1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Security Classification Practical Issues in dealing with different types of cybercrime.
Chapter 19 SEX CRIMES Criminal Investigation:
2 Language of Computer Crime Investigation
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Computer Forensics BACS 371
Copyright © 2008 Pearson Education Canada Inc Future Directions and Emerging Trends Chapter 12.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 3 THE CRIME SCENE Discovery, Preservation, Collection, and Transmission of.
Chapter 10 Privacy and Security McGraw-Hill
1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Book Cover Here Chapter 21 ARSON AND EXPLOSIVES Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier.
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 6 INTERVIEWS Obtaining Information from Witnesses Criminal Investigation:
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Information Warfare Playgrounds to Battlegrounds.
1 Book Cover Here Chapter 12 CRIME ANALYSIS AND COMING ATTRACTIONS IN THE INVESTIGATOR’S TOOLBOX Criminal Investigation: A Method for Reconstructing the.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
14 Cybercrime.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
MGMT 452 Corporate Social Responsibility
GCSE ICT SECURITY THREATS.
Chapter 10 Cyberlaw, Social Media, and Privacy
MODUS OPERANDI OF CYBER CRIME
Computer Crime CJ 520 / CJ October 27, 2010.
Seminar On Cyber Crime Submitted To: Submitted By:
Computer Forensics 1 1.
The Crime and Deviance Channel
Entering the World of Cybercrime
Introduction to Digital Forensics
Presentation transcript:

1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights Reserved

2 Book Cover Here Chapter 11 THE INFLUENCE OF TECHNOLOGY ON CRIME INVESTIGATION Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights Reserved

3 Technology Forensic science advancements Communication Supplements interviews and interrogation Knowledge management (e.g., computerized records systems) Surveillance equipment (e.g., night vision, drones) Search technology (e.g., Google, social media) Need for continuing education and training (e.g., specialized knowledge) Copyright © 2014, Elsevier Inc. All Rights Reserved

4 Categories of Cybercriminal Activities Cases in which technology is integral to commission of a crime Cases in which technology is used to commit a crime Cases in which technology is used as an incidental aspect of a crime Copyright © 2014, Elsevier Inc. All Rights Reserved

5 Common Types of Cyber-Crime Child pornography and exploitation Economic related, mail and wire, and telecommunications fraud Cyberstalking Extortion and Gambling Identity, software, and data theft Illegal drug activity Intellectual property crimes Money laundering and counterfeiting Prostitution Terrorism Transporting stolen property Electronic sabotage Copyright © 2014, Elsevier Inc. All Rights Reserved

6 Legal Issues Home Computers Workplace Computers Internet Service Providers Chat Rooms and Social Networking Web Sites Copyright © 2014, Elsevier Inc. All Rights Reserved

7 Chat Rooms and Social Networking Twitter, Facebook, MySpace, LinkedIn Advantages and challenges Law enforcement agencies use chat rooms as a means of identifying potential criminal activities, especially child abuse Avoid entrapment Copyright © 2014, Elsevier Inc. All Rights Reserved

8 Investigating High-Tech and IT Crime Economic Crimes – Fraud, Embezzlement, and Identity Theft Computer Hacking / Cracking and Sabotage Illegal Drug Activity Terrorism Copyright © 2014, Elsevier Inc. All Rights Reserved

9 Child Pornography and Exploitation Users may also be pedophiles who are active in recruiting children for photos or using chat rooms to entice children to meet them Investigators study the way in which young people communicate on the Internet Sex offenders’ photos may be posted on the Internet as a means of providing citizens with information about potential threats Copyright © 2014, Elsevier Inc. All Rights Reserved

10 Stalking and Harassment “A course of conduct that would cause a reasonable person to feel fear” Anonymous individuals Use ISPs to access information about the sender Copyright © 2014, Elsevier Inc. All Rights Reserved

11 Cyber-Crime Investigation and the Electronic Crime Scene Documentation Needs – Observe and document the physical scene – Document the condition and location of the computer system, including power source – Identify and document related electronic components that will not be collected – Photograph the entire scene (360°) to create a visual record Copyright © 2014, Elsevier Inc. All Rights Reserved

12 Conclusion Cyber-crime Investigation Concerns – Keep a futures perspective – Cyber-criminals pose a major threat to financial and business corporations – Be aware of national, international, and global issues – Stay up-to-date! Copyright © 2014, Elsevier Inc. All Rights Reserved