U.S. Secret Service: Best Practices for Seizing Electronic EvidenceAdded: Monday, March 8th, 2010
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
A Pocket Guide for First Responders V3
As our society is becoming increasingly populated by the use of the computer, storage devices and communications worldwide via the internet, the world we live in seems to be shrinking and one where our ever friendly criminals have downed tools and pretty much stopped going outside to rob you, break into your house or steal your identity.
Since they have now discovered that they can do most of their criminal activates such as Phishing scams, distribution of illegal obscene or offensive materials, Cyberterrorism, fraud and identity theft, and then conceal their crimes or bank their ill gotten gains from the comfort of their Living room in almost total anonymity while watching the latest episode of the Sopranos,
With the technology of the computer and internet increasing so does the technology and methods used by the criminals to try to hide their cyber fingerprints increases. In an effort to combat this by our government’s and law enforcement agencies,who must respond, and to do this they have set up many and varied type of computer, electronic and cyber crimes divisions such as the Strategic Alliance Cyber Crime Working Group Set up by the U.S., U.K., Canada, Australia, and New Zealand, and in the U.S. the United States Department of Homeland Security Division. These organizations are responsible for creating and implementing procedures for the tracking and convicting of criminals using computers and electrical devices in the commission of their crimes. These procedures are published as rules and guidelines to be used by local law enforcement offices to adequately secure crime scenes and equipment used in cyber crimes. The manuals also keep local law enforcement officers up to date with the latest technology used by these criminals and how to proceed with their investigation in a standardized and lawful way.
The Best Practices Guide for Seizing Electronic Evidence takes you through he steps that law enforcement agencies take to gather any evidence in relationship to cyber crimes that will help them secure a conviction. The guide covers topics such as, Officer Safety, Evidence Preservation, Authority for Seizing Evidence and Home Networking Basic Elements.
The full PDF version of this report can be downloaded from here,
As they say the best way to stay safe is to know what your opponents are up to and if you know what they are looking for then you can be better prepared to protect yourself. This guide will also help you understand your rights in the event of your Local law enforcement agency (U.S. only) come knocking at your door looking to take you and your computer away to jail.
March 8th, 2010Posted by:
Monday, March 8th, 2010
|posted by (2010-03-09 02:47:37)|
|thanks for the info sam great read|
|Useful info TY ALF & SaM :)|
|thnx sam, good read.||
Most Popular Stories