Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Investigation of CyberCrime

Week 3 - Instructor Guidance

Scott Mann

on 8 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Investigation of CyberCrime

Introduction to Cyber Crime Week 4 - Instructor Guidance Those who do not commit fraud attempt to hide
behind a computer screen and bully others who
usually are not aware of the person's identity. Roles and responsibilities
of law enforcement
in the prevention of cyber crime Duties of Law Enforcement Authorities. — To ensure that the technical nature of cybercrime and its prevention is given focus and consideration for the investigation of cybercrimes. Help defend critical infrastructures from disasters, cyber incidents, and terrorist attacks. Recognize the need for action against computer-related crimes. Investigate complex computer crimes, assist with regional investigations, train investigators, disseminate information to the public, and proactively work to identify and prevent future crimes.
This week students will:
•Identify the Roles and responsibilities of law enforcement in the prevention of cyber crime.
•Analyze legislative impediments to local prevention of cyber crime.
•Assess different personnel and skills needed to investigate computer-related crime.
•Summarize the process by which digital evidence is acquired during an investigation of computer-related crimes.
•Recognize the considerations that must be addressed when dealing with Electronic Search Warrants
Law enforcement personnel at the local level continue to encounter a host of issues that have hampered efforts to combat computer crimes effectively within their own jurisdictions.

Local officers may not have the understanding of computer crimes necessary to properly investigate these offenses.

Computer crimes lack recognition and support from upper-level management
Legislative impediments to local prevention of cyber crime. Increased resources and technology are needed: (1) training
(2) equipment
(3) updated criminal codes
(4) assistance from federal level including expertise, resources, and equipment You can't hide! Understanding the roles of and skills needed by personnel is vital to planning appropriate investigations.

Investigations are broken down into three basic types:
1) single-scene
2) multiple-scene
3) network investigations Single-scene investigations require the skills found in trained law enforcement investigators.

Multiple-scene investigations require additional networking and coordination skills.

Network crimes require the skills of multiple-scene investigators and outside expert assistance. An untrained patrol officer can easily inadvertently destroy computerized evidence if not trained in protecting such evidence. Investigators must have enough technical skill to gather evidence, comprehend the crime, and communicate effectively with technical experts.

In electronic crime investigations, the complex analysis of evidence is often left to forensic specialists. Technical experts conduct this analysis through computer forensic techniques. Special programs and procedures allow forensic specialists to compile evidence and present it to the court. The Fourth Amendment protects citizens from unreasonable searches and seizures. A search warrant aims to make the search reasonable and legal.
Criminal investigators must establish probable cause in an affidavit in application for a search warrant.
The affidavit must specify that a crime has been committed, evidence of the crime exists, and the evidence presently exists in the place to be searched. Further, the evidence to be seized must be described.
Full transcript