Mohd Taufik Abdullah Department of Computer Science

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

THE FOURTH AMENDMENT Constitutional Law.
2 Language of Computer Crime Investigation
Evidence Collection & Admissibility Computer Forensics BACS 371.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Legal, Ethical, and Professional Issues in Information Security
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Computer Forensics BACS 371
CYBER CRIME AND SECURITY TRENDS
E-Commerce: Regulatory, Ethical, and Social Environments
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Cybersecurity Governance in Ethiopia
Information Warfare Playgrounds to Battlegrounds.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Lecture 11: Law and Ethics
The FBI What the Federal Bureau of Investigation is TODAY.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Understanding the Criminal Justice System Chapter 6: Police and the Constitution.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Warfare Playgrounds to Battlegrounds.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 4: Laws, Regulations, and Compliance
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Surveillance around the world
PhD Oral Exam Presentation
Computer Crime CJ 520 / CJ October 27, 2010.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Introduction to Computer Forensics
8 Building Blocks of National Cyber Strategies
Introduction to Computer Forensics
U.S. Department of Justice
Chapter 4 Law, Regulations, and Compliance
Crime Lab Agencies.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Role of US Security and Intelligence Agencies
Introduction to Digital Forensics
Presentation transcript:

SAK 4801 SPECIAL TOPICS IN COMPUER SCIENCE II Chapter 2 Law and Computer Forensics Mohd Taufik Abdullah Department of Computer Science Faculty of Computer Science and Information Technology University Putra of Malaysia Room No: 2.28 Portions of the material courtesy EC-Council

Learning Objectives At the end of this chapter, you will be able to Understand cyber law and computer forensics Reporting security breaches to law enforcement Building the cyber crime case Initiate an investigation Legal issues involved in seizure of computer equipment Understand privacy issues regarding computer forensics

Chapter 2 Outline 2.1. Cyber Law and Computer Forensics 2.2. Reporting Security Breaches to Law Enforcement 2.3. Federal Law (computer crimes) 2.4. Building cyber crime case 2.5. How the FBI Investigates Computer Crime 2.6. How to Initiate an Investigation 2.7. Legal Issues Involved in Seizure of Computer Equipments 2.8. Privacy Issues Involved in Investigation 2.9. International Issues Related to Computer Forensics 2.10. Cyber Crime Investigation

2.1 Cyber Law and Computer Forensics

2.1.1 What Is Cyber Crime? Cyber Crime is Crime directed against a computer Crime where the computer contains evidence Crime where the computer is used as a tool to commit the crime “Any crime in which computer-related technology is encountered.”

2.1.2 What is Computer Forensics? Discipline using predefined procedures to thoroughly examine a computer system to extract the evidence Objectives of a computer forensics investigator: To determine the nature and events concerning a crime To locate the perpetrator by following a structured investigative procedure Methodology: Acquire Authenticate Analyze

2.1.3 Computer Facilitated Crimes Our dependency on computer has given way to new criminal opportunities Computers are increasingly being used as a tool for committing crimes Computer crimes are posing new challenges for investigators due to the following reason Speed Anonymity Fleeting nature of evidence

2.1.3 Computer Facilitated Crimes (Cont.) Speed The proliferation of PCs and Internet access has made the exchange of information quick and inexpensive The use of easily available tools and the proliferation of underground hacking groups have made it easier to commit cyber crimes. Anonymity The Internet allows anyone to hide his identity while committing crimes E-mail spoofing, creating fake profiles, and committing identity theft are common occurrences, and there is nothing to stop it, making investigation difficult. Fleeting nature of evidence

2.1.3 Computer Facilitated Crimes (Cont.) Fleeting nature of evidence The volatility or transient nature of evidence is causing problem for investigators, as there is no collateral or forensic evidence such as eyewitnesses, fingerprints or DNA, making these crimes much harder to prosecute.

2.1.4 Cyber Laws Came into existence as conventional laws were of little use to sentence perpetrators Defines rules on what data is protected and what is available Defines ownership of data and data storage devices Defines rules for digital certificates and authentication algorithms

2.1.5 Approaches to Formulate Cyber Laws Formulation or extending laws by nations within their boundaries Multi-lateral international agreements for Internet Establishing a standardized international body Guidelines and rules from the user end

2.1.5 Some Areas Addressed By Cyber Laws Computer crime Intellectual property Searching and seizing computers Cyberstalking Data protection and privacy Telecommunications laws

2.2 Reporting Security Breaches to Law Enforcement

2.2.1 In the USA Type of crime Appropriate federal investigative Law Agencies Computer intrusion (i.e. hacking) Password trafficking FBI local office U.S. Secret Service Internet Fraud Complaint Center Internet fraud and SPAM U.S. Secret Service (Financial Crimes Division) Federal Trade Commission (online complaint Internet harassment

2.2.1 In The USA (Cont.) Type of crime Appropriate federal investigative Law Agencies Child Pornography or Exploitation FBI local office U.S. Customers and Border Patrol Protection Local Office Internet Fraud Complaint Center Copyright(Software, movie, sound recording) piracy Trademark counterfeiting If imported, U.S. Customs and Border Patrol Protection Local Office Theft of trade secrets

2.2.1 In The USA (Cont.) Type of crime Appropriate federal investigative Law Agencies Trafficking in explosive or incendiary devices or firearms over the Internet FBI local office ATF local office Copyright(Software, movie, sound recording) piracy If imported, U.S. Customs and Border Patrol Protection Local Office Internet Fraud Complaint Center Theft of trade secrets

2.2.2 Investigative Agency in the USA Federal Bureau of Investigation (FBI) Protect U.S. against terrorist, cyber based attacks and foreign intelligence operations and espionage Acting as leading law enforcement bureau for investigating cyber attacks by foreign rivals and terrorist Prevent criminals, sexual predators, and others target on malevolent destruction from accessing the Internet National Infrastructure Protection Center (NIPC) For threat assessment, warning, investigation, and response to threats or attacks against critical information infrastructure such banking, telecommunications, energy, water systems, government operations, and emergency service.

2.2.2 Investigative Agency in the USA (Cont.) National Infrastructure Protection Center (NIPC) For threat assessment, warning, investigation, and response to threats or attacks against critical information infrastructure such banking, telecommunications, energy, water systems, government operations, and emergency service. Developed the “InfraGard” iniative.

2.3 Federal Law (Computer Crimes)

2.3 Federal Law (Computer Crimes) To investigate computer-related crimes the FBI uses the following statues: 18 U.S.C. 875: Interstate Communications: Including Threats, Kidnapping, Ransom, Extortion 18 U.S.C. 1029: Fraud and related activity in connection with access devices 18 U.S.C. 1030: Fraud and related activity in connection with computers 18 U.S.C. 1343: Fraud by wire, radio or television 18 U.S.C. 1361: Injury to Government Property 18 U.S.C. 1362 Government communication systems 18 U.S.C. 1831 Economic Espionage Act 18 U.S.C. 1832 Theft of Trade Secrets

2.4 Building Cyber crime case

2.4 Building Cyber Crime Case Identification of evidence Collecting and preserving digital evidence Factors that complicate prosecution Overcoming the obstacles.

2.5 How the FBI Investigates Computer Crimes

2.5 How the FBI investigates Computer Crime FBI investigates incident when: Federal criminal code violation occurs Federal violation factors validates FBI uses: Various technical programs to address the complexity Sophisticated methods for investigation. Specialized cyber squads for expert assistance

2.6 How to Initiate an Investigation

2.6 How to Initiate an Investigation Following points to be considered: Reportable versus nonreportable Choice to go civil instead of criminal Acceptable-Use policy violations   EC-Council

2.7 Legal Issues Involved in Seizure of Computer Equipments

2.7 Legal Issues Involved in Seizure of Computer Equipments Need for technical expertise Limit seizure of hardware Impact of presence of privileged or protected material in a computer system Stored electronic communication Consent of network system administrator  

2.7.1 Seizure With a Warrant Law enforcement must establish "probable cause, supported by Oath or affirmation” Description of place, thing or person is necessary Drafting of warrant should be in such a way that it authorizes the agent to take necessary step Supporting affidavit should explain the possible search strategies

2.7.2 Seizure Without a Warrant Search can be initiated without warrant if any one of the following is there: Consent Authority has given the consent voluntarily. Third party has given the consent. Implied consent. Exigent circumstances Plain view Search incident to lawful arrest search strategies

2.8 Privacy Issues Involved in Investigation

2.8 Privacy Issues Involved in Investigations Reasonable Expectation of Privacy in Computers as Storage Devices Reasonable Expectation of Privacy and Third-Party Possession Private Searches Reasonable Expectation of Privacy in Public Workplaces

2.9 International Issues Related to Computer Forensics

2.9 International Issues Related to Computer Forensics Electronic evidence located outside the borders of the country Seeking assistance from law enforcement authorities in different country Preservation of evidence Consistency with all legal systems Allowance for the use of common language Applicability to all forensic evidence Applicability at every level

2.10 Cyber Crime Investigation

2.10 Cyber Crime Investigation Acquisition of the data from the system from which the digital crime has been committed Identification of the digital evidence from the crime Evaluation and analysis of the evidence Presentation of the evidence to the court

Summary

Cyber crime has originated from the growing dependence on computers in modern life Various Law Enforcement Agencies such as FBI,NIPC investigate computer facilitated crimes and help in tracking cyber criminals Federal laws related to computer crime,cyberstalking, search and seizure of computer,intellectual property rights are discussed Building a cyber crime case and initiating investigation are crucial areas

End of Chapter 2