CRJU2005 Chapter 8

Download Report

Transcript CRJU2005 Chapter 8

Computer Aided Investigations
and Computer Crime
Chapter 8
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Overview



Investigative Uses of the
Computer
Review Questions
Opportunity for Student Questions
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Learning Objectives







Understand the importance of computer information
systems
Explain how computer technology aids the
investigative function
Define the external investigative uses of the computer
Understand the nature and resources of the Internet
Understand how Web sites on the World Wide Web
can assist criminal investigation
Discuss the investigative procedures and legal
considerations applicable to computer crime
List the characteristics and methods of operation
unique to computer crime suspects
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computerized Information
Processing




Police investigations create vast amounts of
data
Information must be managed to utilize it to its
full potential
Computer science has increased the
management capacity dramatically
67% of the average police officer’s time is
spent doing “paperwork” and the computer is
the standard tool
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Police Use of the Computer




Internal uses
External uses
Internet resources
Investigating computer crime
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Internal Uses (of the
Computer)



Aids the internal operations
of the police agency
Supervisory oversight of
multiple, simultaneous
investigations
Coordination and
communication between
patrol (preliminary report
writers) and investigations
(follow-up reports)
– Case status
– Direct communication
between officers,
detectives, and supervisors
Criminal Investigation, 7th Edition
By James N. Gilbert



Efficient analysis of data
Email
Posting of new
–
–
–
–
–
–
–
–
–
Policies
Announcements
Shift openings
Retirements
Hires
Transfers
Promotions
Safety alerts
Training schedule
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Police Data Entry and
Storage
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Artificial Intelligence



Computers with the ability to manipulate data
and infer conclusions
Also know as the “expert system concept”
This system matches technology and police
expertise to identify potential suspects by:
– Collecting data
– Storing the data
– Analyzing data
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Artificial Intelligence
(continued)


This analysis is accomplished through
information storage via databases
These computers can also:
– Check for report and investigation thoroughness
by asking tutorial questions
– Suggest that certain steps be taken to ensure all
evidence has been located and secured
– MO characteristics can be matched to a
database of potential suspects
– Produce a solvability score for supervisors to use
in determining agency resources
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Benefits of Computers for
Police





Higher clearance rates
Supervision has improved
Morale has increased
Greater efficiency has been achieved
Considerable financial and personnel
resources spent on manual reporting
can now be diverted to other essential
areas
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
External Uses of the
Computer


Interagency data sharing
Instant electronic access to information from:
– Regional departments
– State agencies
– Federal investigative departments

Examples of shared information include:
– 50 million criminal history records
– Current open investigations
– Lists of technical advisors for:



Crime scene processing
Evidence
Specific crimes such as homicide and sexual assault
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Internet Resources


There are national and international
resources that are of benefit to the police
Police are using the internet to:
–
–


Bridge to their communities
Communicate with other police agencies
The Internet allows access to information physically
located in distant places
One of the most useful features is the ability to
engage in instant, on-line discussions or on
electronic message boards
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Police Web Sites

Many agencies are providing information through the
use of Web sites
–
–
–
–

History of the department
Current crime statistics
Names and descriptions of wanted fugitives
Crime prevention tips
Some may (or in the future) allow citizens to
– File simple reports with the police
– Confidentially report crime to the police

The FBI posts the 10 Most Wanted on a web page
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computer Crime





Computer crime is any criminal offense in which
the computer is either the tool or the object of a
crime
There are estimates that high-tech criminals steal
$3 ̶ 5 billion annually
Most computer crimes occur in commercial
settings
In Florida, 24% of businesses experienced
computer-based crime within the last 12 months
Less than 15% of computer crime is reported
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computer Crime–
Suspect MO





Information may be altered
Data may be obliterated
Programs can be altered, added, or
deleted
Data output may be altered
Data access for intelligence purposes
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Six Basic Motivations for
Computer Crime






Monetary gain
Property resale
Intelligence gathering
Destruction of the system
Criminal record keeping
Predatory stalking
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Monetary Gain



One of the most common ways is to divert
incoming funds
Adding fictitious costs to items purchased
Indirect monetary gain is when computers are
used for unauthorized purposes




Using the computer for non-company work
Working on private business on company computers
Software theft
Cellular phone account fraud
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
“Hackers” Attacking the
Home Computer

Vast amounts of personal and financial
information is stored on personal computers
– The information is vulnerable


Connected directly to the Internet
High-speed cable lines remain open all the time
– Personal computers are generally as powerful as
business computers…and as complicated
– Hacking into computers is more common than
people think
– Most people open too many emails that may
contain malicious programs designed to secure
financial information
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computers Used for
Property Diversion and
Resale


Either by an employee (common) or an
external “hacker”
Property is diverted from stock to
individuals or business without full
payment (or any)
– Orders can be enlarged
– Customers can fictitious
– Accounts can be fictitious
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computers Used for Illegal
Intelligence Gathering

Computers store sensitive information
–
–
–
–
Marketing information
Product development
Secret recipes for valuable products
Government records





Police investigations
Informant identifications
Tax records
School records (including grades)
Information that require passwords are vulnerable
– Codes can be broken
– Internal employees who are code holders may be involved
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Destruction of a
Computer

Many components of a computer are
susceptible to damage or destruction
– Physical destruction of hardware
– Information stored on hard drives
– Software

Typical offenders include:
– Disgruntled employees (or past employees)
– Those with a motive (those who may object to
the business in some way)
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Criminal Record Keeping
Using the Computer

Computers are frequently used by those who break the
law
– To store records
– Keep track of cash transfers

Criminal activity associated with computers include:
–
–
–
–
–
–

Narcotics
Gambling
Loan-sharking
Money laundering
Sexual predators
Child pornography
Computers are now often included in search warrants
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Predatory Stalking on the
Computer

Those who use computers to stalk are commonly referred to as
“cyberstalkers”
– They harass and/or intimidate victims
– They also target victims for rape and other sex crimes

Sex crimes are committed on the computer
– Soliciting minors for sexual activities
– Exchange, sell, and store child pornography


It is a violation of federal law to create, possess, or disseminate
child pornography
Law enforcement now routinely investigates child sex offenders
who are operating on the Internet
– Federal laws exist
– All states have laws specifically covering cyberstalking
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Computer Crime–
Suspect Characteristics
With the exception of the predatory offender, many
computer criminals generally follow the profile common to
the white-collar offender
 Above average intelligence
 Otherwise highly honest
 Have the attitude of “the little guy against the system”
 This offender is young (under 35), white, well
educated, highly motivated, and is a first-time offender
 Occupation of this offender is often a computer
programmer or operator
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Investigating Computer
Crime

Computer forensics training can be obtained from
– The National White Collar Crime Center
– The Bureau of Justice Assistance (U.S. DOJ)


From the beginning of the investigation, officers must
perceive the similarity of electronic evidence to standard,
more familiar evidence
All electronic evidence is typically latent in nature
– The evidence cannot be initially seen but must be made visible
by special means
– Data exists as electronic impulses
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Investigative Methods

Identify the computer and seize the computer
legally and forensically
– Search warrant
– Use competent technicians to seize the computer correctly
to avoid data being lost or destroyed






Identify who had access to the computer
Identify who had a motive
Determine who had the knowledge and skill to
accomplish the crime
Conduct a background on all suspects
Interview the suspect (this is a critical step)
Follow the money (banks, credit cards, large purchases, etc.)
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Other Investigative
Methods

The task force
– Multi-agency groups that pool resources
to investigate
Internet fraud
 Child pornography
 Computer hacking
 Computer viruses
 Identity theft


Proactive electronic undercover tactics
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Legal Considerations


The first law to specifically address the problem
of computer misuse was the Federal Computer
Systems Protection Act of 1977
All states currently have computer crime laws
as well and make it unlawful to:
– Enter a computer system without authorization
– Steal information
– Cause a system to go out of service
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Review Questions
1.
2.
3.
4.
5.
6.
7.
8.
List some of the internal police uses of the computer.
How do computers aid law enforcement in efficiency?
How are computers used to solve crimes?
How is the Internet used by investigators?
Define ‘computer crime.’
List the six motives for committing a crime involving
a computer.
What is a cyberstalker?
What are some law enforcement strategies to
investigate child pornography?
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458
Student Questions
Criminal Investigation, 7th Edition
By James N. Gilbert
PRENTICE HALL
©2007 Pearson Education, Inc.
Upper Saddle River, NJ 07458