This course provides an look into the technical aspects of computer cybercrime investigations. It correlates cyber situations with that of traditional investigations while focusing on the threats and attacks that are used by terrorists and criminals. Counter tactics as well as methods to leverage the same tools, techniques, and processes for investigations will also be highlighted. It follows in sequence after cyber intelligence and cyber counterintelligence.
At the completion of this course, participants will be able to:
- Understand the challenges of investigating cyber crimes
- Develop an integral asymmetric mindset
- Understand the multitude of legal, ethical, and privacy related issues associated with cybercrime investigations
- Correlate and address the impact that the cyber realm has within the Criminal Justice field
- Compare and contrast various theoretical and social perspectives used to explain cybercrime
- Discuss and analyze the impact the cybercriminals can create on cybercrime victims, society and economic, as well as predicting emerging and controversial cybercrime issues
- Apply cyber laws, regulations, and cybercrime-related legal concepts to explaining cybercrime activities
- Explain important steps law enforcement use to investigate cybercrime cases and bring the cases to trial
- Analyze the potential effectiveness of the federal government’s responses to addressing cybercrime and threat to critical information infrastructures
- Understand the importance and use of Mutual Legal Assistance Treaties and Letters Rogatory
- Cyber Criminal investigations objectives: 1) Determine if a crime was committed; 2) Collect information and evidence legally to identify who was responsible; 3) Apprehend the person responsible; 4) Recover stolen property; 5) Present the best possible case to the prosecutor; and 6) Provide clear, concise testimony.