Criminal Investigation Ch. 17

Do you know what two key characteristics of computer crime are?

Two key characteristics of computer crimes:
Relatively easy to commit and difficult to detect.
Most are not prosecuted.

List the steps taken in following a common protocol for processing a crime scene involving electronic evidence.

A common protocol for processing a crime scene
involving electronic evidence is as follows:
Secure and evaluate the crime scene
Conduct preliminary interviews
Obtain a search warrant
Recognize and identify the evidence
Document the crime scene
Collect and

Explain the basic on/off tenet for first responders at a computer crime scene.

A basic tenet for first responders at computer crime scenes is to observe the ON/OFF rule: If it's on, leave it on; if it's off, leave it off.

Summarize the benefits of getting a search warrant in a computer crime investigation.

Having a search warrant generally decreases the amount of resistance investigators face at the scene and increases the odds of successful prosecution should the case go to court

Identify the various forms electronic evidence and other computer crime evidence may take.

Digital evidence is often contained on disks, CDs or hard drives, or on any number of peripheral electronic devices; is not readily discernible; and is highly susceptible to destruction. Other computer crime evidence may exist in the form of data reports,

Describe how electronic evidence should be stored.

Store electronic evidence in a secure area away from temperature and humidity extremes and protected from magnetic sources, moisture, dust, and other harmful particles or contaminants. Do not use plastic bags.

Determine how cybercriminals may be categorized, including their differing motivations.

Three general categories of cybercriminals are hackers, vandals, and criminals. Motivations vary, from the hacker's need for an intellectual challenge,
to the vandal's urge to cause damage, to the criminal's desire for financial or other personal gain.

Understand ways in which computer crimes can be prevented.

Computer crimes can be prevented by educating top management and employees and by instituting internal security precautions. Top management must make a commitment to defend against computer crime