Posts

Crime Classification Manual Part II Chapter 10 B 34

Image
  Crime Classification Manual Part II Chapter 10 B 34 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Search Warrant Suggestions The search warrant for the offender’s location should list all computers and all forms of computer storage: disks, data CD-ROMs, DVDs, magnetic tapes, external hard drives, mini-drives (sometimes called memory sticks), flash memory modules, programming documentation, e-mail addresses (possible sources of malignant software creation programs), the computer and all its peripherals, and all program CD-ROMs. The search warrant should also include the offender’s Internet accounts.

Crime Classification Manual Part II Chapter 10 B 33

Image
  Crime Classification Manual Part II Chapter 10 B 33 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Investigative Considerations The targeted computers’ logs should be analyzed in an attempt to determine the Internet protocol addresses of the sending computers.

Crime Classification Manual Part II Chapter 10 B 32

Image
Crime Classification Manual Part II Chapter 10 B 32 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Common Forensic Findings. The computer of the targeted user will have logs and copies of the threatening messages. The offender’s computer should also have copies of the threats, as well as the user’s computer addresses, e-mail, and Internet protocol.

Crime Classification Manual Part II Chapter 10 B 31

Image
  Crime Classification Manual Part II Chapter 10 B 31 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   540: THREATS VIA THE INTERNET Defining Characteristics This crime occurs when a computer user is threatened over the Internet. Threats can be delivered by e-mail, instant messaging, and spam. Victimology. The computer user can be threatened with bodily harm, family and friends can be threatened with bodily harm, or the user’s business can be threatened with destruction.

Crime Classification Manual Part II Chapter 10 B 30

Image
    Crime Classification Manual Part II Chapter 10 B 30 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   : FRAUDULENT INTERNET TRANSACTIONS This crime occurs when a buyer purchases goods at an Internet auction and sends money but never receives the goods purchased. Another type of fraudulent Internet transaction is Web site fraud, also called shopping cart fraud. This crime involves the creation of a URL simi- lar to a legitimate site, and the unsuspecting user is apprised of large savings on the purchase of hard-to-obtain products. Accessing any one of the erroneous Web sites can lead to fraud.

Crime Classification Manual Part II Chapter 10 B 29

Image
  Crime Classification Manual Part II Chapter 10 B 29 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Search Warrant Suggestions The search warrant for the offender’s location should list all computers and all forms of computer storage: disks, data CD-ROMs, DVDs, magnetic tapes, external hard drives, mini-drives (sometimes called memory sticks), flash memory modules, programming documentation, e-mail addresses (possible sources of malignant software creation programs), the computer and all its peripherals, and all program CD-ROMs. The search warrant should also include the offender’s Internet accounts.

Crime Classification Manual Part II Chapter 10 B 28

Image
  Crime Classification Manual Part II Chapter 10 B 28 A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITIO N   Investigative Considerations The targeted computer should have its hard drive removed and analyzed by special computer software not only to determine the changed data but to search for possible Trojan horse software that tests for data checks and then destroys the corrupted data before they can be analyzed. All computer logs should be analyzed for suspicious activities, and all Internet activity should be searched for illegal access and messages.