This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.
The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.
This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.
It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.
This lecture provides an overview of the course, describing the different chapters or lectures.
Quantifying the extent and size of the threat from cybercrime.
Towards a definition of the criminal behaviour charactersied as cybercrime and how it is variously defined.
How the legal definitions translate into real life experience.
A description of some of the most common types of cyber attack.
Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort.
Devices (and therefore soruces of evidence) are increasingly connected. The potential connections and their implications are discussed in this video.
This video looks at different evidential sources.
Computers can be thought of as presumptuous adding machines. This lecture explains why.
A brief overview of the different systems used to file data.
How does computer memory work? Here are the basics.
This is a virtual exercise and your chance to see if you can spot sources of electronic evidence in a mock crime scene.
Why was the Internet created and how does it work?
Who invented the World Wide Web and how does it differ from the Internet?
From log tables through weaving and Babbage to the Colossus and everything with Chips.
An overview of the hacking cycle and the types of hackers.
Why governments hack and the concept of 'hacking back'.
What to expect at a digital crime scene and some of the ways to manage it.
The connectivity of devices also raises the risk that electronic evidence can be altered or deleted from rogue signals. That's where Faraday Bags can be put to good effect.
Your device keeps a record of your Internet behaviour. Here are some of the places where those records are stored.
The history of your activity on the Internet is also logged on the server. Here's how to read one type of server log.
Like in any post-mortem examination, a lot of really useful evidence is found when the body is dissected ... but it isn't quite that easy when you are talking zeros and ones. Here are a few of the steps taken when examining a 'dead' box.
The data is stored on a device also has consequences for data retrieval. This video reveals some of them.
Criminals try to cover their tracks. Electronic evidence can be hidden in many ways. Here are just a few of them.
A look at how it is possible to remain anonymous on the Internet and use that anonymity to access the Dark Net.
The Dark Net hides it's sites, but, with a little extra effort, a parallel web of unscrupulous activity and illegal wares can be accessed. This is a dangerous, criminal hub for information and for obtaining illegal products.
Everyone who has an email account has suffered from unwanted and unsolicited messages in their inbox. It is a nuisance, but behind spamming is an 'impressive' level of criminal enterprise. In particular, this video considers the use of spamming by the illicit pharma industry,
There is a lot of advice on how to construct a good password, but it is often ignored. This video reviews the advice and describes the reasons for password complexity.
Steven David Brown is a barrister of the Inner Temple, but no longer practises law. He left the Bar to become a police officer with London's Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. He has worked in international capacity building and technical assistance since 2005 including periods as the Senior Law Enforcement Adviser for the UN Office on Drugs and Crime in Central Asia, as policy adviser on law enforcement to the EU Advisory Group in Armenia and, more recently, as project manager for the EU/Council of Europe's Global Action on Cybercrime. During this latter role, Steven was closely involved in delivering guidance and training on substantive and practical areas of combating cybercrime and providing advice on the new challenges implicit in electronic evidence.
Steven has had a number of articles published in peer reviewed journals and is the editor of and major contributor to the textbook, "Combating International Crime: The longer arm of the law" (Routledge, 2008).