Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Computer Aided Investigations and Computer Crime Chapter 8 Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Overview Investigative Uses of the Computer Review Questions Opportunity for Student Questions Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Learning Objectives Understand the importance of computer information systems Explain how computer technology aids the investigative function Define the external investigative uses of the computer Understand the nature and resources of the Internet Understand how Web sites on the World Wide Web can assist criminal investigation Discuss the investigative procedures and legal considerations applicable to computer crime List the characteristics and methods of operation unique to computer crime suspects Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computerized Information Processing Police investigations create vast amounts of data Information must be managed to utilize it to its full potential Computer science has increased the management capacity dramatically 67% of the average police officer’s time is spent doing “paperwork” and the computer is the standard tool Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Use of the Computer Internal uses External uses Internet resources Investigating computer crime Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Internal Uses (of the Computer) Aids the internal operations of the police agency Supervisory oversight of multiple, simultaneous investigations Coordination and communication between patrol (preliminary report writers) and investigations (follow-up reports) – Case status – Direct communication between officers, detectives, and supervisors Criminal Investigation, 7th Edition By James N. Gilbert Efficient analysis of data Email Posting of new – – – – – – – – – Policies Announcements Shift openings Retirements Hires Transfers Promotions Safety alerts Training schedule PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Data Entry and Storage Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Artificial Intelligence Computers with the ability to manipulate data and infer conclusions Also know as the “expert system concept” This system matches technology and police expertise to identify potential suspects by: – Collecting data – Storing the data – Analyzing data Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Artificial Intelligence (continued) This analysis is accomplished through information storage via databases These computers can also: – Check for report and investigation thoroughness by asking tutorial questions – Suggest that certain steps be taken to ensure all evidence has been located and secured – MO characteristics can be matched to a database of potential suspects – Produce a solvability score for supervisors to use in determining agency resources Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Benefits of Computers for Police Higher clearance rates Supervision has improved Morale has increased Greater efficiency has been achieved Considerable financial and personnel resources spent on manual reporting can now be diverted to other essential areas Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 External Uses of the Computer Interagency data sharing Instant electronic access to information from: – Regional departments – State agencies – Federal investigative departments Examples of shared information include: – 50 million criminal history records – Current open investigations – Lists of technical advisors for: Crime scene processing Evidence Specific crimes such as homicide and sexual assault Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Internet Resources There are national and international resources that are of benefit to the police Police are using the internet to: – – Bridge to their communities Communicate with other police agencies The Internet allows access to information physically located in distant places One of the most useful features is the ability to engage in instant, on-line discussions or on electronic message boards Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Police Web Sites Many agencies are providing information through the use of Web sites – – – – History of the department Current crime statistics Names and descriptions of wanted fugitives Crime prevention tips Some may (or in the future) allow citizens to – File simple reports with the police – Confidentially report crime to the police The FBI posts the 10 Most Wanted on a web page Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime Computer crime is any criminal offense in which the computer is either the tool or the object of a crime There are estimates that high-tech criminals steal $3 ̶ 5 billion annually Most computer crimes occur in commercial settings In Florida, 24% of businesses experienced computer-based crime within the last 12 months Less than 15% of computer crime is reported Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime– Suspect MO Information may be altered Data may be obliterated Programs can be altered, added, or deleted Data output may be altered Data access for intelligence purposes Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Six Basic Motivations for Computer Crime Monetary gain Property resale Intelligence gathering Destruction of the system Criminal record keeping Predatory stalking Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Monetary Gain One of the most common ways is to divert incoming funds Adding fictitious costs to items purchased Indirect monetary gain is when computers are used for unauthorized purposes Using the computer for non-company work Working on private business on company computers Software theft Cellular phone account fraud Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 “Hackers” Attacking the Home Computer Vast amounts of personal and financial information is stored on personal computers – The information is vulnerable Connected directly to the Internet High-speed cable lines remain open all the time – Personal computers are generally as powerful as business computers…and as complicated – Hacking into computers is more common than people think – Most people open too many emails that may contain malicious programs designed to secure financial information Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computers Used for Property Diversion and Resale Either by an employee (common) or an external “hacker” Property is diverted from stock to individuals or business without full payment (or any) – Orders can be enlarged – Customers can fictitious – Accounts can be fictitious Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computers Used for Illegal Intelligence Gathering Computers store sensitive information – – – – Marketing information Product development Secret recipes for valuable products Government records Police investigations Informant identifications Tax records School records (including grades) Information that require passwords are vulnerable – Codes can be broken – Internal employees who are code holders may be involved Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Destruction of a Computer Many components of a computer are susceptible to damage or destruction – Physical destruction of hardware – Information stored on hard drives – Software Typical offenders include: – Disgruntled employees (or past employees) – Those with a motive (those who may object to the business in some way) Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Criminal Record Keeping Using the Computer Computers are frequently used by those who break the law – To store records – Keep track of cash transfers Criminal activity associated with computers include: – – – – – – Narcotics Gambling Loan-sharking Money laundering Sexual predators Child pornography Computers are now often included in search warrants Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Predatory Stalking on the Computer Those who use computers to stalk are commonly referred to as “cyberstalkers” – They harass and/or intimidate victims – They also target victims for rape and other sex crimes Sex crimes are committed on the computer – Soliciting minors for sexual activities – Exchange, sell, and store child pornography It is a violation of federal law to create, possess, or disseminate child pornography Law enforcement now routinely investigates child sex offenders who are operating on the Internet – Federal laws exist – All states have laws specifically covering cyberstalking Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Computer Crime– Suspect Characteristics With the exception of the predatory offender, many computer criminals generally follow the profile common to the white-collar offender Above average intelligence Otherwise highly honest Have the attitude of “the little guy against the system” This offender is young (under 35), white, well educated, highly motivated, and is a first-time offender Occupation of this offender is often a computer programmer or operator Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Investigating Computer Crime Computer forensics training can be obtained from – The National White Collar Crime Center – The Bureau of Justice Assistance (U.S. DOJ) From the beginning of the investigation, officers must perceive the similarity of electronic evidence to standard, more familiar evidence All electronic evidence is typically latent in nature – The evidence cannot be initially seen but must be made visible by special means – Data exists as electronic impulses Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Investigative Methods Identify the computer and seize the computer legally and forensically – Search warrant – Use competent technicians to seize the computer correctly to avoid data being lost or destroyed Identify who had access to the computer Identify who had a motive Determine who had the knowledge and skill to accomplish the crime Conduct a background on all suspects Interview the suspect (this is a critical step) Follow the money (banks, credit cards, large purchases, etc.) Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Other Investigative Methods The task force – Multi-agency groups that pool resources to investigate Internet fraud Child pornography Computer hacking Computer viruses Identity theft Proactive electronic undercover tactics Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Legal Considerations The first law to specifically address the problem of computer misuse was the Federal Computer Systems Protection Act of 1977 All states currently have computer crime laws as well and make it unlawful to: – Enter a computer system without authorization – Steal information – Cause a system to go out of service Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Review Questions 1. 2. 3. 4. 5. 6. 7. 8. List some of the internal police uses of the computer. How do computers aid law enforcement in efficiency? How are computers used to solve crimes? How is the Internet used by investigators? Define ‘computer crime.’ List the six motives for committing a crime involving a computer. What is a cyberstalker? What are some law enforcement strategies to investigate child pornography? Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458 Student Questions Criminal Investigation, 7th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ 07458