U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber Crime Fighting: The Law Enforcement Officer's Guide to Online Crime (Video)

NCJ Number
197977
Date Published
2001
Length
0 pages
Annotation
This videotape provides an introduction to the types of crimes committed online, online investigations, and the procedures for seizing and preserving computer evidence.
Abstract
The Internet has three distinct subdivisions: the World Wide Web, Usenet newsgroups, and Internet relay chat (IRC). The World Wide Web is where organizations setup Web sites -- such as electronic storefronts. The Web provides the latest news, commerce for products and services, and a vast library of information. Questions for police officers to ask when investigating Web site crimes are the address of the Web site, when the Web site was contacted, whether a copy of the screen image was printed, and if a copy of the Web site was saved in the computer. Usenet is made up of newsgroups, which are cyber bulletin boards. There are newsgroups that collect and distribute child pornography and make children available for sex. Thieves use newsgroups to advertise stolen products for sale. Some newsgroups are collections of traditional consumer scams such as Ponzi schemes and chain letters. Questions to be asked in newsgroup crimes include the name of the complainant's Internet Service Provider, the name of the newsgroup, the name of the posting, whether a printed copy of the posting is available, and if the posting was downloaded into the computer. IRC is where people "chat" by typing the words on the keyboard. These chats take place via a server. A server is a computer that distributes information. Criminal use of IRC includes pedophiles meeting to discuss sexual exploits and trading child pornography; those perpetrating fraud; and criminals holding meetings with co-conspirators where they can communicate person to person. Questions for investigators to ask are the name of the channel or chatroom, the server, the nickname used by the offender, the Internet address of the offender, and the time of day the communication occurred. Other items discussed include crime by electronic mail, online service providers, the location of evidence, the chase and trace through cyberspace, the link between the suspect account and the crime that occurred, and seizing computer evidence.