08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2. European Union – This is an organization of European nations<br />

that seeks to establish European citizenship; ensure freedom,<br />

security and justice; promote economic and social progress; and<br />

assert Europe’s role in the world. This organization developed an<br />

international treaty for signatory countries to develop and<br />

promulgate cybercrime laws and to aid in the cooperation of<br />

investigations by other countries.<br />

http://www.europa.eu.int/<br />

3. Interpol – This is a law enforcement organization consisting of<br />

168 countries. It is an organization that supports all law<br />

enforcement organizations. Specifically related to cybercrime,<br />

Interpol assists member law enforcement agencies with<br />

investigations into cyber issues and assists in obtaining digital<br />

evidence for member countries.<br />

http://www.interpol.int/<br />

4. International Organization on Computer Evidence (IOCE) –<br />

This is an international body of forensic and law enforcement<br />

organizations developing standards for acquiring, transferring, and<br />

analyzing digital evidence.<br />

http://www.ioce.org/<br />

The Need for Law Enforcement<br />

During the 1980s and the 1990s law enforcement embarked on a new<br />

challenge. That challenge was investigating and solving the increased number<br />

of computer media criminal cases. At first the law enforcement challenge<br />

focused on stand-alone computer systems requiring computer forensic analysis.<br />

Expertise in this area was hard to find, especially in the law enforcement<br />

community. Also, in that era, bulletin board systems (BBS) became popular. If<br />

a computer owner was rich enough, he or she could buy a modem, which<br />

allowed a user to dial into these BBSs. Hacking the BBS became the first form<br />

of computer intrusion. Later as Internet access increased and businesses, the<br />

government, and universities installed local area networks connected to the<br />

Internet, cybercrime went global. Law enforcement now needed to handle<br />

network crimes as well as stand alone computer systems.<br />

Fighting Computer Crime with a Computer<br />

Two paths of investigation were necessary to solve such crimes. The<br />

first was the investigation into network-like crimes. This required knowledge<br />

of networks, methods that could lead to the identity of the subject, and<br />

knowledge about the evidence on those systems to prove the subject committed<br />

the crime.<br />

315

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!