/
Criminal Prosecutors Criminal Prosecutors

Criminal Prosecutors - PowerPoint Presentation

yoshiko-marsland
yoshiko-marsland . @yoshiko-marsland
Follow
342 views
Uploaded On 2020-01-02

Criminal Prosecutors - PPT Presentation

Criminal Prosecutors with Computer Forensics ByJiaYu Huang amp Shirley Yeung What is Computer Forensics It involves the preservation identification extraction documentation and interpretation of computer media for evidentiary andor root cause analysis ID: 771931

forensics computer criminal crime computer forensics crime criminal prosecutor order books web 2010 http dec amp thejerseytomatopress magazine address

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Criminal Prosecutors" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Criminal Prosecutors with Computer Forensics By-Jia-Yu Huang & Shirley Yeung

What is Computer Forensics ?It involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Evidence might be required for a wide range of computer crimes and misuses Use for Computer Forensics: Discovering data on computer systemRecovering deleted, encrypted, or damaged file informationMonitoring live activityDetecting violations of corporate policy

Criminal Prosecutors Their job is to identify an individual that has commented a crime.They use computer forensic in order to track evidence such as emails, data, hard drives, documents, and illegal access to personal accounts. An example would be using IP addresses in order to track down infringement or illegal downloads.

Uses of IP Addresses with CrimesFraud Example: Online auctions in which the company or provider receive money for a product from a consumer, but does not deliver the product. Child Pornography Example: Where Pennsylvania State trooper enter chat rooms in order to find illegal child pornography. E-mailExample: Harassment, Stalking, Terrorist Attacks

Investigative ProcedureThe Prosecutors get an IP address, that was used in the crime. Determined the ISP (controls IP address) Get a court order for the ISP to disclose which computer was using that IP address Get a search warrant to seize and search that computer Conduct a forensic examination of the computer to locate evidence left on computer when crime was committed.

WORK CITEDSmith, Russell G., Peter N. Grabosky, and Gregor Urbas. "Cyber criminals on trial - Google Books."  Google Books . N.p., n.d. Web. 2 Dec. 2010. <http://books.google.com/books?id=cFKMZg6AZKwC&pg=PA2&lp"Santa Fe College Computer Forensics." Criminal Prosecutor. N.p., n.d. Web. 4 Dec. 2010. <http://criminal-prosecutor.com/santa-fe-college-computer-forensics>."Acting Essex County Prosecutor Establishes Cyber Crime Unit - TheJerseyTomatoPress.com." Home - TheJerseyTomatoPress.com. N.p., n.d. Web. 7 Dec. 2010. <http://www.thejerseytomatopress.com/stories/Acting-Essex-County-Prosecutor-Establishes-Cyber-Crime-Unit,5856>. Cohen, Charles L., First Sergeant, Indiana State Police, Indianapolis, and Indiana. "Police Chief Magazine - View Article."  Police Chief Magazine . N.p ., n.d . Web. 4 Dec. 2010. <http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article