Course list: http://www.c-jump.com/bcc/

Computer Crimes


  1. Computer Crimes
  2. Privacy vs. Security and Forensics
  3. Privacy vs. Security and Forensics, cont.
  4. Digital Investigation
  5. Evidence Preservation Procedures
  6. Digital Crime Scene Process
  7. Evidence Searching Phase
  8. Event Reconstruction Phase
  9. Case Example -- Mucko McDermott
  10. Comm. V. Michael "Mucko" McDermott
  11. Comm. V. Michael "Mucko" McDermott, cont.
  12. Comm. V. Michael "Mucko" McDermott, cont.
  13. Comm. V. Michael "Mucko" McDermott, cont.
  14. Dennis Rader -– The BTK Killer
  15. Zaccarias Moussaoui – "The 20th 9/11 Hijacker"
  16. Exhibit FO05521.11 01-455-A
  17. Overview Of Forensic Toolkits
  18. Extensive List of Tools
  19. Challenges
  20. Challenges, cont.
  21. Illegal traffic
  22. California, 2003, case example
  23. California, 2003, case example, cont.
  24. Identity theft
  25. Maryland, 1996, case example
  26. Good to Know...
  27. Digital Evidence
  28. Terrorism
  29. Civil Cases
  30. Enron and other corporate misdeeds
  31. Digital Evidence
  32. Digital Evidence, cont.
  33. Categories of Computer Systems
  34. Categories of Computer Systems, cont.
  35. Categories of Computer Systems, cont.
  36. Digital Evidence, cont.
  37. Challenges
  38. Facts about Digital evidence
  39. Challenges
  40. Internet crimes
  41. Ebay fraud example
  42. Internet
  43. Internet
  44. Corporate networks
  45. Cybertrail challenge
  46. Forensic Science Goals
  47. Forensic Science Purpose
  48. Homework
  49. How to Submit the Homework

1. Computer Crimes



2. Privacy vs. Security and Forensics



3. Privacy vs. Security and Forensics, cont.



4. Digital Investigation



5. Evidence Preservation Procedures



6. Digital Crime Scene Process



7. Evidence Searching Phase



8. Event Reconstruction Phase



9. Case Example -- Mucko McDermott


  • Killed seven co-workers in Wakefield, Massachusetts massacre

  • Early example of the power of digital evidence

  • Internet searches related to faking mental illness

  • Convicted and sentenced to life in prison

    Mucko McDermott

10. Comm. V. Michael "Mucko" McDermott



11. Comm. V. Michael "Mucko" McDermott, cont.



12. Comm. V. Michael "Mucko" McDermott, cont.



13. Comm. V. Michael "Mucko" McDermott, cont.



14. Dennis Rader -– The BTK Killer


  • Killed 10 confirmed over 30 years

  • Case went cold

  • Challenged LAPD by sending them a floppy

  • Contained metadata with his name and organization

  • Google search led police to his church


15. Zaccarias Moussaoui – "The 20th 9/11 Hijacker"


  • FBI analysis of his laptop and computers and the laptop of his roommate, Mukkarum Ali, and two computer at University of Oklahoma

  • Emails relating to flight training, and other evidence admitted at his trial

  • Convicted in 2006 of conspiring to kill Americans – sentenced to the Colorado Supermax prison for life

    Zaccarias Moussaoui

16. Exhibit FO05521.11 01-455-A



17. Overview Of Forensic Toolkits



18. Extensive List of Tools



19. Challenges


    Data Security Challenges
  • Criminals are using technology to

    • commit crimes

    • communicate

20. Challenges, cont.


21. Illegal traffic


    illegal traffic
  • Illegal traffic:

    • CP, drugs, illegal materials

  • US Customs Cybersmuggling Center:

    • views every computer in US, connected to the internet, as point of entry.

22. California, 2003, case example


23. California, 2003, case example, cont.


24. Identity theft


    medical records
  • Computers

  • Bank web sites and Bank ATMs

  • Credit Card Companies and Retailers

  • Email and communication

  • Wireless networks

  • Medical Records, Copy Machines, Scanners

25. Maryland, 1996, case example


26. Good to Know...


    Good to Know
  • Good to Know: www.google.com/goodtoknow/

    How to

    • Stay safe online

    • Protect your data on the web

    • Protect your data on Google

    • Manage your data

27. Digital Evidence


    crime
  • homicides

  • sex offences

  • missing persons

  • drug dealing

  • harrassment

  • workplace threats, retaliation

  • terrorist activity

28. Terrorism


    terrorism
  • Heavily computer-based Investigation examples:

    • World Trade Center bombings

    • Zacarias Moussaoui's role in airplane bombing attempt - 100 hard drives were examined.

  • USA Patriot Act enables ISPs to provide law enforcement with information quickly, without waiting for search warrants.

29. Civil Cases


    civil cases
  • Digital Discovery of Computerized records:

    • when events occured

    • who was where

    • ways of communication: AIM, Social Network, email, blogs...

30. Enron and other corporate misdeeds