Criminal Prosecutors with Computer Forensics

Slides:



Advertisements
Similar presentations
Internet Investigations. Internet Investigations Theres a charge on my credit card, but I didnt make that purchase. – Most common criminal investigation.
Advertisements

OC RIMS Cyber Safety & Security Incident Response.
Computer Hacking Forensics Investigator
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Forensic Analysis Torres, Ricardo. It’s A Matter Of Time Security is a deterrence not a guarantee. “Computer forensics defined: Preservation, identification,
COMPUTER FORENSICS Aug. 11, 2000 for Cambridge, Massachusetts.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Cyber Crimes.
Prepared and presented by Group 5: 1. NGABOYERA Valens 2. TWAGIRAMUNGU Serge 3. KAYIRANGA Augustin 4. BAYINGANA Aimable 5. SAMVURA Jean de Dieu 6. RUKUNDO.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Data and Applications Security Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #21 April 6, 2009.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Lecture 11: Law and Ethics
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
CJ317: Computer Forensics
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Computer crimes.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Unit 2 Seminar. The Objectives of a crime scene investigation are Reconstruct the incident Ascertain the sequence of events Determine the mode of operation.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Application of data mining to computer forensics
Computer Forensics By: Chris Rozic.
Computer Security Fundamentals
A Project on CYBER SECURITY
Computer Forensics 1 1.
Introduction to Computer Forensics
Introduction to Computer Forensics
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Why do you want this grant?
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
Private Investigations vs. Public Investigations
Counter Forensic for Computer Forensic By: Lara Amanj Gulan Azad.
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Introduction to Digital Forensics
Presentation transcript:

Criminal Prosecutors with Computer Forensics By-Jia-Yu Huang & Shirley Yeung

What is Computer Forensics ? It involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Evidence might be required for a wide range of computer crimes and misuses Use for Computer Forensics: Discovering data on computer system Recovering deleted, encrypted, or damaged file information Monitoring live activity Detecting violations of corporate policy

Criminal Prosecutors Their job is to identify an individual that has commented a crime. They use computer forensic in order to track evidence such as emails, data, hard drives, documents, and illegal access to personal accounts. An example would be using IP addresses in order to track down infringement or illegal downloads.

Uses of IP Addresses with Crimes Fraud Example: Online auctions in which the company or provider receive money for a product from a consumer, but does not deliver the product. Child Pornography Example: Where Pennsylvania State trooper enter chat rooms in order to find illegal child pornography. E-mail Example: Harassment, Stalking, Terrorist Attacks

Investigative Procedure The Prosecutors get an IP address, that was used in the crime. Determined the ISP (controls IP address) Get a court order for the ISP to disclose which computer was using that IP address Get a search warrant to seize and search that computer Conduct a forensic examination of the computer to locate evidence left on computer when crime was committed.

WORK CITED Smith, Russell G., Peter N. Grabosky, and Gregor Urbas. "Cyber criminals on trial - Google Books." Google Books. N.p., n.d. Web. 2 Dec. 2010. <http://books.google.com/books?id=cFKMZg6AZKwC&pg=PA2&lp "Santa Fe College Computer Forensics." Criminal Prosecutor. N.p., n.d. Web. 4 Dec. 2010. <http://criminal-prosecutor.com/santa-fe-college-computer-forensics>. "Acting Essex County Prosecutor Establishes Cyber Crime Unit - TheJerseyTomatoPress.com."Home - TheJerseyTomatoPress.com. N.p., n.d. Web. 7 Dec. 2010. <http://www.thejerseytomatopress.com/stories/Acting-Essex-County- Prosecutor-Establishes-Cyber-Crime-Unit,5856>. Cohen, Charles L., First Sergeant, Indiana State Police, Indianapolis, and Indiana. "Police Chief Magazine - View Article." Police Chief Magazine. N.p., n.d. Web. 4 Dec. 2010. <http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arc h&article