Violent Crime and Digital Evidence. Challenges Violent crimes are challenging to investigate – the severe behavior that is involved, – the complexity.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Assault, Domestic Violence, Stalking and Elder Abuse
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 6 INTERVIEWS Obtaining Information from Witnesses (Acquiring information.
Criminal Justice 2011 Chapter 10: ROBBERY
2 Language of Computer Crime Investigation
Crime Scene Investigation
Crime Scene Basics. The Crime Scene Crime Scene- any physical location in which a crime has occurred or is suspected of having occurred – Classifications:
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offense took place  When officers first arrive at the crime.
Crime Scene Investigation
Crime Scene Investigation Forensic Science Mr. Glatt
Law Enforcement Response to Abuse, Neglect or Exploitation of Older Adults and Persons with Disabilities 1.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 3 THE CRIME SCENE Discovery, Preservation, Collection, and Transmission of.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
PROCESSING EVIDENCE.
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 6 INTERVIEWS Obtaining Information from Witnesses Criminal Investigation:
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
UNIT III.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Computer Forensics Principles and Practices
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offence took place  When officers first arrive at the crime.
I’ll get a good education along the way. I’ll get to help people. I’ll make $30-60,000 a year And mainly because I like mysteries!!
Digital Evidence in Violent crime John P. Abraham Professor UTPA.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
8Investigative Reconstruction with Digital Evidence
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Crime Scene Investigation & Evidence Collection
Forensic Science T. Trimpe 2006
Julie McDonald And Alli Hicks. Criminal Profiling The analysis of the behavior and circumstances associated with serious crimes in an effort to identify.
The Crime Scene “Oh, how simple it would have been had I been here before they came like a herd of buffalo and wallowed all over it.” A. Conan Doyle, The.
FBI Method of Profiling Violent Serial Offenders
The Crime Scene SFS1. Students will recognize and classify various types of evidence in relation to the definition and scope of Forensic Science. b. Distinguish.
IT IS ALL ABOUT THE CRIME Unit 7 – Recovering files & Network Forensics CJ Dr. Joe Ciccone.
Material Covered in Assignment 4-2: The Duty of Confidentiality (p.376) A. Individuals to Whom a Duty of Confidentiality is Owed (p.376) [Rules 1.9, 1.18;
Quiz #2 Chapter 3 Forensic Science 9/27/14. Drill Any questions from Chapter 3? Phones in the bin & grab two folders Make sure you have Pencil/pen Calculator.
11Digital Evidence as Alibi Dr. John P. Abraham Professor UTPA.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Forensic Science: Fundamentals & Investigations, Chapter 2 1 Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you.
Forensic Science T. Trimpe 2006
What laws should the police focus on?. A case in the news... Find out why Christopher Halliwell nearly got away with murder. 'Don't ask me why because.
Basic Forensics The Scene of the Crime. I. Forensic vocabulary A. Crime Scene: Physical location where a crime may have occurred. 1. Primary Crime Scene:
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
What Is Police Misconduct? Any action performed by a law enforcement officer that is criminal, unconstitutional, or against established rules, regulations,
The Crime Scene “Oh, how simple it would all have been had I been there before they came like a herd of buffalo and wallowed all in it.” -A. Conan Doyle,
Crime Scene Investigation
Crime Scene Basics STEM Forensics.
Goal: to recognize, document and collect evidence at a crime scene
Julie McDonald And Alli Hicks
Unit-III Violent Crime and Digital Evidence
(Discussion – Impression Evidence Part 1)
Crime Scene Investigation
CLICKCEOP : MSN Messenger Live
Crime Scene Investigation
“Impressive” Evidence.
Crime Scene Investigation
Crime Scene Investigation
Science of Crime Scenes
Crime Scene Investigation
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Presentation transcript:

Violent Crime and Digital Evidence

Challenges Violent crimes are challenging to investigate – the severe behavior that is involved, – the complexity of formative events and – relationships. That is to say, these types of crimes do not happen in a vacuum. – CASE EXAMPLE (MARYLAND, 2010) – After arresting Jason Scott for allegedly killing a mother and daughter, Delores and Ebony Dewitt, police searched his home and found various sources of digital evidence. The digital evidence included a memory stick with photographs

The Role OF Computers IN Violent CRIME )Cybertrails – Computers may contain useful information about the Internet activities of individuals involved in a violent crime. For instance, communications between the victim and offender, especially in cases of intimate homicide. the planning and commission of the crime. – Data from Internet service providers used by the victim or suspect can also help determine their activities around the time of the crime, their whereabouts, and their identity. serial murderer Maury Travis was tracked down using the IP address he used when accessing an online map Web site.

CASE EXAMPLE (NEW HAMPSHIRE, 2001) Two teenagers, stabbed and killed professors in their home.,had purchased the murder weapons, SOG Seal 2000 knives, on the Internet. Police tracked purchases of such knives and interviewed the teen- agers but did not initially suspect them. After being interviewed by police, the teenagers contacted each other over Instant Messenger and agreed to flew to California. Police were ultimately able to link the murder weapon to teenagers, and apprehended them.Both received a life sentenceand 25 years to life.

Figure 1.1 Copyright © 2011 Academic Press Inc. FIGURE 10.1 Diagram depicting potential sources of digital evidence linking the victim of a violent crime with the offender and crime scenes.

THE ROLE OF MOBILE DEVICESIN VIOLENT CRIME Mobile devices may contain – information about communications – audio or video recordings relating to an offense. – location of victims and suspects at key times. – In one homicide case, Joe O’Reilly claimed that he was at work when his wife was killed but his cell phone location showed him traveling from work to the scene of the crime and then returning to work. His location and the direction he was moving were confirmed by digital evidence obtained from CCTV cameras.

THE ROLE OF PERSONAL COMPUTERS IN VIOLENT CRIME A victim’s computer may contain – a diary – frequently retain sent and received s that offer a unique view into his/her personal life. – can include evidence of criminal activity, – and clandestine relationships that even friends and family do not know about. Digital evidence may be useful for locating a missing person when it contains clues of whom she communicated with and where she might have gone.

THE ROLE OF PRIVATE NETWORKS IN VIOLENT CRIME privately owned networks can also be a rich source of information Information gathered in digital form by other businesses such as – banks, – telecommunication providers, – credit card companies, and – electronic toll collection systems – can reveal a significant amount about an individual’s whereabouts and activities. CASE EXAMPLE (CHESHIRE, UNITED KINGDOM) In the U.K. case involving Dr. Harold Shipman, changes he made to computerized medical records on his medical office computer system were instrumental in convicting him of killing hundreds of patients. Shipman used to maintain patient records, investiga- tors found that the program kept an audit trail, recording changes made to patient records. This audit trail indicated that Shipman had lied about patients’ symptoms and made backdated modifications to records to conceal the mur- ders. Had the investigators accepted the patient records without digging deeper into their authenticity, they would have missed this key piece of evidence about the cover- up attempt.

THE ROLE OF INTENT AND MOTIVE IN VIOLENT CRIME In addition to providing concrete leads, a murderer’s computer or mobile device may disprove offender statements, show his intent to commit a crime, and uncover evidence of staging such as a fake suicide note created after the victim’s death. For instance, Reverend William Guthrie was sentenced to life in prison partly on the basis of digital evidence showing that he used a computer to search online for ways to kill his wife and to fabricate a suicide note sev- eral months after her death

PROCESSING THE DIGITAL CRIME SCENE wear nitrile gloves to prevent their fingerprints from transferring onto objects and to protect their skin from hazardous substances Authorization(searches with/without a warrant.) Preparation: Make a Plan, Follow the Plan Crime Scene Survey and Documentation – (Overlooked Evidence :During an internal investigation in a large corporation, one server that had been preserved on a rack of a dozen other systems was central to the investigation. The server had been put in place without the knowledge of upper management and was being used against corporate policy to monitor online activities of various employees.) Enterprise Networks as Evidence – to collect the content of network activities and telephone conversations – care must be taken not to put too much trust in those who run the systems for a number of reasons, including the following: They may not have a forensic background, leading to lost or tainted evidence. They have interest in protecting the organization from liability or negative press They could be a friend of the victim and try to protect the victim’s data. They may be the offender.

INVESTIGATIVE RECONSTRUCTION Pulling all evidence together and letting it speak for itself. Consider alternative explanations for a given piece of evidence rather than jumping to a conclusion on the basis of personal bias or past experience.

INVESTIGATIVE RECONSTRUCTION Offender Behavior – to look for behaviors that leave digital traces. Victimology – Victimology is the assessment of the victim as they relate to the offender, the crime scene, the incident, and the criminal justice system. Crime Scene Characteristics – crime scenes fall into two categories— – Primary: where the violent offense occurred and – Secondary: where the victim was abducted and where the offender discarded clothes, weapons, and digital devices. Computers and mobile devices are treated as secondary crime scenes in violent crime investigations