Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Traditional problems associated with computer crime ppt

27/10/2021 Client: muhammad11 Deadline: 2 Day

Cyber Crime-Computer-Related Investigations

1. Describe the traditional problems associated with finding digital evidence.

2. Discuss the areas noted in the lecture notes relative to securing the crime scene in computer-related investigations.

3. Discuss the handling of seized evidence prior to transportation to the laboratory.

4. Discuss crime scene processing for computer-related crimes.

CHAPTER

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Searching and Seizing Computer-Related Evidence

11

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Learning Objectives

Discuss the seven general categories of personnel that may be present at a computer-related crime scene.
Familiarize yourself with the tools of the trade of computer-related crime scene investigation.
Gain knowledge of the concerns of preservation of digital evidence.
Develop comprehension of why documentation is so important.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Learning Objectives

Understand SMEAC and how it applies to computer investigation.
Become aware of the activities of investigators when approaching computer-related crime scenes and on the scene.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems Associated with Finding Digital Evidence

Occasional need for computer crime investigators to play multiple roles, i.e., case supervisors, investigators, crime scene technicians, and forensic scientists, due to resource limitations, which can increase the risk of complications
How digital evidence is volatile (susceptible to climatic, environmental, human error) and voluminous
The need to analyze all potential evidence, as opposed to examining only samples
Expensive to do correctly; failure could result in the filing of lawsuits against the agency
The ease of camouflaging data evidence and in general, the difficulty to find it.

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems Associated with Finding Digital Evidence

Occasional need for computer crime investigators to play multiple roles, due to resource limitations, which can increase the risk of complications:
Case supervisor
Investigator
Crime scene technician
Forensic scientist
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Traditional Problems Associated with Finding Digital Evidence

Growing sophistication of criminals means greater difficulty in getting to potential evidence, for example, due to encryption, steganography, or self-destructive programs.
The pace of technological advancement surpasses the pace of law enforcement training.
Thus it is critical to develop strict search and seizure policies.

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Reliance upon traditional methods for gathering information and to prepare for scene arrival
Determination of the location, size, type, and number of computers at scene
Risks from personnel affecting potential evidence
The volatility of evidence
Reliance upon judicial authority to conduct data-gathering
Potential need for expertise or non-departmental experts
Engaging in social engineering
Dumpster-diving for potential evidence
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Warrant Preparation and Application

Application for a search warrant should be reviewed by computer experts and legal counsel prior to application for relevant language and protections
Probable cause – must demonstrate that:
A crime has been committed
Extant evidence of a crime exists resides in a particular location
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Seizing Equipment

Must justify the seizure (not just the search) of equipment
Request explicit permission to seize all hardware and storage devices as constitutionally justifiable
Note that criminal contraband, fruits of the crime, and those items criminally possessed may be seized without judicial authority
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

No-knock warrants may be an option, given exigent circumstances such as:
Nature of the offense
Potential for evidence destruction
Sophistication and maturity of the target
Absence of the resident
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Secondary/multiple warrants may be necessary:
When searching for child pornography and encountering drug trafficking records
For networked computers, especially as there may be off-site storage, although should anticipate this and mention it when applying for original warrant
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Plan Preparation and Personnel Gathering

Situation
Mission
Execution
Avenues of approach and escape
Communications
Hence, SMEAC as the guide on how to prepare
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

On-scene personnel, who could play multiple roles, may include:
Case Supervisor
Arrest Team
Scene Security Team
Interview and Interrogation Team
Sketch and Photo Team
Physical Search Team
Seizure Team, who go last and who would engage in bagging and tagging
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Preparing a tool kit is dependent on what law enforcement expects to find on the scene.
Traditional equipment:
Evidence tape
Packing tape
Evidence storage containers and labels
Antistatic bags (prevent loss of data due to static electricity), conductive bags, and Faraday bags (to shield wireless devices from remote corruption or deletion of data)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Labeling materials (writing utensils, labels, note cards)
Sanitary materials
Flashlight and extra batteries
List of contacts
Mobile carts or evidence transport units
Wireless communications
Photographic equipment (camera, batteries, storage cards)
Nonmagnetic screwdrivers, hex wrenches, pliers
Small diagonal cutters
Hammer or nail-puller
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Computer-Specific Equipment and Materials

Multiple boot disks
Backup hardware and miscellaneous computer peripherals:
New hard drives
Color scanner
Color printer and an assortment of computer paper
Anti-virus software (must be the most current)
Imaging software
Application software
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Forensic software, including (but not necessarily limited to):
Viewers
Text, Hex editors
Password crackers
Verification software
Time/date programs
Wiping programs
Locking programs
Fuzzy logic tools
File cataloging and indexing
Recovery
Imaging
Other forensic software, like EnCase, FTK
Extra media
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Pre-Search Activities

Extra cables, serial port connectors, and gender-changers
Extension cords and/or power strips
Surge protectors and/or UPS
Open purchase order
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Steps involved in serving a warrant:

Knock
Notice
Document

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Depending upon the warrant and crime scene, securing the scene includes (but is not limited to):
Dealing immediately with dangerous individuals or safety hazards
Locating and securing all computers
Removing of all personnel from the immediate area of the evidence
Ascertaining network connections for taking appropriate action
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Disabling network access, ideally by a network administrator
Separating immediately all suspects and getting an escort to a predetermined location
Protecting all computers by a police officer
Collecting literature that relates to the underlying activities or offenses
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Determine the need for external specialists
May be needed when searching mainframes, minicomputers, and specialty and hacker computers
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

When processing the scene, the following should be documented, at minimum:
Date, time, and description of computer, including physical damage
Identifying information of all investigative personnel
Identifying information of all others present, especially witnesses and suspects
All investigative clues uncovered and developing leads
Investigative software used
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Sequence and time of all actions taken
Type and status of network connection
Verification of network connection
Status of computer
Computer activity
Computer desktop
System date/time
Tree structure (if relevant and possible)
Image verification
Chain of custody
Identification of all material or equipment seized
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Photograph/video documentation can weaken defense arguments that officers corrupted or otherwise contaminated criminal evidence.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

When sketching the scene, be sure to include critical identifying information.
When identifying potential evidence:
Don’t overlook non-digital evidence
Trace evidence may be important to place the suspect at the scene, and can include hair, fibers, and fingerprints
Any other computer components, such as external hard drives, peripherals
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Circumstantial connections, such as post-it notes, computer printouts, even the type of paper used
For example, when searching for the crime of software counterfeiting, look for labels, DVD burners, packaging, etc.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Investigating potential evidence:
Desktops
Monitors
Keyboards
Telephones
Wallets/purses
Clothing
Trash cans and recycle bins
Printers
Inside the computer itself
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Seizure and documentation of evidence
Limited to scope of warrant; get secondary when needed.
All annotations must be in ink.
Generate comprehensive notes.
Image contents of the drives onto clean media.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

When seizing computers:
Before powering off, document the status of the computer with photos, sketches, and notes, including the back of the computer and connections.
After powering off, place evidence tape over all disk openings.
Label all cords & empty slots.
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Bagging and Tagging

Use a chain of custody log to maintain a record of all items taken.
Labels used should contain, at a minimum:
Investigator’s initials
Date found
Location of evidence
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Use great care and wear gloves.
Factors to consider in packaging and transporting computers:
Temperature (heat)
Oil, dirt, dust
Magnetic fields
Additional environmental characteristics
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

When interviewing witnesses, relevant questions can include:
What types of digital evidence have been collected prior to the involvement of law enforcement?
For example, in a cyberstalking case, does a hard copy version of the email exist? Is an electronic copy available? Does it contain full header information?
How was the evidence discovered?
Who handled the evidence? (Could be multiple individuals)
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Who controlled the digital evidence after it was examined and before it was given to authorities?
When and how was the digital evidence collected and stored?
Where was the evidence when it was collected?
What type of equipment held the digital evidence?
Who had access to the equipment?
Who owned the equipment?
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Was the equipment shared?
Was information retrieved from a network?
Was information password-protected?
Who had access to password-protected information?
Is the data located at an off-site location?
Who may be responsible for the incident? Why do you think so?
What actions have been taken to identify, collect, preserve, or analyze the data and the devices involved?
Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

On-Scene Activities

Scene Departure and Transportation of Evidence to Lab

Rely on traditional methods to exit a crime scene
Review shipping manifests upon arrival
Enter into appropriate evidence control systems for analysis

Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz

Copyright © 2013 by Pearson Education, Inc. All Rights Reserved

Conclusions

Unique problems with computer-related evidence, including lack of resources, such as untrained or insufficient personnel to process it properly
Steps in a traditional investigation should be incorporated with those unique to computer-related investigations
Warrants should be specific and based on probable cause
Documentation is essential
Procedures will evolve along with computer forensics
Still a matter of careful planning and oversight

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

WRITING LAND
Accounting & Finance Master
Assignment Hut
Solutions Store
Coursework Helper
Writing Factory
Writer Writer Name Offer Chat
WRITING LAND

ONLINE

WRITING LAND

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$15 Chat With Writer
Accounting & Finance Master

ONLINE

Accounting & Finance Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$35 Chat With Writer
Assignment Hut

ONLINE

Assignment Hut

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$49 Chat With Writer
Solutions Store

ONLINE

Solutions Store

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$16 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$35 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

BUS 633 WEEK 2 ASSIGNMENT - Disney's america theme park case study - Julie pett dog training - Yango pastoral co pty ltd v first chicago australia ltd - Counting subatomic particles worksheet - Impact of Mobile computing on Businesses - An organism's genotype is - Are havighurst and santrock saying the same thing - Pharm tech - "Risk Communication" - Beechcraft baron 55 maintenance manual - 2080 lc50 24qbb wiring - Organizational behavior a practical problem solving approach 2nd edition pdf - 1.6 k in pounds - Discussion - Norsted manor farm caravan storage - Macjordan construction v brookmount - 2x 3y 53 3x y 19 - Oodgeroo noonuccal we are going poem analysis - Namecheap promo code 2020 - Chemical properties of vinegar and baking soda - Computer science - Nhs london leadership academy - New belgium brewery target market - Fossil extinction puddle is to - Write a balanced equation for the combustion of ethanol - 5l bundaberg rum bottle - Azad jammu kashmir university - Payment of cash dividends are recorded as - Are flies scavengers or decomposers - 4150 s atlantic ave new smyrna beach fl 32169 - The crucible and the dressmaker sample essay - Is the giant panda a herbivore carnivore or omnivore - Beastie bay school magic word - Roller coaster design worksheet e2020 answers - Chess math is fun - Autism spectrum rating scales asrs - Drywall repair clips home depot - What does daforest stand for - Workers on the shipping dock steal goods - Kroger 5s of key retailing - Baw baw planning scheme - Archimedes lab report - Ave maría, cuándo (ser) mía, si me quisieras, todo te daría. - Project development and implementation for strategic managers assignment - Callaghan motors bonds have 10 years remaining to maturity - Full moon and little frieda - Assignment #073 - Hopwood hall college courses - Humanities reflection paper - Advantages of gc ms over lc ms - Nursing Power point - Henderson hasselbalch practice problems with answers - HR - Brain bee sample questions - Marketing and distribution channel letter - Rosary primary school camden - Cash flow to creditors is defined as - St aloysius adelaide uniform - PUB 5. - ERM - Discussion 3 - Laboratory report - Kay's rule for real gas mixtures - 15518 blue creek ranch dr houston tx 77086 - Globe theatre rain policy - Sql injection attack lab - Community teaching work plan proposal - A bronzeville mother loiters in mississippi analysis - Mark riordan wollongong city council - St george business banking - Access Control - Establishment of Federal, state, and local government laws, - Security+ guide to network security fundamentals 6th edition pdf free - Berkshire county sports club - 2015 wace english exam - Assist - Wade harper orthopaedic surgeon - The major theoretical contribution of kaoru ishikawa was - Biomagic water pure water purifier - qualitative - professional copy editing and language polished - Weeko lasto 15 - Istqb test manager exam - Learning style inventory k 2 - Intercultural communication DB - Bay city company's fixed budget performance report for july follows - Www atrrs army mil channels chrtas - American government roots context and culture - Focused exam chest pain shadow health - List of earthquakes and volcanoes by latitude and longitude - Becoming human questions answer key - Passage - 1 3 5 hexatriene pi molecular orbitals - Bontrager flare rt modes - H&m target market pdf - Identify The Violated Assumption, Principle,Or Constraint - Chi square test prism - Netsuite business development representative - Risk and quality management manual hcs 451 - Unilever canada redefining the axe brand case analysis - How to write an interview essay - Minecraft millionaire only server ip address