2 Language of Computer Crime Investigation

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
JCSD-aw Citizenship in an e-World Johnston Community School District.
(C) Oxygen Software, Oxygen Forensic Suite – Premium Mobile Examination Extracting.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
Chapter 17 Controls and Security Measures
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
The University of Hull Centre For Internet Computing Spam ‘n’ chips A discussion of internet crime Angus M. Marshall BSc CEng MBCS FRSA.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Police Technology Chapter Eight
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
The Office Procedures and Technology
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
in Information Systems and the Internet
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Unethical use of Computers and Networks
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chap1: Is there a Security Problem in Computing?.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Cybercrime What is it, what does it cost, & how is it regulated?
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
11Digital Evidence as Alibi Dr. John P. Abraham Professor UTPA.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Computer Forensics and Cyber Crimes. Computer Forensics The systematic identification, preservation, extraction, documentation, and analysis of electronic.
Digital Forensics and Hand Held Devices Robert Trimble COSC
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Chapter 17 Computer Crime Hess Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.
Introduction to Computer Forensics
Five Unethical Uses of Computers
Introduction to Computer Forensics
BCT 2.00 Analyze Technology Issues
Presentation transcript:

2 Language of Computer Crime Investigation Dr. John P. Abraham Professor UTPA

Computer Crime Offenses defined in laws such as U.S. Computer Fraud and Abuse Act. Crimes committed using computers, and Crimes involving computers.

The laws cover Theft of computer services Unauthorized access to protected computers Software piracy Alteration or theft of electronically stored information Extortion committed with the assistance of computers Obtaining unauthorized access to records from banks, credit card companies or customer reporting agencies. Traffic in stolen passwords Transmission of destructive virus or commands.

Digital Evidence Various types of digital data Computer forensics: preservation and analysis of computers (file systems) Network Forensics: preservation and analysis of traffic and other logs. Mobile forensics: preservation and analysis of cell phones, PDAs, GPS, etc. Various types of digital data Text Digital photographs Malware

Forensic Examination and Analysis Forensic examination: Extract and prepare data for analysis. Examination process involves: data translation, reduction, recovery, organization and searching. Forensic examination can be automated on a computer, whereas analysis requires critical thinking,

Role of Computers in Crime Specific role of computer will determine how it can be used as evidence. Is the computer the key piece, or an incidental evidence? Entire computer can be seized in case it is the key piece.

Categories of computer crime Computer is the object of the crime (stolen or destroyed). – target. Computer is the subject of the crime. (Virus, format, etc.) Computer is a tool in planning or executing a crime. (forge documents, break into other computers) – like a weapon. The symbol of a computer can be used to intimidate or deceive. A broker telling a client he has a special program.

U.S. Dep of Justice Categories Hardware as contraband or feuits of crime Hardware as an instrumentality Hardware as Evidence Information as contraband or fruits of crime Information as an instrumentality Information as evidence

Hardware as contraband or fruits of crime Contraband- property that a citizen not permitted to possess (eg. hardware that intercept communications) Fruits of crime – hardware obtained by criminal activity. Stolen or used stolen credit cards, etc.

Hardware as instrumentality When computer hardware has played a significant role in a crime. Like a gun or knife. Computer manufactured or configured specifically to commit crime. Think of sniffers.

Hardware as Evidence Any information left on the computer relating to a crime makes the hardware an evidence.

Information as contraband A common form of information as contraband is encryption software. It is illegal to export 128bit-encryption software without being approved by US govt. US non-military exports are controlled by Export Administration Regulations (EAR) and Department of State. These are placed on the United States Munitions List. In some countries it is illegal to use encryption software.

Information as instrumentality Exploits (programs that enable intruders gain access to computers) Programs used to break into other peoples’ computers Program that captures login info, or guesses passwords.

Information as evidence Trail of digital information Digital cameras Cell phones Satellite tracking devices