cybercrime & investigative technologies section

33
Cybercrime & Investigative Technologies Section Cybercrime & Investigative Technologies Section F/Sgt. Brian Bunner [email protected]

Upload: others

Post on 02-Apr-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybercrime & Investigative Technologies Section

Cybercrime & Investigative

Technologies Section

Cybercrime & Investigative

Technologies Section

F/Sgt. Brian [email protected]

Page 2: Cybercrime & Investigative Technologies Section

Cyber Crime Investigation

Crimes where computers or any digital media was used as an element of the crimeTraditional crimes that have “digital evidence”High Tech crimes also have “digital evidence”

Page 3: Cybercrime & Investigative Technologies Section

Traditional Crime

BTK Killer-Dennis Rader

–Gave the news media a floppy disk which contained data that led investigators to his church and eventually the suspect

Scott Peterson-

–A few weeks before his pregnant wife, Laci, disappeared, he surfed the Web for information on tides and water currents in the same bay where her body turned up five months later

Page 4: Cybercrime & Investigative Technologies Section

Traditional Crime

Indiana Case

–Infant was killed by boyfriend punching stomach. Google searches of “what happens when infant stomach beaten”

Page 5: Cybercrime & Investigative Technologies Section

High Tech Crime

Hacking for Personal Information

–2015 Anthem security breach 80 Million accounts

Military or Terrorist Activities

–China, North Korea, Russia military hacking

Page 6: Cybercrime & Investigative Technologies Section

Legal Considerations

Reasonable Expectation of PrivacyConsent Searches“Control” of computer filesPlain ViewEmployer agreements

Page 7: Cybercrime & Investigative Technologies Section

Securing Digital EvidenceThere are so many different devices now that can contain digital evidence–Computers–Digital Cameras–Thumb Drives–Cell Phones–Gaming Systems–MP3 Players–Refrigerator/Appliances

Page 8: Cybercrime & Investigative Technologies Section

MemoryCards

Page 9: Cybercrime & Investigative Technologies Section

Micro SD Memory

Page 10: Cybercrime & Investigative Technologies Section

Mini Thumb Drive Micro Thumb Drive

Thumb Drives

Page 11: Cybercrime & Investigative Technologies Section

Thin Thumb Drive

Thumb Drives

Page 12: Cybercrime & Investigative Technologies Section

Thumb Drives

Page 13: Cybercrime & Investigative Technologies Section

Thumb Drives

Bullet 50 Cal Thumb Drive

Credit Card Thumb Drive

Page 14: Cybercrime & Investigative Technologies Section

Thumb Drives

BraceletThumb Drive

LeggoThumb Drive

Page 15: Cybercrime & Investigative Technologies Section

Thumb Drives

Nike Shoe Thumb Drive

Poker Chip Thumb Drive

Page 16: Cybercrime & Investigative Technologies Section

Swiss Army Pocket KnifeWith USB Drive

2.5 inch External Hard Drive

Page 17: Cybercrime & Investigative Technologies Section

USB Adapter forCompact Flash Card

MP3 Player and ThumbDrive Combo

Page 18: Cybercrime & Investigative Technologies Section

Pen with USB

Thumb DriveWatch with USB

Thumb Drive

Page 19: Cybercrime & Investigative Technologies Section

TiVo/Cable Box DVR

Page 20: Cybercrime & Investigative Technologies Section
Page 21: Cybercrime & Investigative Technologies Section
Page 22: Cybercrime & Investigative Technologies Section
Page 23: Cybercrime & Investigative Technologies Section

Securing A Computer

Remove any potential suspects from the area

On/Off Principle

–If it is off, leave it off

–If it is on

Document and photograph the screen

Pull the plug from the back of the computer (not the wall outlet)

Page 24: Cybercrime & Investigative Technologies Section

Securing A ComputerPhotograph the back of the computer including everything plugged into it

Note the make, model, and serial number of the computer

Label according to standard procedures

Take care during transport to avoid excess bouncing or jarring

Page 25: Cybercrime & Investigative Technologies Section

Securing A Computer

Networked computers (such as a business computer) –bring in a specialist, CALL CYBER CRIME UNIT

–There could be other network computers with important data–You could adversely affect the business operation and be held liable

Page 26: Cybercrime & Investigative Technologies Section

Securing Other Digital Devices

Generally just “bag and tag” like any other evidence

Only seize a Laptop power cord, Not a Desktop computer

Page 27: Cybercrime & Investigative Technologies Section

Cell Phone Forensics Rule #1

GET THE

PASSWORD(or Pattern)

Page 28: Cybercrime & Investigative Technologies Section

Smartphone Capabilities Phone calls and texting

Digital camera with video, HD and 4k

Full internet browsing

Emailing, Social Networking (Facebook)

File sharing (Flickr, Picasa, Mobileme)

Advanced GPS (tracking kids)

VOIP (via Internet) Skype, Google Voice

Page 29: Cybercrime & Investigative Technologies Section

Remote Wiping/Deleting

This is a BAD DAY

Page 30: Cybercrime & Investigative Technologies Section

Remote Wiping/Deleting• Suspect or person helping suspect can send a Remote Wipe signal to

the smartphone to delete the contents.

• We highly recommend that when phone is seized by police officer that they put the phone in “Airplane Mode” AND turn the WiFi OFF.

• Apple WIPES ALL data, Androids are getting better at Factory Resetting

Page 31: Cybercrime & Investigative Technologies Section

Remote Wiping/Deleting• Suspect uses

computer or another smartphone to login to his account and wipe his phone.

• If smartphone is not in “Airplane Mode” or taken off the cellular or WiFi network, wipe command will start.

Page 32: Cybercrime & Investigative Technologies Section

Remote Wiping/Deleting

Remove device from all networks, then examine

Page 33: Cybercrime & Investigative Technologies Section

Remote Wiping/Deleting

• No Aluminum foil or paint cans needed

• As long as Airplane Mode turned ON and Phone is turned OFF, remove battery if possible

• Place in regular evidence bag