Preface

The expanding availability of computers within society coupled with their ease of use and the unregulated Internet, which provides any number of hacking and attack tools for free download, has introduced into our society new challenges and threats at the same time. Our nation’s commercial, economic, and financial systems are now totally dependent on the rapid exchange of information, which requires a safe and secure exchange of data through our country’s vast computer networks. In fact, it is our nation’s entire infrastructure of our power grid, transportation systems, hospital and health systems, water systems, food production and distribution systems, and governmental agencies that are operated by our computers and require that they continue to operate with both assurance and authenticity. Our reliance on this infrastructure that has made our nation one of the richest and most dependable in the entire world is also our Achilles’ heel, and these computerbased infrastructure systems are vulnerable to human error, natural disaster, and exploitative attacks. The rapid pace of scientific and technological advancement has provided additional benefits to society; nevertheless, we must also be aware of the unintended and latent dysfunctional consequences that occasionally accompany such rapid growth and change. How we mitigate and manage these risks will in some cases be effective and, in other situations, require risk avoidance strategies.

Now that personal computing is so ubiquitous within our society, we face notonly the challenges of correctly using this computational power, but we must now guard our nation, our citizens, and our children from those who would use this computing power to exploit others. The opportunities to use this new digital environment that science has bestowed on us has ushered in a new paradigm in crime that has challenged and continues to challenge our law enforcement, prosecutors, and judiciary system to come to terms with successfully responding to the new ways in which criminal acts are perpetrated. The use of computers as an instrumentality to commit criminal activity, or those situations in which the computer becomes a target of a criminal act, all require the response of our criminal justice system to protect the interests of our society, while also assuring the rights of the accused and the general respect of privacy that are so venerated within our democracy.

The distribution of video streaming hard-core pornography that exploits our nation’s children is now readily available within society. The use of

13

14Forensic Computer Crime Investigation

encryption and steganography tools to conceal illegal materials continues to challenge our police and our legal system. The use of viruses in extortion schemes also shows evidence of how criminals are using technology to commit criminal acts in a more sophisticated and effective manner than in past years. Even more troubling is the global nature of these offenses occurring thousands of miles away and overlapping judicial systems that are ill-prepared for the appropriate statutory law to prohibit some of this behavior. Also, the requirement of obtaining search warrants in other jurisdictions and in other nations has mandated additional training and educational programs to be fully prepared for thisnew forum of criminal activity.

It is for these reasons that we have set forth some of the ways in which we have prepared our federal, state, and local authorities to address these challenges. This text is, therefore, illustrative of the manner in which over 3,000 law enforcement officers have been trained and countless university students from the disciplines of law, computer science, and forensic investigation have been introduced to this emerging body of knowledge.

Each of the contributing authors has provided insights into an area in which they have been responsible for assuming a leadership role. For example, Chris Malinowski served with distinction as the commanding officer of the New York City Police Department’s Computer Crime Unit and knows the intricacies of staffing a Digital Investigative Unit with highly trained personnel.

Dr. William Tafoya’s illustrious career with the FBI provides the background for his chapter on the characteristics and analysis of computer criminals. Ross Mayfield’s insightful and creative use of software utilities and developing investigative strategies has enabled him to provide the Los Angeles Police Department with most effective case-solving techniques. Fred Cotton’s detailing of training strategies for law enforcementofficers is an important contribution, because Fred Cotton is regarded as one of our nations most effective and creative law enforcement trainers. Monique Ferraro and Joseph Sudol underscore the full range of challenges in preparing an Internet Crimes Against Children unit (ICAC); they are well-respected for their efforts in developing an ICAC unit for the Connecticut State Department of Public Safety that is regarded as one of the model ICAC units in our nation. Dr. Fred Cohen’s contribution on digital forensic evidence is a critical and important part of this text. Dr. Cohen’s reputation as one of our nation’s premier forensic computer scientists is well-established for initiating some of the very first research in computer viruses. Finally, Dario Forte has contributed an international perspective that not only enriches this text but is genuinely reflective of the many contributions he has made to Interpol and numerous law enforcement agencies throughout the world.

Preface15

Finally, the outstanding editorial work and perspective of Colleen R. Johnson who worked with each of the contributing authors and provided excellent guidance to each of us, merits our sincere appreciation, respect, and praise for her dedicated professionalism.

results matching ""

    No results matching ""