or person specialized in computer forensics and network security They are trained experts to detect and investigate crimes ranging from crimes against children to file system recovery on computers that have been damaged or hacked They act as expert witness in criminal and civil litigation
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Roles and Responsibilities of Digital Detectives Handling, investigation, management, protection, detection and reaction of computer and network security incidents Examining and recovering information from computers and other data storage devices Taking apart computers and reconstructing damaged systems to find and locate evidence on the machine Preparing reports on information found or located on computers, hard-drives and other memory devices
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Roles and Responsibilities of Digital Detectives (cont’d) Testifying in court regarding evidence collected and the methods used to collect the evidence Presenting digital evidence in the court of law during trial of the case Study of Internet crimes against people and children Research and keeping updated of Internet and computer crimes and methods used to gather evidence Training other police and law enforcement officers on how to handle computer related issues and collect evidence from computers
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Traits of a Digital Detective Physically and psychologically fit with an analytical bent of mind Understanding of criminology that involves knowledge of nature of crime and methods to verify criminal acts Understanding of psychology of criminals
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Technical Skills • Knowledge and skills of computer forensics, including the use of computer forensic tools, techniques and methodologies • Knowledge and skills in operating systems and/or computer and network security • Ability to research and develop electronic investigation methodologies, tools and legislative requirements as required Digital detectives should have:
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Qualification of Digital Detectives Digital detective should have strong interest in computers and technology, and the zeal to learn new things
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wider Competencies Complex thinking Interdisciplinary thinking Flexibility Ability to concentrate Able to react/respond quickly Observant Creativity Accuracy Ability to co-ordinate Logical/analytical thinking Able to think abstractly Good communication skills Good social skills Able to work in a team Sense of responsibility
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Computer Forensics Training and Certification Training and Certification give credence to the ability of investigators It helps in career growth as an investigator Courts accept evidence from the certified professionals
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Join Online Forums Online forums have lot of information regarding new techniques and new ways of investigating crime Study of newsletters and previous cases helps during investigation
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Knowledge About Law Digital detectives should be aware of forensic laws and jurisdictional issues
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Digital detective is an agency or person specialized in computer forensics and network security Handling, investigation, management, protection, detection and reaction of computer and network security incidents are the main roles and responsibilities of digital detectives Digital detectives may be required to testify in court regarding evidence collected and the methods used to collect the evidence Digital detectives should have knowledge and skills in computer forensics, including the use of computer forensic tools, techniques and methodologies Digital detective should have strong interest in computers and technology, and the will to continue learning
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited