Securitate Cybernetic: Personas e Roles
169 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Quale position es tenite per Robert Morgester?

  • Attorney Advisor
  • Vice President
  • Detective
  • Deputy Attorney General (correct)
  • Unde se trova le office de Abigail Abraham?

  • Sacramento, California
  • Chicago, Illinois (correct)
  • Charlotte, North Carolina
  • Phoenix, Arizona
  • Qual es le titolo de Amber Haqqani?

  • Sergeant
  • Chief Systems Engineer
  • Director de Digital Evidence (correct)
  • Staff Attorney
  • Quale departamento es David Arnett associate?

    <p>Arizona Department of Public Safety</p> Signup and view all the answers

    Ubi se trova le Postal Inspection Service?

    <p>Dulles, Virginia</p> Signup and view all the answers

    Quale rol es tenite per Don Flynn?

    <p>Attorney Advisor</p> Signup and view all the answers

    Qual es le nomine del attorney contente in le documento?

    <p>Carleton Bryant</p> Signup and view all the answers

    Qual es le profession de Walter E. Bruehs?

    <p>Forensics Examiner</p> Signup and view all the answers

    Quale unitate de le National Institute of Standards and Technology es Rick Ayers membro?

    <p>Digital Evidence Unit</p> Signup and view all the answers

    Quale es le localitate del office de Menz and Associates?

    <p>Folsom, California</p> Signup and view all the answers

    Quo es le location de le NSLEC Centre for National High Tech Crime Training?

    <p>Wyboston Lakes Business and Leisure Centre</p> Signup and view all the answers

    Qual es le responsabile de le Technical Assistance Section?

    <p>Dave Heslep</p> Signup and view all the answers

    Quale position non es mentionate in le document?

    <p>Governor</p> Signup and view all the answers

    Quo es le location de le Nebraska State Patrol?

    <p>Omaha, Nebraska</p> Signup and view all the answers

    Quale section es associate con Dave Ausdenmoore?

    <p>Regional Electronics and Computer Investigation Section</p> Signup and view all the answers

    Qual es le profession de Chip Johnson?

    <p>Lieutenant</p> Signup and view all the answers

    Qual es le principale objective de un examination forense digital?

    <p>Maintener le integritate del evidentia original</p> Signup and view all the answers

    Qual information pote esser revelate per un examination de media electronic?

    <p>Le registri de proprietate e information de registratio de software</p> Signup and view all the answers

    Qual es un challenge in le analysis de recordings audio obtinente per le polizia?

    <p>Le presenza de ruido ambiante</p> Signup and view all the answers

    Qual technologia es usate pro mejorar le qualitá de videos in le context de le investigation?

    <p>Technologia pro analisar e mejorar le qualitá del imagines</p> Signup and view all the answers

    Que type de files pote esser recuperate durante un analysis forense?

    <p>Files deletate e ocultate</p> Signup and view all the answers

    Qual information de le usuarios pote esser includite in un examination forense de computer?

    <p>Emails e log de chat</p> Signup and view all the answers

    Qual de le subsequente es un usus forense de examination de datos?

    <p>Crear un cronologia de eventos</p> Signup and view all the answers

    Le qual es un aspecte negativo de tapes de surveillance durante un investigation?

    <p>Le tapes es in formato proprietary e de qualitá pobre</p> Signup and view all the answers

    Qual informationes un investigator pote compeler in conformitate con 18 U.S.C.§ 2703(f)?

    <p>Informationes de subscriber e datos transaccionales</p> Signup and view all the answers

    Qual necessitas pro obtiner informationes de un proveedor de service in relation al VoIP?

    <p>Un ordine de wiretap pro interceptar contento</p> Signup and view all the answers

    Quo es le contento de communicationes in le contexto de VoIP?

    <p>Le real communicationes inter usuarios</p> Signup and view all the answers

    Qual es le restrictives che governante le investigatores e societates de telecommunications?

    <p>Le Title III</p> Signup and view all the answers

    Qual informationes pote un provider de VoIP mantener?

    <p>Informationes de subscriber e datos de connection</p> Signup and view all the answers

    Quo de le mesme processu legal es usate per obtenir informationes de VoIP e de un ISP?

    <p>Le requisito de un ordine legal</p> Signup and view all the answers

    Qual es un exemplo de dato transaccional que un provider pote tener?

    <p>Data e hora de connexion</p> Signup and view all the answers

    Quo es le consequente pro le non-consensual interception de communicationes?

    <p>Il require un ordine de wiretap</p> Signup and view all the answers

    Qual es le methodo le investigator deberea usar si il es incert si un dispositivo es conectante con altere?

    <p>Replace le batterias del dispositivo.</p> Signup and view all the answers

    Que debe le investigator facer si illes decide connectar duo dispositivos?

    <p>Informa le persona faciente data recovery.</p> Signup and view all the answers

    Qual de le sequente non es un tipo de accesso controle?

    <p>Chiave</p> Signup and view all the answers

    Qual es le triade essential in le authentication de identitate?

    <p>Qualcosa que tu have, qualcosa que tu sape, qualcosa que tu es.</p> Signup and view all the answers

    Qual tipo de dispositivo evalua “qualcosa que tu es”?

    <p>Biometric device</p> Signup and view all the answers

    Quo es un potenzial risk si un dispositivo es connectate a un altere dispositivo durante le data transfer?

    <p>Transfer de data poterea occurrer.</p> Signup and view all the answers

    Qual es le beneficio principal de usar dispositivis de accesso controle per un investigator?

    <p>Stabilir le presentz o absentia de un individuo in un location controlate.</p> Signup and view all the answers

    Que pote complicar le recuperação de data si un dispositivo es inactive o dormiente?

    <p>Activation de passwords.</p> Signup and view all the answers

    Which office administers the Interagency Agreement #2003–IJ–R–029?

    <p>National Institute of Justice</p> Signup and view all the answers

    The National Institute of Justice includes only the Office for Victims of Crime and the Office of Juvenile Justice and Delinquency Prevention.

    <p>False</p> Signup and view all the answers

    Name one primary role of Phillip Osborn mentioned in the document.

    <p>Senior Special Agent</p> Signup and view all the answers

    The National Institute of Justice is a component of the Office of ______ Programs.

    <p>Justice</p> Signup and view all the answers

    Match the following individuals to their respective roles:

    <p>James R. Doyle = National Program Manager Joseph Duke = U.S. Special Agent Phillip Osborn = Senior Special Agent Rick Ayers = Member of the National Institute of Standards and Technology</p> Signup and view all the answers

    Which of the following is NOT listed as a component of the Office of Justice Programs?

    <p>Office of Cyber Security</p> Signup and view all the answers

    The Technology Working Group includes members from only local law enforcement agencies.

    <p>False</p> Signup and view all the answers

    What role does Joseph Duke hold as mentioned in the document?

    <p>U.S. Special Agent</p> Signup and view all the answers

    What is the screen name of the suspect involved in the investigation?

    <p>LittleMS123</p> Signup and view all the answers

    Records obtained from Acme Online indicate that the account established in the name of Mike Smith used a credit card associated with himself.

    <p>False</p> Signup and view all the answers

    What purpose did the undercover activity serve in locating the suspect?

    <p>To engage with the suspect online and arrange a meeting.</p> Signup and view all the answers

    The suspect, Mike Smith, is the owner of a child talent agency in _______.

    <p>Anytown, USA</p> Signup and view all the answers

    Match the terms with their descriptions:

    <p>Dial-up access number = A method for connecting to the internet Undercover account = An account used to conduct covert operations Chat room = A virtual space for online conversations User account = An online identity for accessing services</p> Signup and view all the answers

    Who is the Assistant Director at the National White Collar Crime Center?

    <p>Bill Crane</p> Signup and view all the answers

    Tom Kolpacki works for the Denver District Attorney's Office.

    <p>False</p> Signup and view all the answers

    What is the primary role of Al Lewis as mentioned in the content?

    <p>Special Agent</p> Signup and view all the answers

    The _____ is associated with the CyberScience Lab.

    <p>National Law Enforcement and Corrections Technology Center–Northeast</p> Signup and view all the answers

    Match the following individuals with their respective organizations:

    <p>Al Lewis = USSS Electronic Crimes Task Force Glenn Lewis = SEARCH Group, Inc Richard Salgado = U.S. Department of Justice Chris Stippich = Digital Intelligence, Inc.</p> Signup and view all the answers

    What city is the Air Force Office of Special Investigations located in?

    <p>Quantico, Virginia</p> Signup and view all the answers

    Jim Riccardi, Jr. is a Computer Training Specialist.

    <p>True</p> Signup and view all the answers

    Who is the Chief of Research and Development at the Air Force Office of Special Investigations?

    <p>Larissa O’Brien</p> Signup and view all the answers

    Richard Salgado is associated with the _____ Section.

    <p>Computer Crime and Intellectual Property</p> Signup and view all the answers

    Which of the following individuals works for the Denver District Attorney’s Office?

    <p>Henry (Dick) Reeve</p> Signup and view all the answers

    What is the focus of techniques discussed in Chapter 1?

    <p>Information gathering</p> Signup and view all the answers

    Digital evidence can only be found on computers.

    <p>False</p> Signup and view all the answers

    Name one type of tool used for video surveillance.

    <p>Digital security cameras</p> Signup and view all the answers

    ________ is used to track the location of a vehicle using satellite signals.

    <p>Global Positioning System (GPS)</p> Signup and view all the answers

    Match the following tools with their primary functions:

    <p>Caller ID devices = Identifying incoming calls Encryption tools = Securing data Digital cameras = Capturing images Voice recorders = Recording audio</p> Signup and view all the answers

    Which of the following concerns is associated with battery-operated devices?

    <p>Power concerns</p> Signup and view all the answers

    Steganography is used to conceal information within files.

    <p>True</p> Signup and view all the answers

    What is one method used for data preservation?

    <p>Imaging</p> Signup and view all the answers

    The primary purpose of __________ devices is to verify the identity of users.

    <p>access-control</p> Signup and view all the answers

    Which of the following tools is NOT typically used for audio examination?

    <p>Video surveillance systems</p> Signup and view all the answers

    What is the primary purpose of this special report?

    <p>To serve as a resource for law enforcement dealing with technology-related crimes</p> Signup and view all the answers

    The information in the report is considered all-inclusive regarding technology-related investigations.

    <p>False</p> Signup and view all the answers

    What must investigators consider when implementing the information from the report?

    <p>Current technology and practices.</p> Signup and view all the answers

    The report recognizes that all investigations are __________.

    <p>unique</p> Signup and view all the answers

    Match the following terms to their descriptions:

    <p>ECPA = Electronic Communications Privacy Act Warrantless Search = Search without a warrant Seizure = Taking possession of evidence Digital Forensics = Analysis of electronic data</p> Signup and view all the answers

    Which area of law enforcement does this report primarily serve?

    <p>Technology-related crimes</p> Signup and view all the answers

    Investigators are discouraged from using their judgment when applying information from the report.

    <p>False</p> Signup and view all the answers

    What aspect of technology does the report emphasize in law enforcement investigations?

    <p>Tools and techniques for investigating technology-related crimes.</p> Signup and view all the answers

    The report is intended for law enforcement personnel including investigators, first responders, and ______.

    <p>detectives</p> Signup and view all the answers

    What should be adjusted in accordance with the information in the report?

    <p>Tools for investigating technology crimes</p> Signup and view all the answers

    Who holds the position of Assistant U.S. Attorney in the Western District of Wisconsin?

    <p>Timothy O’Shea</p> Signup and view all the answers

    Susan Ballou is the President & CEO of a forensic science company.

    <p>False</p> Signup and view all the answers

    Name the location of Thom Quinn's position?

    <p>California Department of Justice</p> Signup and view all the answers

    Anjali R. Swienton is the President and CEO of ______.

    <p>SciLawForensics, Ltd.</p> Signup and view all the answers

    Match the following professionals with their roles:

    <p>Timothy O’Shea = Assistant U.S. Attorney Susan Ballou = Program Manager for Forensic Sciences Thom Quinn = Program Manager Anjali R. Swienton = President &amp; CEO</p> Signup and view all the answers

    Which member is from Madison, Wisconsin?

    <p>Timothy O’Shea</p> Signup and view all the answers

    All members of the Technology Working Group are from federal agencies.

    <p>False</p> Signup and view all the answers

    Identify the professional role of Susan Ballou.

    <p>Senior Litigation Counsel</p> Signup and view all the answers

    What is the primary purpose of authenticating a recording?

    <p>To determine the source or origin</p> Signup and view all the answers

    Advanced skills are not required to analyze and interpret audio data.

    <p>False</p> Signup and view all the answers

    What legal consideration should be taken before examining original recordings?

    <p>Seek legal guidance</p> Signup and view all the answers

    The process of converting _______ to digital formats is a common use of audio examination tools.

    <p>analog recordings</p> Signup and view all the answers

    Match the following tools with their primary function:

    <p>Caller ID devices = Display incoming call numbers Signal-processing equipment = Analyze audio data Audio enhancement software = Improve sound quality Digital conversion tools = Convert analog to digital formats</p> Signup and view all the answers

    Which of the following technologies is mentioned as potentially having investigative value?

    <p>Digital camera</p> Signup and view all the answers

    The physical location of the devices always aligns with the location of the data.

    <p>False</p> Signup and view all the answers

    What is one factor to consider about the security of a device?

    <p>Physical security or data security</p> Signup and view all the answers

    The _______ of the user can impact the effectiveness of using technology during investigations.

    <p>skill level</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>PDA = Personal digital assistant Firewall = Security barrier for networks Remote access = Ability to connect to a system from a distance System administrator = Person responsible for maintaining the system</p> Signup and view all the answers

    What information might be revealed if a device is connected to the internet?

    <p>All of the above</p> Signup and view all the answers

    All user accounts and passwords are always stored securely on devices.

    <p>False</p> Signup and view all the answers

    If information is transmitted to other recipients, it can happen through _______ methods.

    <p>online, telephone, or personal</p> Signup and view all the answers

    What can complicate data retrieval if a device is inactive?

    <p>It may not be accessible or operational.</p> Signup and view all the answers

    Who may have administrative privileges on a system?

    <p>System administrator</p> Signup and view all the answers

    What should be done with electronic evidence during its seizure and examination?

    <p>Ensure it is fully documented and preserved</p> Signup and view all the answers

    Specialized training is not necessary for the examination of digital evidence.

    <p>False</p> Signup and view all the answers

    What should be available for review after the examination of electronic evidence?

    <p>Full documentation of the examination process</p> Signup and view all the answers

    Actions taken to secure and collect evidence should not ______ that evidence.

    <p>change</p> Signup and view all the answers

    Match the type of evidence with its documentation requirement:

    <p>Digital Evidence = Must be preserved and documented Physical Evidence = Should be stored securely Witness Testimonies = Requires a signed statement Items of Clothing = Documented chain of custody</p> Signup and view all the answers

    Which of the following is essential before conducting an examination of electronic evidence?

    <p>Consult appropriate personnel</p> Signup and view all the answers

    Documentation of the examination process is optional.

    <p>False</p> Signup and view all the answers

    Name one source where further information on electronic evidence can be found.

    <p>Electronic Crime Scene Investigation: A Guide for First Responders</p> Signup and view all the answers

    The handling of electronic evidence must adhere to various ______ and laws.

    <p>federal, state, and local</p> Signup and view all the answers

    Which of the following actions is NOT appropriate when dealing with electronic evidence?

    <p>Seize evidence without proper authorization</p> Signup and view all the answers

    Which of the following devices can be modified to perform functions beyond their intended purpose?

    <p>Microsoft Xbox®</p> Signup and view all the answers

    Data can be maintained in devices powered by batteries as long as the power supply is continuous.

    <p>True</p> Signup and view all the answers

    What should investigators do to prevent data loss in battery-operated devices?

    <p>Immediately replace the batteries or place the device in its charger.</p> Signup and view all the answers

    Some small electronic devices, such as PDAs, can connect to more ______ devices like computers.

    <p>powerful</p> Signup and view all the answers

    Match the following devices with their possible modifications:

    <p>Cell Phones = Can be modified to be firearms PDAs = Hollowed-out for storage of narcotics Microsoft Xbox® = Altered to store data Watches = Store data</p> Signup and view all the answers

    What could complicate the recovery of data from a device?

    <p>If the device is inactive or in sleep mode</p> Signup and view all the answers

    All cords connected to devices are easily identifiable for power and data transfer.

    <p>False</p> Signup and view all the answers

    Why should investigators be aware of the surroundings of a device?

    <p>To gain clues about the likelihood of the device being altered.</p> Signup and view all the answers

    As devices become ______ functional, more data can be stored in everyday objects.

    <p>multifunctional</p> Signup and view all the answers

    What must receiving personnel be alerted about when custody of a device is transferred?

    <p>The power requirements of the device</p> Signup and view all the answers

    Which of the following individuals is associated with the USSS Electronic Crimes Task Force?

    <p>Al Lewis</p> Signup and view all the answers

    Henry (Dick) Reeve is the Deputy District Attorney in Chicago, Illinois.

    <p>False</p> Signup and view all the answers

    What city is Glenn Lewis associated with?

    <p>Sacramento, California</p> Signup and view all the answers

    Tom Kolpacki works as a ___________ for the Ann Arbor Police.

    <p>Detective</p> Signup and view all the answers

    Match the following individuals with their roles:

    <p>Al Lewis = Special Agent, USSS Electronic Crimes Task Force Thomas Musheno = Forensic Examiner, FBI Jim Riccardi, Jr. = Computer Training Specialist, CyberScience Lab Chris Stippich = President, Digital Intelligence, Inc.</p> Signup and view all the answers

    Which organization's office is located in Fairmont, West Virginia?

    <p>National White Collar Crime Center</p> Signup and view all the answers

    Richard Salgado is a forensic audio specialist.

    <p>False</p> Signup and view all the answers

    Who is the Chief of Research and Development at the Air Force Office of Special Investigations?

    <p>Larissa O’Brien</p> Signup and view all the answers

    Which of the following describes the purpose of the special report?

    <p>To serve as a resource for law enforcement personnel dealing with technology-related crimes</p> Signup and view all the answers

    The special report includes exhaustive information on all technology-related crimes.

    <p>False</p> Signup and view all the answers

    What should be considered in the implementation of the special report?

    <p>Current technology and practices</p> Signup and view all the answers

    The report is a resource for law enforcement personnel, including ______, first responders, and prosecutors.

    <p>investigators</p> Signup and view all the answers

    Match the following sections of the report with their content:

    <p>Appendix A = Glossary Appendix B = Technical Resources List Appendix C = Hacked Devices Appendix D = Disclosure Rules of ECPA</p> Signup and view all the answers

    Which of the following is NOT included in the appendices of the report?

    <p>Victim’s Rights</p> Signup and view all the answers

    The special report suggests that all investigations are identical.

    <p>False</p> Signup and view all the answers

    What must investigators give deference to when implementing the report?

    <p>Judgment of investigators</p> Signup and view all the answers

    The section titled 'Statutes that affect the seizure and search of ______ evidence' covers legal guidelines regarding electronic evidence.

    <p>electronic</p> Signup and view all the answers

    Which of the following is a key focus of the special report?

    <p>Framework for using high-tech tools in investigations</p> Signup and view all the answers

    What types of information can be acquired through service provider records?

    <p>Transaction records</p> Signup and view all the answers

    Law enforcement officers should avoid revealing their identity when using the Internet in undercover operations.

    <p>True</p> Signup and view all the answers

    What is a potential risk associated with visiting a website while conducting undercover operations?

    <p>Revealing the identity of the investigator or agency through encoded information.</p> Signup and view all the answers

    E-mails and chat activity contain ______ information that can reveal the identity of the sender.

    <p>encoded</p> Signup and view all the answers

    Which of the following is an example of proactive undercover operations?

    <p>Investigation of child exploitation</p> Signup and view all the answers

    Investigators do not need to request preservation of records from online services.

    <p>False</p> Signup and view all the answers

    Match the following law enforcement actions to their purposes:

    <p>Proactive undercover operations = Investigation of serious crimes Request record preservation = Maintain evidence Use of chat programs = Identify suspects Internet tracking = Reveal user activity</p> Signup and view all the answers

    What specialized assistance is often required for undercover operations?

    <p>Specialized training and legal counsel.</p> Signup and view all the answers

    Websites often track the user's ______, time, and date of access.

    <p>IP address</p> Signup and view all the answers

    What kind of information can online chat content provide in a criminal investigation?

    <p>Direct evidence of communications</p> Signup and view all the answers

    Which of the following items may indicate the existence of a related device?

    <p>Computer accessories like cradles</p> Signup and view all the answers

    Publicly available information cannot be obtained from Internet searches.

    <p>False</p> Signup and view all the answers

    What is one type of consumer electronic device mentioned that might be involved in an investigation?

    <p>Cell phone</p> Signup and view all the answers

    Documents containing access information may include user names and __________.

    <p>passwords</p> Signup and view all the answers

    Match the following items to their potential purpose:

    <p>ThumbDrives = Storage media Webcam = Video recording GPS = Location tracking Caller ID box = Identifying callers</p> Signup and view all the answers

    Which of the following is an example of storage media?

    <p>Memory cards</p> Signup and view all the answers

    Recovering abandoned property is a method that can be used in investigations.

    <p>True</p> Signup and view all the answers

    Name one type of document that might provide evidence during an investigation.

    <p>Bills</p> Signup and view all the answers

    The presence of __________ at or near the crime scene may indicate possible criminal activity.

    <p>ATMs</p> Signup and view all the answers

    Which device is commonly associated with monitoring and controlling physical access?

    <p>Alarm system</p> Signup and view all the answers

    What items were seized during the execution of the search warrant at Smith's residence?

    <p>Several computers, digital cameras, and prints of child pornography images</p> Signup and view all the answers

    A covert account should be used for undercover activities to ensure communications are traceable.

    <p>False</p> Signup and view all the answers

    What type of images did the suspect transmit during the online chats?

    <p>Pornographic images of children engaged in sexual activities</p> Signup and view all the answers

    The address identified through records obtained from the phone company is located in ______, USA.

    <p>Anytown</p> Signup and view all the answers

    Match the following items with their descriptions:

    <p>Digital Cameras = Used to capture still images Analog Answering Machine = Used for voice messages Computers = Used for data storage and internet access Cellular Phone = Used for mobile communication</p> Signup and view all the answers

    Study Notes

    Personen in Securitate Cybernetic

    • Multe personas de diverse organisationes es mentionate in le textu como expertos in le campo de securitate cybernetic
    • Le personas e lor roles es mentionate, per exemplo: Robert Morgester - Deputy Attorney General, State of California Department of Justice, Abigail Abraham - Assistant Attorney General, Illinois Attorney General’s Office, Dave Ausdenmoore - Detective, Regional Electronics and Computer Investigation Section, Hamilton County Sheriff’s Office/ Cincinnati Police Department, Rick Ayers - National Institute of Standards and Technology etc.
    • Le personas mentionate representa un varie de sectores, incluente le governamento, le policia, le industria private e le academia

    Analyse de Evidentia Digital

    • Analyse de evidentia digital debe esser facite per personnel formate in un copia forense pro mantener le integritate del evidentia original
    • Le examination de media electronic pote revelar informationes como:
      • Informationes de proprietate e registration de software
      • Diarios, jornales e logarithmos
      • Bases de datos, folios de calculo, imagines e documentos
      • Files eliminate e occulte
      • Activitate del internet
      • Communicationes - input del usator (per exemplo, correos electronic, logarithmos de chat)
      • Communicationes - transferencias de datos (per exemplo, peer to peer (P2P), gruppos de novas)
      • Registros financiar
      • Datos pro esser usate in un analyse de linea de tempore
      • Contraband

    Analyse de Audio, Video e Imagines

    • Technologie existe pro analisar e ameliorar le qualitate de recordings de audio, video e imagines
    • Le analyse de audio pote esser usate pro ameliorar le qualitate de recordings de audio que contine sonos ambiente que interfere con le interpretation
    • Le analyse de video pote esser usate pro ameliorar le qualitate de tapes de surveillance, que pote esser multiplexate (multiple o division de ecran), proprie in formato, necessitante un platforma specific pro esser visualisate, o de qualitate basse
    • Le analyse de imagines pote esser usate pro ameliorar le qualitate de imagines immobile
    • Le technologie pro analizar e ameliorar le qualitate de audio, video e imagines pote esser disponibile ab le fabricante o le usator final del equipaggiamento

    Informationes de Servitores de Internet (ISP)

    • Investigatores pote obtenir informationes ab ISPs con le processo legal appropriate e sufficiente informationes (per exemplo, nomine de usator o adresse IP e data/hora)
    • ISPs pote provider le sequente informationes:
      • Informationes del subscriber (per exemplo, nomine e adresse)
      • Methodo de pagamento e informationes de facturation
      • Datos transactional (logarithmo de connectiones, per exemplo, location, hora, ID del chiamante del location de connection, e duration del connection al internet)
      • Contenito del communicationes
      • Informationes miscellanee (per exemplo, nomines de usator additional in le conto, listas de amicos, transmission de correos electronic)

    Protocol de Voce super Protocollo Internet (VoIP)

    • VoIP permitte al usatores de ordinatores facer appellos telephonic super le internet o reti de ordinatores
    • Provideres de communicationes que ofrece VoIP pote mantener informationes del subscriber e informationes transactional concernente iste connections
    • Iste informationes pote esser obtenite per le mesme processo legal usate pro obtener informationes ab un ISP, sed le interception in tempore real non-consensual del contenito de iste communicationes pote requirer un ordine de escuta telefonic

    Telecommunicationes

    • Retis telephonic public provide services de telecommunication per un varie de dispositivos electronic de ordinatores e consumers, como PDAs, telephonos cellular, e alteres
    • Investigatores e compania de telecommunicationes es guidate per le autoritate e constraints de Tito III e le Lege de Assistentia de Communicationes pro le Application de Lege de 1994 (CALEA)
    • Ordines specific pro le production del sequente typos de informationes es addressate in le Capitulo 3, Questiones Legal

    Dispositivos de Controlo de Accesso

    • Dispositivos de controlo de accesso tenta autenticar le identitate de un individuo
    • Autentication es basate super un o plus elementos del sequente triada: "Alicun cosa que tu ha, alicun cosa que tu sap, alicun cosa que tu es"
    • Claves de fob e cartas inteligente es "alicun cosa que tu ha": un objecto physic que establis le identitate
    • Teclados require "alicun cosa que tu sap," generalmente un codice de access
    • Dispositivos biometric evalua "alicun cosa que tu es" per mesurar o avaliar un characteristic physic specific al persona
    • Dispositivos biometric include scanners de iris o retina, scanners de impressione digital, recognition de facie o voce, detectores de passo, e detectores de geometria de mano

    Valor de Dispositivos de Controlo de Accesso

    • Investigatores pote usar iste dispositivos pro:
      • Stablir le presentia o absentia de un individuo in un location controlate (como in casos de furto de identitate e espionage)

    Investigative Tools an Techniques

    • This special report is intended to provide guidance to law enforcement personnel, who may have limited or no experience with technology-related crimes. It is not all inclusive, and focuses on the most common techniques, devices, and tools encountered.
    • Technology is constantly evolving so users must consider current technologies and practices, adjusting as necessary.
    • The special report notes that all investigations are unique and the judgment of investigators should be considered when implementing the information.
    • The report offers a practical example of how technology is used in an investigation.
    • The example involves a user named LittleMS123 and his association with an account on Acme Online.
    • The account is connected to a credit card of the suspect's mother.
    • The report suggests that the dial-up access number used by the account may provide clues as to the suspect's location.
    • The special report underlines the importance of being aware that fraudulent identification might be used to create user accounts and that multiple users may access the same account from different locations.
    • The example then describes an undercover strategy, using a local ICAC Task Force, to locate the suspect. The undercover agent engages the suspect in an online conversation, eventually gaining his telephone number to arrange a meeting.
    • The report moves on to legal issues related to the use of technology in investigations.
    • It examines constitutional issues and specifically references searches and seizures.
    • The special report discusses warrants and warrantless searches, outlining their legal context within the context of electronic evidence.
    • It also touches upon those statutes which influence the seizure and search of electronic evidence.
    • The report highlights the importance of understanding legal considerations when utilizing technology in investigations.

    Introduction

    • This report is about investigative techniques for using high technology
    • General principles of forensics and procedures are applicable to the use of technology in investigations
    • Special training is needed for examining electronic devices
    • Electronic evidence should be fully documented, preserved, and available for review

    Techniques

    • This chapter discusses techniques and resources that can be used in investigations
    • These techniques should be considered:
      • What technologies did the parties involved have access to, use, and knowledge?
      • What is the skill level of the user?
      • What is the security of the device?
      • Who owns the equipment?
      • What accounts, logins, and passwords are on the device?
      • What logs are available?
      • How frequently was the device used?
      • How was the device used?
      • Is there offsite storage?
      • Was information transmitted to others?
      • What services and providers are used?
      • Who is the system administrator?
      • Who has administrative privileges?
      • Is there remote access to the devices or computer systems?
      • Is the system patched and up to date?
    • It is important to identify the location of information with investigative value, which may not be the same as the physical location of the devices or subjects
    • Investigators should collect all relevant devices and media because devices can be multifunctional
    • Devices can be modified to perform functions beyond their original intent
    • Investigators should be aware of the environment that a device has been found in, to search for potential modifications

    Power Concerns with Battery-Operated Devices

    • Some devices contain memory that requires continuous power to maintain information
    • To avoid data loss, place devices in their chargers or replace their batteries immediately
    • Receiving personnel should be notified about the power requirements of devices
    • Some devices connect to computers to synchronize data
    • Be sure to determine the use and need for all cables attached to devices

    Audio/Video Recordings

    • Audio/video recordings can be used in cases where the identity of the speaker or the content of the conversation is in question
    • Ensure the recording was lawfully acquired.
    • Consider seeking legal guidance prior to the examination of the original recording
    • Authenticate a recording by determining the origin and whether it has been altered
    • Determine the time, sequence, and direction of the source of sounds on a recording
    • Convert recordings to other formats

    Caller ID Devices

    • Caller ID devices display telephone numbers of incoming calls

    Investigative Uses of Technology

    • The text describes investigative techniques and tools used in technology-related crimes.
    • The text emphasizes the importance of using current technology and adjusting practices as needed.
    • Investigators should consider available devices, tools, and techniques when investigating technology-related crimes. The text also provides examples of resources that can be helpful for investigations.
    • Investigators can use publicly available information from government records, internet searches, internet registries, transactional information related to the internet connection, or direct evidence of the crime.
    • Internet tools can be used to identify users and internet connections; they can be used to collect evidence directly and proactively communicate with suspects.
    • The text discusses proactive undercover operations on the internet as a tool for investigation, especially for areas like child exploitation and trafficking of contraband.
    • Undercover operations require specialized training and legal counsel.
    • Law enforcement should use covert accounts during undercover activities as to not reveal their identity or agency affiliation.
    • Documenting undercover and online activities is essential and requires specialized training.
    • Agency and legal authorization are required in conducting undercover activity.
    • The text highlights the importance of preserving and obtaining records from service providers like telephone companies because the records may only exist for a limited time.
    • Web sites often track IP addresses, time, and date of access, which can be used as evidence.
    • The text provides a case study of an investigation that involved an undercover operation and the use of a search warrant to seize digital evidence.
    • The text also states that several printed images from the suspect's residence appeared to be identical to the images from the station computer.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Este quiz explora le diversos personas e lor roles in le campo de securitate cybernetic. Discurre le contributiones de expertos de diferentes sectores como governamento, policia, industria privada, e academia. Testa tu comprehension de iste figuras e lor importatia in le securitate digital.

    More Like This

    Use Quizgecko on...
    Browser
    Browser