CYBER CRIME

CYBER CRIME

Chapter 10

Objectives

· Develop an appreciation for computer forensics

· Discuss some of the challenges associated with computer investigations

· Learn the five categories of software that can be used in computer investigation

Details:

I. Emergence of Computer Forensics

· Introduction of computer technology has created a new wave of illegitimate behavior and skilled criminals

· Prompted Law Enforcement (LE) profession to create computer forensic techniques which accomplish the following goals:

· Enables LE to protect privileged information, maintain the integrity of potential evidence and ensures timely processing of evidence

· Establishes procedures for the recovery, preservation and analysis of digital evidence

· Private Sector Benefits:

· Corporations: obtain evidence relating to sexual harassment, embezzlement, theft or misappropriation of trade secrets-confidential information

· Individuals: support of claims of wrongful termination, sexual harassment or age discrimination

· Civil Litigators: personal and business records which relate to fraud, divorce, discrimination and harassment

II. Law Enforcement Challenges in Computer Investigations

· Cyberphobia: fear of new technology by LE

· Lack of financial resources to procure forensic software and training of personnel

· Lack of communication and cooperation among LE agencies

· Over-reliance on automated programs and self-proclaimed Experts

· Low frequency of reporting computer-related crime by individuals and corporations due to lack of confidence in LE

· Evidence corruption: failure to follow the three major rules in handling computer evidence:

· Always work from an image, leaving the original intact

· Always document

· Maintain the chain of custody

III. Software Used in Computer Investigations

· Data preservation, duplication and verification tools

· Data recovery/extraction tools

· Data analysis tools

· Data reporting tools

· Network utilities


Comments are closed.