How to Catch Computer Criminals

FBI issues guidelines to help local cops nail online bad guys

Tim Wilson, Editor in Chief, Dark Reading, Contributor

January 17, 2007

2 Min Read

Ever wonder how the cops are trained to investigate computer crime? Now you don't have to.

The FBI last week issued a 137-page report that offers guidelines, tips, and advice to local law enforcement agencies on how to respond to and investigate computer crime. The report offers descriptions of common computer crimes and how to detect them.

The report is especially thorough in its discussions of how to locate and preserve evidence that might help convict a computer criminal. While the guide is intended for law enforcement people, it offers some advice that could be useful to enterprise security managers who suspect their computers may have been used to commit a crime.

For example, first responders often make the mistake of trying to navigate the suspect's computer in search of evidence -- without documenting or preserving the data that was already there, the guide says. Preserving what's on the suspect's screen (as well as logs on the PC and at the Internet service provider) can make or break a case.

"Complex evidentiary issues are frequently encountered in Internet and network investigations," the report says. "Evidence should be expeditiously retrieved and preserved." Time and date stamp information may be key in prosecuting a case, the guide notes.

While the guide offers information on how to investigate suspected crimes and protect evidence, it also describes the need for warrants and permissions in order to investigate suspected crimes. In some cases, an enterprise may choose to ask for a warrant before allowing law enforcement agencies to check their systems.

Experts say the FBI's guide may help prevent local law enforcement agencies, or enterprises, from botching a court case against a suspected computer criminal.

— Tim Wilson, Site Editor, Dark Reading

About the Author(s)

Tim Wilson, Editor in Chief, Dark Reading


Tim Wilson is Editor in Chief and co-founder of Dark, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights