YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Office of Justice Programs Publishes Cybercrime Investigation Guide

Posted On 24 Jan 2007
By : admin

WASHINGTON, DC – Last week, the U.S. Department of Justice’s Office of Justice Programs issued a report entitled “Investigations Involving the Internet and Computer Networks” to be disseminated to law enforcement agencies across the country, in aid of improving the capacity of such agencies to perform effective “cybercrime” investigations.The report offers a detailed look at the host of issues that confront investigators in cybercrime cases, covering the definitions of the most basic of terms and abbreviations –
like “trojan,” “spoof,” and “ISP,” – as well as more complex issues, like the legal ramifications of multi-jurisdictional evidence collection.

Coming out on the heels of several well-publicized investigations that local law enforcement agencies have been accused of botching and/or pursuing with greater zeal than professionalism (like the strange case of 16-year-old Arizonan Matthew Bandy), the report is packed with warnings and cautionary notes imploring investigators to proceed with caution, avoid jumping to conclusions, and to handle their investigations with the utmost care.

For example, one section of the report cautions that “(B)ecause investigations involving the Internet and computer networks mean that the suspect’s computer communicated with other computers, investigators should be aware that the suspect may assert that the incriminating evidence was placed on the media by a Trojan program,” adding that a “proper seizure and forensic examination of a suspect’s hard drive may determine whether evidence exists of the presence and use of Trojan programs.”

Similar caveats and cautionary notes crop up throughout the report. Another example, from the section of the report dealing with the subject of IP addresses, cites a common analogy that IP addresses are like an “apartment address.” The report cautions readers that the “IP address does not denote a physical location of the device at the time it is connected to the Internet.”

Further, the report warns that the “date and time an IP address was assigned must be determined to tie it to a specific device or user account,” noting that an ISP may or may not maintain historical log files that related dynamically assigned IP addresses to an individual subscriber account, or individual user, at any particular time.

Investigators are also warned that they must proceed with caution in their investigations to avoid tipping off suspects. In a section of the report instructing investigators on the use of whois, nslookup and traceroute queries, investigators are cautioned that they “should be aware that inquiries made on these sites might be monitored and recorded.”

“It is important to conduct sensitive inquiries from a computer that is not traceable back to the investigating agency,” the report continues.

Among the basic investigative techniques covered in the report is a step by step guide to tracing an IP address or domain name, and extensive bullet-point lists of what manner of evidence might be found on a computer, server or other digital device, and the type of data that could be available through a suspect’s or victim’s ISP.

In an acknowledgement of the particular skills required to conduct a proper investigation, the report cautions that an “investigator should not attempt to examine a computer system if the investigator has not received special training in forensic examination of computers.”

“The investigator should follow agency policy or contact an agency with a forensic examination capability,” the report states, further warning that extreme care should be taken to ensure that investigators do not inadvertently alter, damage, overwrite, or otherwise taint digital evidence by attempting to use a suspect’s or victim’s PC.

The DOJ report also explicitly cautions investigators to be very mindful of the legal morass their case could devolve into if proper investigative and chain of evidence protocols are not followed and provides a brief analysis of the major statutes that govern their investigation.

The report specifically instructs investigators to be mindful of their duties and required protocols under the Fourth Amendment, the Electronic Communications Privacy Act, the Pen Register and Trap and Trace Statute, Title III wiretaps, and “applicable State laws.”

For the full DOJ Office of Justice Programs report, refer to the following URL: http://www.ncjrs.gov/pdffiles1/nij/210798.pdf

  • google-share
Previous Story

Father of Internet Dismisses Net Neutrality as “a Slogan”

Next Story

Hefner Snubs Osborn, Posh Spice Snubs Hefner

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • ClickAdu Network
    Mobile Ad Networks
  • CMNF photoshoot in Venezuela
    Photographers and Videographers
  • VRlaid
    Live Cam Networks
  • Premiere Listing

    Clickadu – Your trusted traffic souce

    More Details

RECENT

POPULAR

COMMENTS

Justine Jakobs Crowned Nookies Newest Rookie

Posted On 01 Jul 2025

Rookie Faith Vixen Vies to Defeat Cody Carter at Evolved Fights

Posted On 01 Jul 2025

Mag Numb Drops Extra Spicy Date Night Scene

Posted On 01 Jul 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy