Forensic Technology - T&T Software WWW Server

Download Report

Transcript Forensic Technology - T&T Software WWW Server

Computer Technology in
Law Enforcement
Eileen and Tom
Edwin
29 November 2006
Investigation
Technology
Technology
► Modern
police cruisers contain the following
equipment:




Laptops
Radar (Radio Detection And Ranging)
Radio/ Scanners
Video Cameras
Laptops
► Allow
officers to type reports, saves time.
► Can save reports to flash drives and print later.
► Transfer info from computer directly to database
with flash drives.
► Will eventually allow officers to receive calls
through wireless networks and as well access
information like license plates and images such
as mug shots.
Radar
► Radio
Detection And Ranging
► Remote sensor that gives off electromagnetic
waves ( radio, microwaves and light) and uses
these waves to measure presence, location and
motion.
► Used to monitor on coming and receding traffic
by police officers.
Radio/Scanners
►
►
►
►
Transmit and receive Federal Government assigned
frequencies in Vhf and Uhf frequencies above standard
broadcast FM stations of the radio spectrum and can’t be
heard on standard car or home radio.
Most frequencies are used by Public Safety (Police,
Ambulance and Rescue crews)
Two types of scanners portable (handheld) and table (
found in cars)
Frequent users
 Public Safety, News Media, Home & Personal
Security, Corporate Security, Neighborhood Watch,
Radio Hobbyists, Public Buildings, Hospital and
School Security.
Video Cameras
►Recently
installed in patrol cars
►Used to monitor work done by officers
►Used to show how arrests are made
Investigation Programs
►Pattern
Recognition
►Investigative
Information Management
System (I2MS)
Pattern Recognition
►Finding
patterns concerning the locations
of the crimes.
►Tries
to recognize and predict patterns of
illegal behavior.
I2MS
► Developed
by CSC for Air force Office of
Special Investigation ( AFOSI).
 Focuses on criminal investigations and
counterintelligence in Air Force.
 enables agents to view recently entered
information from half way around the world.
 has the ability to record data from arrests,
track location of gathered evidence, and store
images like maps, fingerprints and other
electronic documents.
Internet and Computer Crime
Types of Computer and Internet
Crime
Computer as Instrument
Computer as Object
Includes:
► Embezzlement
► Fraud
► Larceny
Includes:
► Theft
► Viruses
Electronic Fingerprint
Tracking what a person does on a computer
via memory and history --
Is called an electronic fingerprint
Memory
► Cache
► RAM
► Hard
Disk Drive
► Any other memory
History
Check internet history on browser –
Can clear by holding CTRL + H keys (though
it should be known that nothing is ever
permanently deleted from a computer)
Terrorism
Hugely aided by computer technology
Cryptology
Definition: The branch of science that deals
with secret communications using codes
and ciphers
Code – the use of symbols to represent
numbers, letters, or words
Cipher – system of representing letters with
other letters to form images
Codes
► Can
stand for words or letters
► Tell location in pages and sections of book
where word is found
Example: Morse code
*Decoding takes a long time
Ciphers
Substitution Cipher
ABCDEFGHIJKLMNOPQRSTUVWXYZ
NMZAYBXCWDVEUFTGSHRIQJPKOL
So “Meet you at the corner” looks like:
UYYI OTQ NI ICY ZTHFYH
Columnar Transposition
Message is: “Meet you at the corner”
Looks like:
MEETY
OUATT
HECOR
NERXX
Code looks like: MOHN EUEE EACR TTOX YTRX
(read from top to bottom, left to right)
How Do Computers Fit into
Cryptology?
► Easier
to create
► Easier to decrypt
► Easier to break
* “So far, it is far easier for a computer to
encrypt a message than to break it”
Stenography
Definition: hiding files in plain view using
encryption
Hiding text within text, images within images,
and text within images or vice versa
Without embedded text
With embedded text
Capturing Pedophiles
► Join
same networks
and groups
► Create profiles
► Interact
► Set up meeting
► Finally catch them
Other Methods
► Tapping
IP addresses
► Installing keylogging hardware/software
► Skimmers
► Sniffers
Forensic Technology
Definition
► Forensics
is the method of gathering and
analyzing evidence and information at a
crime scene.
Forensics History
► 1598
– Fortunatus Fidelis is credited as
being the first person to us modern forensic
science.
► Early 1800’s – forensic science becomes an
accepted branch of medicine.
► 1921 – John Larson creates the first
successful lie detector.
► 1923 – First police department crime
laboratory established in the U.S.
Forensics History
► 1924
– Larson’s lie detector becomes widely
used in police interrogations around the
country.
► 1932 – FBI creates national crime
laboratory.
► 1948 – American Academy of Forensic
Science is established.
► 1967 – FBI creates National Crime
Information Center.
Modern Forensic Science
► Every
year new updates are seen that push
the boundaries of forensic science
► Newer and newer technologies are creating
better possibilities for investigators around
the country.
National Virtual Translation Center
► Center
established in early 2000 to help
investigators with international cases.
► Instantly translate documents and
intelligence in over a dozen languages.
► Helps investigators with international cases
and suspects.
Stable Isotope Ratio Mass
Spectrometry
► New
method of substance
testing.
► Testing using this method
will allow investigators to
see if two substances
came from the same
source.
► Allows for much more
accurate testing in criminal
investigations.
Mitochondrial DNA Analysis
►A
new type of DNA
testing that allows for
a much more accurate
suspect pool.
► Usually limits your
suspect pool to a
certain family or
bloodline.
Regional Computer Forensic
Laboratories
► These
laboratories are used to detect
evidence of computer crime.
► Can scan any electronic device.
► There are now several around the country
for easy access.
Databases
► CODIS
– Combined DNA Index System
 Created by FBI in early 1990s, as a blending of
forensic science and computer technology.
 Has 3 levels (local, state, National)
 Allows laboratories participating in the
program to compare and exchange information
on national level.
 As of Sept. 2006 has produced 36,800 hits and
assisted in 39,200 investigations nationwide.
CODIS
► CODIS
is the Combined DNA Index System.
► Any law enforcement agency can put DNA
into the national database.
► Other agencies can then access the DNA
sequences to see if they match any current
suspects.
► Allows for easy access to scanning suspect’s
DNA for a match to crimes.
Surveillance
Car
► Discreetly
follow
suspect
► Observe actions
Audio and Video Recording
► Warrant
for installation
► If fails, equipment in
moving vehicles
*Technologies have
constantly been
changing and updating
– less visible and more
powerful
Thermal imaging
► Capturing
infrared light
emitted by objects to
form images
► The cooler the object,
the less clear the
image will be
► Good for moonless,
cloudy nights
► Disturbances in ground
► Changes to walls
Image Enhancement
► “Night
vision”
► Captures the little
amount of light
available and uses it to
for images
► More commonly used
than thermal imaging
Gait Recognition
► Computer
vision
► Traditional radar system
“ The ultimate goal is detect, classify, and
identify humans at distances up to 500 feet
away under day or night, all-weather
conditions”
Identify a person based on the way they walk
*Please note that computer technology in law
enforcement encompasses a vast and broad range
of technology. Furthermore, some of this new
technology is not released to the public due to
security and effectiveness issues. The technologies
described are only some of the equipment and
methods used by law enforcement today. It is
unquestionable that new technologies will be
created to help law enforcement fight crime. Future
law enforcement personnel will undoubtedly
encounter technology not even mentioned in this
presentation.