U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Intrusions From Handbook of Computer Crime Investigation: Forensic Tools and Technology, P 395-413, 2002, Eoghan Casey, ed, -- See NCJ-195111)

NCJ Number
195124
Author(s)
Steve Romig
Date Published
2002
Length
19 pages
Annotation
This chapter presents a case study about the investigation of computer crimes committed using computers at Ohio State University.
Abstract
The author of this chapter gives an account of the investigation of two hacking groups in 1996 who used Ohio State University computers to gain free access to the Internet, which they subsequently used to commit computer crimes. An overview of the specific tools used in the investigation is given, including a description of their use of Incident Response Tools. The author explains the necessities, and inherent problems, of trying to correlate evidence gathered over time and by different investigating agencies. The author explains that reconstructing a time sequence of past events can be troublesome when different types of digital information is available. The chapter offers a case study of one particular investigation in order to assist computer forensic examiners in their own investigations. 1 Table, 3 references