NCJ Number
211185
Journal
Evidence Technology Magazine Volume: 3 Issue: 4 Dated: July-August 2005 Pages: 12-15,38
Date Published
July 2005
Length
5 pages
Annotation
This article describes the steps involved in a successful Internet investigation.
Abstract
The Internet has enabled seemingly anonymous criminals to victimize scores of faceless victims, through online theft, harassment, or sexual victimization. Following the proper investigation procedures is key to responding to reports of Internet-related crimes. The author describes the equipment law enforcement professionals will need in their investigation of cybercrimes, including a dedicated computer, an Internet connection, and a search warrant for evaluating host computers. The trace and latent evidence that can be left behind at a cybercrime scene are described and several examples are presented that illustrate how digital latent evidence can be located. Other resources and investigational areas also important to Internet investigations are identified, such as mail server logs and access logs maintained by access providers. Finally, the author cautions cybercrime investigators to properly protect their agency’s computer systems with firewalls and scanning software and to double-check State and Federal laws, as well as agency protocol regarding Internet investigations.