💾 Archived View for spam.works › mirrors › textfiles › law › 93jun002.txt captured on 2023-06-16 at 18:53:44.
-=-=-=-=-=-=-
THE COMPUTER HIGH-TECH INSTRUMENT OF CRIME By Michael G. Noblett Chief Document Analysis, Research, and Training Unit FBI Laboratory Washington, DC The use of computers as criminal instruments or as devices to collect information associated with criminal enterprises increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also manipulate data, infiltrate computers of financial institutions, and illegally use telephone lines of unsuspecting businesses. Statistics suggest that the law enforcement community must act quickly and decisively to meet the challenge presented by the criminal use of computers. For example: . Over 4.7 million personal computers were sold in the United States in 1988, as compared with 386,500 in 1980 . An estimated 60 percent of personal computers are now networked . $500 million is lost annually through illegal use of telephone access codes . $1 trillion is moved electronically each week, and . Only 11 percent of computer crime is reported. While the law enforcement community, in general, often thinks of computer crime as high-tech crime, a growing segment of the population looks at computers and the data they store as nothing more than electronic paper. They feel very comfortable keeping their records, whether legal or illegal, in this format. In order to address the legitimate need for access to computers and the information they contain, law enforcement must develop a structured approach to examine computer evidence. The examination of this evidence can provide investigative and intelligence information, and at the same time, preserve the information for subsequent admission in court. PRESERVING COMPUTER EVIDENCE As more and more records are converted from paper to electronic storage, individuals are becoming more and more computer literate. Unfortunately, a growing number of individuals use their computer knowledge for illegal activities. While there is no typical computer case, the majority fall into the broad category of white-collar crime. During investigations of these cases, several problems repeatedly occur. However, by following the guidelines offered in this article, law enforcement agencies can protect valuable computer evidence. Conduct Preliminary Examinations Investigators should take immediate action to protect a computer's memory. Often, investigators attempt to generate investigative and intelligence information on site. While this approach is reasonable and should be encouraged, it is equally important that the computer be protected from any input introduced unintentionally by investigators. For instance, many computer systems update files to the current date when read. In order to preserve the evidence in the same condition as it was when seized, steps must be taken to ensure that no dates are changed and nothing is written into or deleted from the computer's memory. Specialized software currently on the market protects the computer's memory and should always be used before an examination. Investigators should also consider that anyone conducting a preliminary examination may be called on to testify concerning the procedures followed and the accuracy of the results. Because of this possibility, documented policy and protocol detailing steps to follow during examinations must be established. Examiners should closely follow guidelines set by their particular agency to avoid any legal discrepancies. Seize Supporting Software When investigators seize a computer, they should also take all supporting software and documentation. This simple action eliminates a host of problems that may arise during the examination of the computer. It is logical, but not necessarily correct, to assume that the software that runs the seized computer is common and commercially available. As commercial software is developed and marketed, manufacturers add new features and correct previously identified problems. Once the manufacturer revises the old programs, the data seized may not be compatible with the particular version of the same software. Therefore, it is good policy to seize all software, documentation, handwritten notes, and any other related items found near the computer. Seize the Entire Computer System Many of the items connected to the seized computer are probably standard pieces of equipment found in any computer facility. However, it only takes one unique, nonstandard piece of equipment to render a system incompatible with others. For this reason, it is best to seize all the equipment related to the computer. If it turns out that some of the items are not needed for the examination, they can be quickly returned to the site. The FBI Laboratory does not recommend that investigators remove and submit the hard drive (memory), located inside the computer, for examination. The manner in which the computer is set up internally is often crucial to reading, displaying, and printing the data on the hard drive. Thus, removing just the hard drive may be useless to the investigation. In light of technical considerations, it may be appropriate to use an expert as a consultant in the execution of these types of search warrants. This is especially true if investigators do not seize the entire system. Concerns regarding incompatibilities of computer systems should be stated in the supporting affidavit as justification if investigators plan to seize the entire computer system. Package Equipment Properly If investigators need to ship the computer to another facility for examination, they should package it properly. Oftentimes, examinations take an inordinate amount of time because poorly packaged computers are damaged in shipment and must be subsequently repaired. Likewise, shipment of computer diskettes and other memory devices requires certain precautions. Because of the potential hazard of static electric discharge, these items should not be shipped in plastic evidence envelopes. In addition, the evidence should be marked to avoid exposure to strong magnetic fields, such as those generated by x-ray machines. COMPUTER ANALYSIS AND RESPONSE TEAM To assist with investigations involving computers as evidence, the FBI Laboratory established the Computer Analysis and Response Team (CART) at FBI Headquarters. Computer professionals with a variety of experience and expertise, along with a sensitivity to the needs of the law enforcement community, staff the team. The CART has a full range of hardware available, as well as unique utility software useful in forensic examinations of computer-related evidence. Limited by the number of technical personnel available to conduct these investigations, this service is available to police agencies authorized to submit evidence to the FBI for forensic examination. In addition to its traditional forensic examination, the FBI Laboratory's CART provides on-site field support to both Bureau field offices and local police departments. Approval for this on-site support depends on the individual case, the resources available, and the needs of the requesting agency. CONCLUSION The FBI Laboratory has seen the submission of computer evidence double and then double again in the past few years, reflecting the proliferation of computers in society. With the role of the computer becoming more predominant in society, its impact is felt in every law enforcement investigative program. Therefore, it is important for law enforcement to have the necessary knowledge and procedures ready to address adequately the examination of computer evidence and records.