Computers don’t commit crimes, people do.
The most difficult challenge for law enforcement in many cybercrime
cases is “putting a suspect at the keyboard”. Recent news stories have
highlighted law enforcement’s frustration with the lack of focus on the
human elements of cybercrime. Too often cybercrime is framed as a
purely technical challenge. The fact that real human criminals are
behind these schemes can be forgotten. A specific individual must be
identified to make an arrest and charge a crime.
“Attribution” is the task of identifying a specific cybercriminal.
This process begins often by utilizing digital forensics to examine the
patterns and tools used in an attack. This is a scientific and complex
process. During my time as a prosecutor, I worked with many digital
forensic examiners on cases. The forensic examiner was always the most
important witness at trial. The examiner is the witness who literally
examines the “crime scene” and can provide the evidence that proves
that the suspect was the person behind a cyber attack.
Some cybercriminals follow known patterns and this may be a way to
identify them. In one case that I prosecuted, the forensic examiner
reviewed evidence seized from a suspect but there was no way to directly
connect the suspect to the crime. However, the examiner was able to
identify non-criminal evidence on the computer that was clearly linked
to the suspect. This circumstantial evidence provided a strong degree
of proof that the suspect used the computer and was at the terminal
close in time to the period during which the crimes occurred. This
critical evidence, provided by the forensic examiner, resulted in the
successful prosecution of the cybercriminal.
I teach a law school class on cybercrime and at the beginning of the
first class I always remind students that cybercrimes are crimes
committed by real persons abusing technology. It’s important to
remember that technology is not bad. Unfortunately, sometimes people do
bad things with technology.
- The Human Element in Cybercrime Cases
-
Cybercrime
: “Defining” the Solution -
The Norton Cybersecur
ity Institute - The Cybercrime “Arms Race”
- A Battle is Won!
-
The State of Cybersecur
ity - Leading the Fight Against Cybercrime
-
Cybercrime
: Anytime and Anywhere - Online Ethics in Danger
- Securing the Internet’s Future
- 05-15-2011 – 05-21-2011
- 05-08-2011 – 05-14-2011
- 05-01-2011 – 05-07-2011
- 04-24-2011 – 04-30-2011
- 04-17-2011 – 04-23-2011
- 04-10-2011 – 04-16-2011
- 04-03-2011 – 04-09-2011
- 03-27-2011 – 04-02-2011
- 03-20-2011 – 03-26-2011
- 03-13-2011 – 03-19-2011
- 03-06-2011 – 03-12-2011
- 02-27-2011 – 03-05-2011
- 02-20-2011 – 02-26-2011
- View Complete Archives
rdfiedler
on:
Cybercrime
jmcg1213
on:
Policing Cyberspace Internatio
Adam_Palmer
on:
Report from the U.S. Department of Defense Cyberse…
mdturner
on:
Report from Lyon, France, INTERPOL HQ: The lates…
BR
on:
A New Voice Against Cybercrime