Applications with Warrants In Mind. The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature.

Slides:



Advertisements
Similar presentations
Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
Advertisements

The Fourth Amendment What Are Your Rights? Mr. Carr Social Studies.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Intro to Computer Forensics CSC 485/585. Objectives  Understand the roles and responsibilities of a computer forensic examiner.  Understand the “Safety.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Suspects Rights Amendments 4, 5 and 6. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
The M57 Patents Case Investigating criminal activity within m57.biz
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
PMI Inventory Tracker™
INTRODUCTION TO THE LAW OF EVIDENCE
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
CRIMINAL LAW 2.5 INVESTIGATION & PRE-TRIAL PROCEEDINGS.
4th Amendment.
Guide to Computer Forensics and Investigations, Second Edition
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
Searching and Seizing -- Warrants and Evidence 1 Computer Forensics BACS Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
COMPUTER FORENSICS Chapter 2: Understanding Data Recovery.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
The Warrant Process Chapter Three All Images © Microsoft Corporation Written by Karmel Tanner May 2010.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
The Criminal Justice Process
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
How to use WS_FTP A Step by Step Guide to File Transfer.
Instructions for using this template. Remember that where I have written “Answer” is the prompt the students will see, and where I have “Question” should.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Know what a computer is used for Understand the difference between hardware and software Be able to describe the way that data is stored in a computer.
Arrest and Detention. Police must follow procedures codified in the Criminal Code Police must follow procedures codified in the Criminal Code If they.
Search Warrants. A search warrant… is a legal order, signed by a judge, allowing law enforcement to search a particular area or premises. Search warrants.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
PROCESSES OF CRIMINAL LAW: BEFORE THE TRIAL Law 12.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
Todays Routine Self Assessment Guided notes Small Groups Case Analysis and Discussion Whole Class Case Analysis Follow up Reflection.
CJA 364 Week 3 Individual Criminal Procedure Probable Cause Article Summary Locate a recent news article on the Internet, concerning probable cause and.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Criminal Law 2.5 Investigation & Pre-Trial Proceedings
Courts System Search Warrants.
Chapter 7: Investigating Theft Acts
The University of Adelaide, School of Computer Science
Chapter 3 First Response.
Computer Forensics Discovery and recovery of digital evidence
Search and Seizure Concepts
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Criminal Procedure: Theory and Practice, 2d.
Pre-Trial Procedures Search and Seizure.
Search & Seizure The act of taking possession of this property.
On-Site Investigations
Presentation transcript:

Applications with Warrants In Mind

The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature of computers and electronics  Probable cause  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature of computers and electronics  Probable cause

Search and Seizure  Basically identical to previous laws with exceptions to the actual allowable procedure for searching and/or seizing.  In both cases a warrant must be obtained before searching and seizing, but the conditions for each are different.  The exemption to a warrant is probable cause, but this is difficult for electronics  Basically identical to previous laws with exceptions to the actual allowable procedure for searching and/or seizing.  In both cases a warrant must be obtained before searching and seizing, but the conditions for each are different.  The exemption to a warrant is probable cause, but this is difficult for electronics

The Process  Crime is suspected  Suspects are watched  Their system is qualitatively analyzed  When enough substantial evidence is acquired a warrant is requested and granted by a magistrate judge.  They go to physically analyze the system  Crime is suspected  Suspects are watched  Their system is qualitatively analyzed  When enough substantial evidence is acquired a warrant is requested and granted by a magistrate judge.  They go to physically analyze the system

Important things to Think about  The criminal computers are in most cases standard PC’s or laptops, but also are many times servers.  It is important to know what OS the machine is running.  Is the machine booby trapped?  Where should I look for data?  The criminal computers are in most cases standard PC’s or laptops, but also are many times servers.  It is important to know what OS the machine is running.  Is the machine booby trapped?  Where should I look for data?

The File System  Are the desired files hidden within other data types  Could the files be in hidden (invisible) directories  What programs could be running?  Is there a program set to wipe the whole drive upon boot up if a special password or key is not entered.  Are the desired files hidden within other data types  Could the files be in hidden (invisible) directories  What programs could be running?  Is there a program set to wipe the whole drive upon boot up if a special password or key is not entered.

Time constraints  How long will it take to get the warrant?  With proper evidence it should not take long.  How long will the warrant last?  Usually the warrant will last about a month.  How long is too long to hold on to a suspects computer?  Depends on the nature and size of system.  How long will it take to get the warrant?  With proper evidence it should not take long.  How long will the warrant last?  Usually the warrant will last about a month.  How long is too long to hold on to a suspects computer?  Depends on the nature and size of system.

Analyzing the Evidence  Much of the work in analyzing a system is hardware related  In most cases the first thing to do is make a copy of the hard drive  Once a hard copy is made they data can be sorted with out worry of contamination  They use hard drive duplicators  Much of the work in analyzing a system is hardware related  In most cases the first thing to do is make a copy of the hard drive  Once a hard copy is made they data can be sorted with out worry of contamination  They use hard drive duplicators

Forensics Software  SubRosaSoft in addition to making data recovery software for consumers and IT professionals also makes forensics software  MacForensicsLab keeps track of every action and window/button click; records date time of action.  SubRosaSoft in addition to making data recovery software for consumers and IT professionals also makes forensics software  MacForensicsLab keeps track of every action and window/button click; records date time of action.

Acknowledgements  Pictures in slides taken from image.google.com unless a link is provided on the particular slide indicating otherwise  Law information provided from US department of Justice  &smanual2002.htm  Pictures in slides taken from image.google.com unless a link is provided on the particular slide indicating otherwise  Law information provided from US department of Justice  &smanual2002.htm