Slide 1 - Bakersfield College

Download Report

Transcript Slide 1 - Bakersfield College

Criminal Investigation:
A Method for Reconstructing the Past, 7th Edition
Book
Cover
Here
PART D
THE INFLUENCE AND
IMPACT OF TECHNOLOGY
Copyright © 2014, Elsevier Inc.
All Rights Reserved
1
Criminal Investigation:
A Method for Reconstructing the Past, 7th Edition
Book
Cover
Here
Chapter 11
THE INFLUENCE OF
TECHNOLOGY ON CRIME
INVESTIGATION
Copyright © 2014, Elsevier Inc.
All Rights Reserved
2
Technology
•
•
•
•
Forensic science advancements
Communication
Supplements interviews and interrogation
Knowledge management (e.g., computerized
records systems)
• Surveillance equipment (e.g., night vision,
drones)
• Search technology (e.g., Google, social media)
• Need for continuing education and training
(e.g., specialized knowledge)
Copyright © 2014, Elsevier Inc.
All Rights Reserved
3
Categories of Cybercriminal Activities
• Cases in which technology is integral to
commission of a crime
• Cases in which technology is used to commit a
crime
• Cases in which technology is used as an
incidental aspect of a crime
Copyright © 2014, Elsevier Inc.
All Rights Reserved
4
Common Types of Cyber-Crime
• Child pornography and exploitation
• Economic related, mail and wire, and telecommunications
fraud
• Cyberstalking
• Extortion and Gambling
• Identity, software, and data theft
• Illegal drug activity
• Intellectual property crimes
• Money laundering and counterfeiting
• Prostitution
• Terrorism
• Transporting stolen property
• Electronic sabotage
Copyright © 2014, Elsevier Inc.
All Rights Reserved
5
Legal Issues
•
•
•
•
•
Home Computers
Workplace Computers
Internet Service Providers
Chat Rooms and Social Networking
Web Sites
Copyright © 2014, Elsevier Inc.
All Rights Reserved
6
Chat Rooms and Social Networking
• Twitter, Facebook, MySpace, LinkedIn
• Advantages and challenges
• Law enforcement agencies use chat rooms as
a means of identifying potential criminal
activities, especially child abuse
• Avoid entrapment
Copyright © 2014, Elsevier Inc.
All Rights Reserved
7
Investigating High-Tech and IT Crime
• Economic Crimes – Fraud, Embezzlement,
and Identity Theft
• Computer Hacking / Cracking and Sabotage
• Illegal Drug Activity
• Terrorism
Copyright © 2014, Elsevier Inc.
All Rights Reserved
8
Child Pornography and Exploitation
• Users may also be pedophiles who are active
in recruiting children for photos or using chat
rooms to entice children to meet them
• Investigators study the way in which young
people communicate on the Internet
• Sex offenders’ photos may be posted on the
Internet as a means of providing citizens with
information about potential threats
Copyright © 2014, Elsevier Inc.
All Rights Reserved
9
Stalking and Harassment
• “A course of conduct that would cause a
reasonable person to feel fear”
• Anonymous individuals
• Use ISPs to access information about the
sender
Copyright © 2014, Elsevier Inc.
All Rights Reserved
10
Cyber-Crime Investigation
and the Electronic Crime Scene
• Documentation Needs
– Observe and document the physical scene
– Document the condition and location of the
computer system, including power source
– Identify and document related electronic
components that will not be collected
– Photograph the entire scene (360°) to create a
visual record
Copyright © 2014, Elsevier Inc.
All Rights Reserved
11
Conclusion
• Cyber-crime Investigation Concerns
– Keep a futures perspective
– Cyber-criminals pose a major threat to financial
and business corporations
– Be aware of national, international, and global
issues
– Stay up-to-date!
Copyright © 2014, Elsevier Inc.
All Rights Reserved
12