Presentation is loading. Please wait.

Presentation is loading. Please wait.

Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Aided Investigations.

Similar presentations


Presentation on theme: "Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Aided Investigations."— Presentation transcript:

1 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Aided Investigations and Computer Crime Chapter 8

2 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Overview Investigative Uses of the Computer Investigative Uses of the Computer Review Questions Review Questions Opportunity for Student Questions Opportunity for Student Questions

3 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Learning Objectives Understand the importance of computer information systems Understand the importance of computer information systems Explain how computer technology aids the investigative function Explain how computer technology aids the investigative function Define the external investigative uses of the computer Define the external investigative uses of the computer Understand the nature and resources of the Internet Understand the nature and resources of the Internet Understand how Web sites on the World Wide Web can assist criminal investigation Understand how Web sites on the World Wide Web can assist criminal investigation Discuss the investigative procedures and legal considerations applicable to computer crime Discuss the investigative procedures and legal considerations applicable to computer crime List the characteristics and methods of operation unique to computer crime suspects List the characteristics and methods of operation unique to computer crime suspects

4 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computerized Information Processing Police investigations create vast amounts of data Police investigations create vast amounts of data Information must be managed to utilize it to its full potential Information must be managed to utilize it to its full potential Computer science has increased the management capacity dramatically Computer science has increased the management capacity dramatically 67% of the average police officer’s time is spent doing “paperwork” and the computer is the standard tool 67% of the average police officer’s time is spent doing “paperwork” and the computer is the standard tool

5 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Use of the Computer Internal uses Internal uses External uses External uses Internet resources Internet resources Investigating computer crime Investigating computer crime

6 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Internal Uses (of the Computer) Aids the internal operations of the police agency Aids the internal operations of the police agency Supervisory oversight of multiple, simultaneous investigations Supervisory oversight of multiple, simultaneous investigations Coordination and communication between patrol (preliminary report writers) and investigations (follow-up reports) Coordination and communication between patrol (preliminary report writers) and investigations (follow-up reports) –Case status –Direct communication between officers, detectives, and supervisors Efficient analysis of data Efficient analysis of data Email Email Posting of new Posting of new –Policies –Announcements –Shift openings –Retirements –Hires –Transfers –Promotions –Safety alerts –Training schedule

7 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Data Entry and Storage

8 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Artificial Intelligence Computers with the ability to manipulate data and infer conclusions Computers with the ability to manipulate data and infer conclusions Also know as the “expert system concept” Also know as the “expert system concept” This system matches technology and police expertise to identify potential suspects by: This system matches technology and police expertise to identify potential suspects by: –Collecting data –Storing the data –Analyzing data

9 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Artificial Intelligence (continued) This analysis is accomplished through information storage via databases This analysis is accomplished through information storage via databases These computers can also: These computers can also: –Check for report and investigation thoroughness by asking tutorial questions –Suggest that certain steps be taken to ensure all evidence has been located and secured –MO characteristics can be matched to a database of potential suspects –Produce a solvability score for supervisors to use in determining agency resources

10 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Benefits of Computers for Police Higher clearance rates Higher clearance rates Supervision has improved Supervision has improved Morale has increased Morale has increased Greater efficiency has been achieved Greater efficiency has been achieved Considerable financial and personnel resources spent on manual reporting can now be diverted to other essential areas Considerable financial and personnel resources spent on manual reporting can now be diverted to other essential areas

11 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 External Uses of the Computer Interagency data sharing Interagency data sharing Instant electronic access to information from: Instant electronic access to information from: –Regional departments –State agencies –Federal investigative departments Examples of shared information include: Examples of shared information include: –50 million criminal history records –Current open investigations –Lists of technical advisors for: Crime scene processing Crime scene processing Evidence Evidence Specific crimes such as homicide and sexual assault Specific crimes such as homicide and sexual assault

12 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Internet Resources There are national and international resources that are of benefit to the police There are national and international resources that are of benefit to the police Police are using the internet to: Police are using the internet to: –Bridge to their communities –Communicate with other police agencies The Internet allows access to information physically located in distant places The Internet allows access to information physically located in distant places One of the most useful features is the ability to engage in instant, on-line discussions or on electronic message boards One of the most useful features is the ability to engage in instant, on-line discussions or on electronic message boards

13 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Web Sites Many agencies are providing information through the use of Web sites Many agencies are providing information through the use of Web sites –History of the department –Current crime statistics –Names and descriptions of wanted fugitives –Crime prevention tips Some may (or in the future) allow citizens to Some may (or in the future) allow citizens to –File simple reports with the police –Confidentially report crime to the police The FBI posts the 10 Most Wanted on a web page The FBI posts the 10 Most Wanted on a web page

14 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime Computer crime is any criminal offense in which the computer is either the tool or the object of a crime Computer crime is any criminal offense in which the computer is either the tool or the object of a crime There are estimates that high-tech criminals steal $3 ̶ 5 billion annually There are estimates that high-tech criminals steal $3 ̶ 5 billion annually Most computer crimes occur in commercial settings Most computer crimes occur in commercial settings In Florida, 24% of businesses experienced computer-based crime within the last 12 months In Florida, 24% of businesses experienced computer-based crime within the last 12 months Less than 15% of computer crime is reported Less than 15% of computer crime is reported

15 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime– Suspect MO Information may be altered Information may be altered Data may be obliterated Data may be obliterated Programs can be altered, added, or deleted Programs can be altered, added, or deleted Data output may be altered Data output may be altered Data access for intelligence purposes Data access for intelligence purposes

16 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Six Basic Motivations for Computer Crime Monetary gain Monetary gain Property resale Property resale Intelligence gathering Intelligence gathering Destruction of the system Destruction of the system Criminal record keeping Criminal record keeping Predatory stalking Predatory stalking

17 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Monetary Gain  One of the most common ways is to divert incoming funds  Adding fictitious costs to items purchased  Indirect monetary gain is when computers are used for unauthorized purposes  Using the computer for non-company work  Working on private business on company computers  Software theft  Cellular phone account fraud

18 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 “Hackers” Attacking the Home Computer Vast amounts of personal and financial information is stored on personal computers Vast amounts of personal and financial information is stored on personal computers –The information is vulnerable Connected directly to the Internet Connected directly to the Internet High-speed cable lines remain open all the time High-speed cable lines remain open all the time –Personal computers are generally as powerful as business computers…and as complicated –Hacking into computers is more common than people think –Most people open too many emails that may contain malicious programs designed to secure financial information

19 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computers Used for Property Diversion and Resale Either by an employee (common) or an external “hacker” Either by an employee (common) or an external “hacker” Property is diverted from stock to individuals or business without full payment (or any) Property is diverted from stock to individuals or business without full payment (or any) –Orders can be enlarged –Customers can fictitious –Accounts can be fictitious

20 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computers Used for Illegal Intelligence Gathering Computers store sensitive information Computers store sensitive information –Marketing information –Product development –Secret recipes for valuable products –Government records Police investigations Police investigations Informant identifications Informant identifications Tax records Tax records School records (including grades) School records (including grades) Information that require passwords are vulnerable Information that require passwords are vulnerable –Codes can be broken –Internal employees who are code holders may be involved

21 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Destruction of a Computer Many components of a computer are susceptible to damage or destruction Many components of a computer are susceptible to damage or destruction –Physical destruction of hardware –Information stored on hard drives –Software Typical offenders include: Typical offenders include: –Disgruntled employees (or past employees) –Those with a motive (those who may object to the business in some way)

22 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Criminal Record Keeping Using the Computer Computers are frequently used by those who break the law Computers are frequently used by those who break the law –To store records –Keep track of cash transfers Criminal activity associated with computers include: Criminal activity associated with computers include: –Narcotics –Gambling –Loan-sharking –Money laundering –Sexual predators –Child pornography Computers are now often included in search warrants Computers are now often included in search warrants

23 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Predatory Stalking on the Computer Those who use computers to stalk are commonly referred to as “cyberstalkers” Those who use computers to stalk are commonly referred to as “cyberstalkers” –They harass and/or intimidate victims –They also target victims for rape and other sex crimes Sex crimes are committed on the computer Sex crimes are committed on the computer –Soliciting minors for sexual activities –Exchange, sell, and store child pornography It is a violation of federal law to create, possess, or disseminate child pornography It is a violation of federal law to create, possess, or disseminate child pornography Law enforcement now routinely investigates child sex offenders who are operating on the Internet Law enforcement now routinely investigates child sex offenders who are operating on the Internet –Federal laws exist –All states have laws specifically covering cyberstalking

24 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime– Suspect Characteristics With the exception of the predatory offender, many computer criminals generally follow the profile common to the white-collar offender Above average intelligence Above average intelligence Otherwise highly honest Otherwise highly honest Have the attitude of “the little guy against the system” Have the attitude of “the little guy against the system” This offender is young (under 35), white, well educated, highly motivated, and is a first-time offender This offender is young (under 35), white, well educated, highly motivated, and is a first-time offender Occupation of this offender is often a computer programmer or operator Occupation of this offender is often a computer programmer or operator

25 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Investigating Computer Crime Computer forensics training can be obtained from Computer forensics training can be obtained from –The National White Collar Crime Center –The Bureau of Justice Assistance (U.S. DOJ) From the beginning of the investigation, officers must perceive the similarity of electronic evidence to standard, more familiar evidence From the beginning of the investigation, officers must perceive the similarity of electronic evidence to standard, more familiar evidence All electronic evidence is typically latent in nature All electronic evidence is typically latent in nature –The evidence cannot be initially seen but must be made visible by special means –Data exists as electronic impulses

26 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Investigative Methods Identify the computer and seize the computer legally and forensically Identify the computer and seize the computer legally and forensically –Search warrant –Use competent technicians to seize the computer correctly to avoid data being lost or destroyed Identify who had access to the computer Identify who had access to the computer Identify who had a motive Identify who had a motive Determine who had the knowledge and skill to accomplish the crime Determine who had the knowledge and skill to accomplish the crime Conduct a background on all suspects Conduct a background on all suspects Interview the suspect (this is a critical step) Interview the suspect (this is a critical step) Follow the money (banks, credit cards, large purchases, etc.) Follow the money (banks, credit cards, large purchases, etc.)

27 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Other Investigative Methods The task force The task force –Multi-agency groups that pool resources to investigate Internet fraud Internet fraud Child pornography Child pornography Computer hacking Computer hacking Computer viruses Computer viruses Identity theft Identity theft Proactive electronic undercover tactics Proactive electronic undercover tactics

28 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Legal Considerations The first law to specifically address the problem of computer misuse was the Federal Computer Systems Protection Act of 1977 The first law to specifically address the problem of computer misuse was the Federal Computer Systems Protection Act of 1977 All states currently have computer crime laws as well and make it unlawful to: All states currently have computer crime laws as well and make it unlawful to: –Enter a computer system without authorization –Steal information –Cause a system to go out of service

29 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Review Questions 1. List some of the internal police uses of the computer. 2. How do computers aid law enforcement in efficiency? 3. How are computers used to solve crimes? 4. How is the Internet used by investigators? 5. Define ‘computer crime.’ 6. List the six motives for committing a crime involving a computer. 7. What is a cyberstalker? 8. What are some law enforcement strategies to investigate child pornography?

30 Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Student Questions


Download ppt "Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Aided Investigations."

Similar presentations


Ads by Google