181 lines
8.1 KiB
Plaintext
181 lines
8.1 KiB
Plaintext
THE COMPUTER
|
||
HIGH-TECH INSTRUMENT OF CRIME
|
||
|
||
By
|
||
|
||
Michael G. Noblett
|
||
Chief
|
||
Document Analysis, Research, and Training Unit
|
||
FBI Laboratory
|
||
Washington, DC
|
||
|
||
|
||
The use of computers as criminal instruments or as devices
|
||
to collect information associated with criminal enterprises
|
||
increases yearly. Criminals use computers to store data
|
||
relating to drug deals, money laundering, embezzlement, mail
|
||
fraud, extortion, and a myriad of other crimes. In addition to
|
||
the simple storage of records, criminals also manipulate data,
|
||
infiltrate computers of financial institutions, and illegally
|
||
use telephone lines of unsuspecting businesses.
|
||
|
||
Statistics suggest that the law enforcement community must
|
||
act quickly and decisively to meet the challenge presented by
|
||
the criminal use of computers. For example:
|
||
|
||
. Over 4.7 million personal computers were sold in the
|
||
United States in 1988, as compared with 386,500 in 1980
|
||
|
||
. An estimated 60 percent of personal computers are now
|
||
networked
|
||
|
||
. $500 million is lost annually through illegal use of
|
||
telephone access codes
|
||
|
||
. $1 trillion is moved electronically each week, and
|
||
|
||
. Only 11 percent of computer crime is reported.
|
||
|
||
While the law enforcement community, in general, often
|
||
thinks of computer crime as high-tech crime, a growing segment
|
||
of the population looks at computers and the data they store as
|
||
nothing more than electronic paper. They feel very comfortable
|
||
keeping their records, whether legal or illegal, in this format.
|
||
|
||
In order to address the legitimate need for access to
|
||
computers and the information they contain, law enforcement must
|
||
develop a structured approach to examine computer evidence. The
|
||
examination of this evidence can provide investigative and
|
||
intelligence information, and at the same time, preserve the
|
||
information for subsequent admission in court.
|
||
|
||
PRESERVING COMPUTER EVIDENCE
|
||
|
||
As more and more records are converted from paper to
|
||
electronic storage, individuals are becoming more and more
|
||
computer literate. Unfortunately, a growing number of
|
||
individuals use their computer knowledge for illegal activities.
|
||
|
||
While there is no typical computer case, the majority fall
|
||
into the broad category of white-collar crime. During
|
||
investigations of these cases, several problems repeatedly
|
||
occur. However, by following the guidelines offered in this
|
||
article, law enforcement agencies can protect valuable computer
|
||
evidence.
|
||
|
||
Conduct Preliminary Examinations
|
||
|
||
Investigators should take immediate action to protect a
|
||
computer's memory. Often, investigators attempt to generate
|
||
investigative and intelligence information on site. While this
|
||
approach is reasonable and should be encouraged, it is equally
|
||
important that the computer be protected from any input
|
||
introduced unintentionally by investigators.
|
||
|
||
For instance, many computer systems update files to the
|
||
current date when read. In order to preserve the evidence in
|
||
the same condition as it was when seized, steps must be taken to
|
||
ensure that no dates are changed and nothing is written into or
|
||
deleted from the computer's memory. Specialized software
|
||
currently on the market protects the computer's memory and
|
||
should always be used before an examination.
|
||
|
||
Investigators should also consider that anyone conducting a
|
||
preliminary examination may be called on to testify concerning
|
||
the procedures followed and the accuracy of the results.
|
||
Because of this possibility, documented policy and protocol
|
||
detailing steps to follow during examinations must be
|
||
established. Examiners should closely follow guidelines set by
|
||
their particular agency to avoid any legal discrepancies.
|
||
|
||
Seize Supporting Software
|
||
|
||
When investigators seize a computer, they should also take
|
||
all supporting software and documentation. This simple action
|
||
eliminates a host of problems that may arise during the
|
||
examination of the computer. It is logical, but not necessarily
|
||
correct, to assume that the software that runs the seized
|
||
computer is common and commercially available.
|
||
|
||
As commercial software is developed and marketed,
|
||
manufacturers add new features and correct previously identified
|
||
problems. Once the manufacturer revises the old programs, the
|
||
data seized may not be compatible with the particular version of
|
||
the same software. Therefore, it is good policy to seize all
|
||
software, documentation, handwritten notes, and any other
|
||
related items found near the computer.
|
||
|
||
Seize the Entire Computer System
|
||
|
||
Many of the items connected to the seized computer are
|
||
probably standard pieces of equipment found in any computer
|
||
facility. However, it only takes one unique, nonstandard piece
|
||
of equipment to render a system incompatible with others. For
|
||
this reason, it is best to seize all the equipment related to
|
||
the computer. If it turns out that some of the items are not
|
||
needed for the examination, they can be quickly returned to the
|
||
site.
|
||
|
||
The FBI Laboratory does not recommend that investigators
|
||
remove and submit the hard drive (memory), located inside the
|
||
computer, for examination. The manner in which the computer is
|
||
set up internally is often crucial to reading, displaying, and
|
||
printing the data on the hard drive. Thus, removing just the
|
||
hard drive may be useless to the investigation.
|
||
|
||
In light of technical considerations, it may be appropriate
|
||
to use an expert as a consultant in the execution of these
|
||
types of search warrants. This is especially true if
|
||
investigators do not seize the entire system. Concerns
|
||
regarding incompatibilities of computer systems should be stated
|
||
in the supporting affidavit as justification if investigators
|
||
plan to seize the entire computer system.
|
||
|
||
Package Equipment Properly
|
||
|
||
If investigators need to ship the computer to another
|
||
facility for examination, they should package it properly.
|
||
Oftentimes, examinations take an inordinate amount of time
|
||
because poorly packaged computers are damaged in shipment and
|
||
must be subsequently repaired.
|
||
|
||
Likewise, shipment of computer diskettes and other memory
|
||
devices requires certain precautions. Because of the potential
|
||
hazard of static electric discharge, these items should not be
|
||
shipped in plastic evidence envelopes. In addition, the
|
||
evidence should be marked to avoid exposure to strong magnetic
|
||
fields, such as those generated by x-ray machines.
|
||
|
||
COMPUTER ANALYSIS AND RESPONSE TEAM
|
||
|
||
To assist with investigations involving computers as
|
||
evidence, the FBI Laboratory established the Computer Analysis
|
||
and Response Team (CART) at FBI Headquarters. Computer
|
||
professionals with a variety of experience and expertise, along
|
||
with a sensitivity to the needs of the law enforcement
|
||
community, staff the team. The CART has a full range of
|
||
hardware available, as well as unique utility software useful in
|
||
forensic examinations of computer-related evidence.
|
||
|
||
Limited by the number of technical personnel available to
|
||
conduct these investigations, this service is available to
|
||
police agencies authorized to submit evidence to the FBI for
|
||
forensic examination. In addition to its traditional forensic
|
||
examination, the FBI Laboratory's CART provides on-site field
|
||
support to both Bureau field offices and local police
|
||
departments. Approval for this on-site support depends on the
|
||
individual case, the resources available, and the needs of the
|
||
requesting agency.
|
||
|
||
CONCLUSION
|
||
|
||
The FBI Laboratory has seen the submission of computer
|
||
evidence double and then double again in the past few years,
|
||
reflecting the proliferation of computers in society. With the
|
||
role of the computer becoming more predominant in society, its
|
||
impact is felt in every law enforcement investigative program.
|
||
Therefore, it is important for law enforcement to have the
|
||
necessary knowledge and procedures ready to address adequately
|
||
the examination of computer evidence and records.
|
||
|
||
|