Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Aided Investigations.

Slides:



Advertisements
Similar presentations
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Security Classification Practical Issues in dealing with different types of cybercrime.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Time Share Fraud Investigations
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
Security, Privacy, and Ethics Online Computer Crimes.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Note ̶ Taking and Reports.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Chapter 11 Security and Privacy: Computers and the Internet.
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
Cyber Crimes.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
Understand applications and issues of technology. 1.
Business Computing 550 Lesson 1. Fundamentals of Information Systems, Fifth Edition An Introduction to Information Systems in Organizations.
Unethical use of Computers and Networks
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Computer Security Management: Assessment and Forensics Session 8.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online.
Topic 5: Basic Security.
Chapter 1 An Introduction to Information Systems
Stockholm County Police Project on Hate Crimes Stockholm County Police Detective Inspector Wenche Déas-Mobergh Detective Sandra Emthén.
Cybercrime What is it, what does it cost, & how is it regulated?
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Chapter 17 Computer Crime Hess Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.
Chapter 11 Business and Technology Objective 2.04.
A Project on CYBER SECURITY
Year 10 ICT ECDL/ICDL IT Security.
Red Flags Rule An Introduction County College of Morris
Chapter 11 Business and Technology
Computers: Tools for an Information Age
Why do you want this grant?
Presentation transcript:

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computer Aided Investigations and Computer Crime Chapter 8

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Overview Investigative Uses of the Computer Investigative Uses of the Computer Review Questions Review Questions Opportunity for Student Questions Opportunity for Student Questions

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Learning Objectives Understand the importance of computer information systems Understand the importance of computer information systems Explain how computer technology aids the investigative function Explain how computer technology aids the investigative function Define the external investigative uses of the computer Define the external investigative uses of the computer Understand the nature and resources of the Internet Understand the nature and resources of the Internet Understand how Web sites on the World Wide Web can assist criminal investigation Understand how Web sites on the World Wide Web can assist criminal investigation Discuss the investigative procedures and legal considerations applicable to computer crime Discuss the investigative procedures and legal considerations applicable to computer crime List the characteristics and methods of operation unique to computer crime suspects List the characteristics and methods of operation unique to computer crime suspects

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computerized Information Processing Police investigations create vast amounts of data Police investigations create vast amounts of data Information must be managed to utilize it to its full potential Information must be managed to utilize it to its full potential Computer science has increased the management capacity dramatically Computer science has increased the management capacity dramatically 67% of the average police officer’s time is spent doing “paperwork” and the computer is the standard tool 67% of the average police officer’s time is spent doing “paperwork” and the computer is the standard tool

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Police Use of the Computer Internal uses Internal uses External uses External uses Internet resources Internet resources Investigating computer crime Investigating computer crime

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Internal Uses (of the Computer) Aids the internal operations of the police agency Aids the internal operations of the police agency Supervisory oversight of multiple, simultaneous investigations Supervisory oversight of multiple, simultaneous investigations Coordination and communication between patrol (preliminary report writers) and investigations (follow-up reports) Coordination and communication between patrol (preliminary report writers) and investigations (follow-up reports) –Case status –Direct communication between officers, detectives, and supervisors Efficient analysis of data Efficient analysis of data Posting of new Posting of new –Policies –Announcements –Shift openings –Retirements –Hires –Transfers –Promotions –Safety alerts –Training schedule

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Police Data Entry and Storage

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Artificial Intelligence Computers with the ability to manipulate data and infer conclusions Computers with the ability to manipulate data and infer conclusions Also know as the “expert system concept” Also know as the “expert system concept” This system matches technology and police expertise to identify potential suspects by: This system matches technology and police expertise to identify potential suspects by: –Collecting data –Storing the data –Analyzing data

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Artificial Intelligence (continued) This analysis is accomplished through information storage via databases This analysis is accomplished through information storage via databases These computers can also: These computers can also: –Check for report and investigation thoroughness by asking tutorial questions –Suggest that certain steps be taken to ensure all evidence has been located and secured –MO characteristics can be matched to a database of potential suspects –Produce a solvability score for supervisors to use in determining agency resources

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Benefits of Computers for Police Higher clearance rates Higher clearance rates Supervision has improved Supervision has improved Morale has increased Morale has increased Greater efficiency has been achieved Greater efficiency has been achieved Considerable financial and personnel resources spent on manual reporting can now be diverted to other essential areas Considerable financial and personnel resources spent on manual reporting can now be diverted to other essential areas

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ External Uses of the Computer Interagency data sharing Interagency data sharing Instant electronic access to information from: Instant electronic access to information from: –Regional departments –State agencies –Federal investigative departments Examples of shared information include: Examples of shared information include: –50 million criminal history records –Current open investigations –Lists of technical advisors for: Crime scene processing Crime scene processing Evidence Evidence Specific crimes such as homicide and sexual assault Specific crimes such as homicide and sexual assault

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Internet Resources There are national and international resources that are of benefit to the police There are national and international resources that are of benefit to the police Police are using the internet to: Police are using the internet to: –Bridge to their communities –Communicate with other police agencies The Internet allows access to information physically located in distant places The Internet allows access to information physically located in distant places One of the most useful features is the ability to engage in instant, on-line discussions or on electronic message boards One of the most useful features is the ability to engage in instant, on-line discussions or on electronic message boards

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Police Web Sites Many agencies are providing information through the use of Web sites Many agencies are providing information through the use of Web sites –History of the department –Current crime statistics –Names and descriptions of wanted fugitives –Crime prevention tips Some may (or in the future) allow citizens to Some may (or in the future) allow citizens to –File simple reports with the police –Confidentially report crime to the police The FBI posts the 10 Most Wanted on a web page The FBI posts the 10 Most Wanted on a web page

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computer Crime Computer crime is any criminal offense in which the computer is either the tool or the object of a crime Computer crime is any criminal offense in which the computer is either the tool or the object of a crime There are estimates that high-tech criminals steal $3 ̶ 5 billion annually There are estimates that high-tech criminals steal $3 ̶ 5 billion annually Most computer crimes occur in commercial settings Most computer crimes occur in commercial settings In Florida, 24% of businesses experienced computer-based crime within the last 12 months In Florida, 24% of businesses experienced computer-based crime within the last 12 months Less than 15% of computer crime is reported Less than 15% of computer crime is reported

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computer Crime– Suspect MO Information may be altered Information may be altered Data may be obliterated Data may be obliterated Programs can be altered, added, or deleted Programs can be altered, added, or deleted Data output may be altered Data output may be altered Data access for intelligence purposes Data access for intelligence purposes

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Six Basic Motivations for Computer Crime Monetary gain Monetary gain Property resale Property resale Intelligence gathering Intelligence gathering Destruction of the system Destruction of the system Criminal record keeping Criminal record keeping Predatory stalking Predatory stalking

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Monetary Gain  One of the most common ways is to divert incoming funds  Adding fictitious costs to items purchased  Indirect monetary gain is when computers are used for unauthorized purposes  Using the computer for non-company work  Working on private business on company computers  Software theft  Cellular phone account fraud

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ “Hackers” Attacking the Home Computer Vast amounts of personal and financial information is stored on personal computers Vast amounts of personal and financial information is stored on personal computers –The information is vulnerable Connected directly to the Internet Connected directly to the Internet High-speed cable lines remain open all the time High-speed cable lines remain open all the time –Personal computers are generally as powerful as business computers…and as complicated –Hacking into computers is more common than people think –Most people open too many s that may contain malicious programs designed to secure financial information

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computers Used for Property Diversion and Resale Either by an employee (common) or an external “hacker” Either by an employee (common) or an external “hacker” Property is diverted from stock to individuals or business without full payment (or any) Property is diverted from stock to individuals or business without full payment (or any) –Orders can be enlarged –Customers can fictitious –Accounts can be fictitious

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computers Used for Illegal Intelligence Gathering Computers store sensitive information Computers store sensitive information –Marketing information –Product development –Secret recipes for valuable products –Government records Police investigations Police investigations Informant identifications Informant identifications Tax records Tax records School records (including grades) School records (including grades) Information that require passwords are vulnerable Information that require passwords are vulnerable –Codes can be broken –Internal employees who are code holders may be involved

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Destruction of a Computer Many components of a computer are susceptible to damage or destruction Many components of a computer are susceptible to damage or destruction –Physical destruction of hardware –Information stored on hard drives –Software Typical offenders include: Typical offenders include: –Disgruntled employees (or past employees) –Those with a motive (those who may object to the business in some way)

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Criminal Record Keeping Using the Computer Computers are frequently used by those who break the law Computers are frequently used by those who break the law –To store records –Keep track of cash transfers Criminal activity associated with computers include: Criminal activity associated with computers include: –Narcotics –Gambling –Loan-sharking –Money laundering –Sexual predators –Child pornography Computers are now often included in search warrants Computers are now often included in search warrants

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Predatory Stalking on the Computer Those who use computers to stalk are commonly referred to as “cyberstalkers” Those who use computers to stalk are commonly referred to as “cyberstalkers” –They harass and/or intimidate victims –They also target victims for rape and other sex crimes Sex crimes are committed on the computer Sex crimes are committed on the computer –Soliciting minors for sexual activities –Exchange, sell, and store child pornography It is a violation of federal law to create, possess, or disseminate child pornography It is a violation of federal law to create, possess, or disseminate child pornography Law enforcement now routinely investigates child sex offenders who are operating on the Internet Law enforcement now routinely investigates child sex offenders who are operating on the Internet –Federal laws exist –All states have laws specifically covering cyberstalking

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computer Crime– Suspect Characteristics With the exception of the predatory offender, many computer criminals generally follow the profile common to the white-collar offender Above average intelligence Above average intelligence Otherwise highly honest Otherwise highly honest Have the attitude of “the little guy against the system” Have the attitude of “the little guy against the system” This offender is young (under 35), white, well educated, highly motivated, and is a first-time offender This offender is young (under 35), white, well educated, highly motivated, and is a first-time offender Occupation of this offender is often a computer programmer or operator Occupation of this offender is often a computer programmer or operator

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Investigating Computer Crime Computer forensics training can be obtained from Computer forensics training can be obtained from –The National White Collar Crime Center –The Bureau of Justice Assistance (U.S. DOJ) From the beginning of the investigation, officers must perceive the similarity of electronic evidence to standard, more familiar evidence From the beginning of the investigation, officers must perceive the similarity of electronic evidence to standard, more familiar evidence All electronic evidence is typically latent in nature All electronic evidence is typically latent in nature –The evidence cannot be initially seen but must be made visible by special means –Data exists as electronic impulses

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Investigative Methods Identify the computer and seize the computer legally and forensically Identify the computer and seize the computer legally and forensically –Search warrant –Use competent technicians to seize the computer correctly to avoid data being lost or destroyed Identify who had access to the computer Identify who had access to the computer Identify who had a motive Identify who had a motive Determine who had the knowledge and skill to accomplish the crime Determine who had the knowledge and skill to accomplish the crime Conduct a background on all suspects Conduct a background on all suspects Interview the suspect (this is a critical step) Interview the suspect (this is a critical step) Follow the money (banks, credit cards, large purchases, etc.) Follow the money (banks, credit cards, large purchases, etc.)

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Other Investigative Methods The task force The task force –Multi-agency groups that pool resources to investigate Internet fraud Internet fraud Child pornography Child pornography Computer hacking Computer hacking Computer viruses Computer viruses Identity theft Identity theft Proactive electronic undercover tactics Proactive electronic undercover tactics

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Legal Considerations The first law to specifically address the problem of computer misuse was the Federal Computer Systems Protection Act of 1977 The first law to specifically address the problem of computer misuse was the Federal Computer Systems Protection Act of 1977 All states currently have computer crime laws as well and make it unlawful to: All states currently have computer crime laws as well and make it unlawful to: –Enter a computer system without authorization –Steal information –Cause a system to go out of service

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Review Questions 1. List some of the internal police uses of the computer. 2. How do computers aid law enforcement in efficiency? 3. How are computers used to solve crimes? 4. How is the Internet used by investigators? 5. Define ‘computer crime.’ 6. List the six motives for committing a crime involving a computer. 7. What is a cyberstalker? 8. What are some law enforcement strategies to investigate child pornography?

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Student Questions