Criminal Investigations - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Criminal Investigations

Description:

Are relatively easy to commit and difficult to detect ... Misguided playfulness. Personal gain. Maliciousness or revenge. 10/1/09. 13 ... – PowerPoint PPT presentation

Number of Views:157
Avg rating:3.0/5.0
Slides: 15
Provided by: STEL2
Category:

less

Transcript and Presenter's Notes

Title: Criminal Investigations


1
Criminal Investigations
  • Computer Crime
  • Chapter 17

2
Computer Crimes
  • Computer crime-as that which involves the
    addition, deletion, change or theft of
    information
  • Are relatively easy to commit and difficult to
    detect
  • Most computer crimes are committed by insiders
  • Most computer crimes are not prosecuted

3
Classification
  • Stealing tangible or intangible assets
  • Destroying or altering data
  • Embezzling finds
  • Destroying or altering software
  • Stealing computer software
  • Producing/distributing child pornography

4
Nature of the Crimes
  • Computer crimes may involve the input data, the
    output data, the program, the hardware or
    computer time
  • The most common types of computer crime are
    misuse of computer services, program abuse and
    data abuse

5
Types of Electronic Crimes Committed 2005
  • Virus 82
  • Spyware 61
  • Phishing 57
  • Illegal Generation of Spam Email 48
  • Unauthorized access to systems 43
  • Denial of Service attacks 32
  • Illegal wireless access 19

6
Other types of Computer Crimes
  • Exposure of private sensitive info 19
  • Fraud 19
  • Employee Identity Theft 17
  • Password Sniffing 16
  • Sabotage 11
  • Web Site defacement 9
  • Extortion 2

7
Search Warrants
  • Request the consent initially,
  • If that fails, use the search warrant
  • In that order

8
Evidence
  • Computer evidence is often contained on disks, is
    not readily discernible and also is highly
    susceptible to destruction
  • Evidence is normally in the form of disks, data
    reports, programming or other printed information
    run from information in the computer

9
Searching for and Processing Physical Evidence
  • Avoid contact with the recording surfaces of
    computer tapes and disks
  • Never write on disk labels with a ball-point pen
    or pencil or use paper clips or rubber bands with
    disks
  • To do so may destroy the data they contain
  • Store computer disks vertically, at approximately
    70F and away from strong light, dust and magnetic
    fields
  • Do not use plastic bags

10
The Investigative Team
  • Investigating computer crime often requires a
    team approach

11
Suspects
  • Those involved in computer crimes are most
    commonly technical people such as data entry
    clerk, machine operators, programmers, systems
    analysts, and hackers

12
Motivation
  • Frequent motives for computer crimes are
  • Ignorance of proper professional conduct
  • Misguided playfulness
  • Personal gain
  • Maliciousness or revenge

13
Preventing Computer Crime
  • Computer crimes can be prevented by educating top
    management and employees and by instituting
    internal security precaution
  • Top management must make a commitment to defend
    against computer crime

14
The End
Write a Comment
User Comments (0)
About PowerShow.com