UNIPOL Security Counter Measures May 2011

2
UNIPOL NEWSLETTER Newsletter 1 SECURITY COUNTERMEASURES “WARRIOR CREDO – CYBER TACTICS” www.drgonzo.org UNIPOL - Security Countermeasures May 2011 Tactical Mindset – Duty, Discipline and Devotion Cyber Tactics - 101 Analytical, exploratory or inspectional processes refer to a multitude of tasks associated with collecting data. We all gather and assemble information of one sort or another. Whether average citizen, busy business person or law enforcement personnel, everyone has investigative responsibilities of some characteristic, fashion or format. From a lawful perspective, in terms of assessing criminal activity, public and private entities hire selected personnel to facilitate investigative activities. Eventually, as a particular case unfolds, the complexity invites experts from the field. As such, given the nature of the techno-savvy world of the 21 st century, each of us is called upon to be vigilant, proactive and responsive to cyber threats, crimes and criminals. With the ongoing evolution of the cyber-world, criminals can be uniquely creative, surreptitious and seriously dangerous to all of us. Much of what we do on the internet could eventually involve a local law enforcement agency, or perhaps several police agencies, as well as private sector resources. In other words, things could get complicated. However, this work focuses on the basics. That’s because not all of us are computer experts or share technical skills related to computer crimes. It all depends on the nature of the reported criminality. Within the scope of this material, discussed herein, law enforcement refers to those police personnel primarily at the city, county and state levels. So, the focus in this regard pertains to first responders, and by primary linkage, the citizens who report to them a variety of computer related criminal activities. Let’s keep to the basics of an investigation. And, as the discussion unfolds later, determine how we go about building the case. For each juncture we encounter, we’ll want to ensure a systematic, rational and well-reasoned approach. In terms of the criminal nature, an investigation is a hunt for a breach of the criminal law statutes. To that, we gather information from varied sources. Some of it is physical, some is testimonial and some of it is stored on a digital medium. Evidence induces the necessity to apply forensic techniques to the process. For each state and the federal government, there exists a set of criminal law codes. At the first indication of a complaint, investigators typically assess whether or not, in fact, a crime has been committed. If so, what crime or crimes are at issue? Likewise, what evidence is available in support of the alleged criminality?

description

Introductory essay on cyber crimes and security countermeasures.

Transcript of UNIPOL Security Counter Measures May 2011

Page 1: UNIPOL Security Counter Measures May 2011

UNIPOL NEWSLETTER

Newsletter 1

SECURITY COUNTERMEASURES

“WARRIOR CREDO – CYBER TACTICS”

www.drgonzo.org UNIPOL - Security Countermeasures May 2011

Tactical Mindset – Duty, Discipline and Devotion

Cyber Tactics - 101

Analytical, exploratory or inspectional processes refer to a

multitude of tasks associated with collecting data. We all gather

and assemble information of one sort or another. Whether average

citizen, busy business person or law enforcement personnel,

everyone has investigative responsibilities of some characteristic,

fashion or format. From a lawful perspective, in terms of assessing

criminal activity, public and private entities hire selected personnel

to facilitate investigative activities. Eventually, as a particular case

unfolds, the complexity invites experts from the field. As such,

given the nature of the techno-savvy world of the 21st century, each

of us is called upon to be vigilant, proactive and responsive to

cyber threats, crimes and criminals.

With the ongoing evolution of the cyber-world, criminals can be

uniquely creative, surreptitious and seriously dangerous to all of us.

Much of what we do on the internet could eventually involve a

local law enforcement agency, or perhaps several police agencies,

as well as private sector resources. In other words, things could get

complicated. However, this work focuses on the basics. That’s

because not all of us are computer experts or share technical skills

related to computer crimes. It all depends on the nature of the

reported criminality. Within the scope of this material, discussed

herein, law enforcement refers to those police personnel primarily

at the city, county and state levels. So, the focus in this regard

pertains to first responders, and by primary linkage, the citizens

who report to them a variety of computer related criminal activities.

Let’s keep to the basics of an investigation. And, as the

discussion unfolds later, determine how we go about building the

case. For each juncture we encounter, we’ll want to ensure a

systematic, rational and well-reasoned approach. In terms of the

criminal nature, an investigation is a hunt for a breach of the

criminal law statutes. To that, we gather information from varied

sources. Some of it is physical, some is testimonial and some of it

is stored on a digital medium. Evidence induces the necessity to

apply forensic techniques to the process. For each state and the

federal government, there exists a set of criminal law codes. At the

first indication of a complaint, investigators typically assess

whether or not, in fact, a crime has been committed. If so, what

crime or crimes are at issue? Likewise, what evidence is available

in support of the alleged criminality?

Page 2: UNIPOL Security Counter Measures May 2011

At this juncture, it should be pointed out that the focus

here is directed toward the fundamentals of a competent

investigation. To that end, the investigative continuum, and

perhaps cycle of causality, is connected to the ever

expanding world of telecommunications, digital devices and

computerized interfaces. This is not intended to be a

comprehensive technical approach to the intricacies of

computerized criminality. Instead, the emphasis is toward

the gathering of evidence in order to establish a viable

criminal investigation for the generalist practitioner. For the

investigator, if in doubt as to the e-evidence in question, then

you seek out skilled resources.

As to that issue of forensic analysis, as may be required,

the investigative team can invite technical expertise from

credible forensic sources. These are typically available at

varying levels of governmental provision, as with federal,

state and local designations. In the process, crime labs can be

consulted via their cyber crime analytic capabilities. At

which time, the crime lab’s resources in the area of

electronic evidence, or “e-evidence”, can be more

technically analyzed. Regardless, every case signifies the

essentiality of ensuring problem-solving capacities come to

bear on uncovering the mystery at hand. In the field, we rely

on the creative ingenuity of the investigator. The process

turns toward her or his ability to objectively deduce the

elements involved.

For the criminal investigator, one realizes that criminal

investigations involve a significant effort of discovery. Such

is the challenge, and to some extent the adventure, of

developing the evidentiary criteria of the case. Detection

necessitates assessment, appraisal and access to information

availability. You expend energies and resources to assemble

data through a proactive process of extenuating inquiry. We

labor to reveal evidentiary probabilities to the extent

necessary that a finding of fact is revealed.

Growth, development and expansion in the Internet, in

addition to connecting innovations in electronic

technologies, swell the realm for perceivably limitless

criminal potentialities. When there are targets of opportunity,

then the criminal can be very inventive, deceptive and

dangerous. These multifaceted aspects of social interaction

offer sinister opportunities to those who desire to implement

their criminal nature. For the record, this discussion reflects

the classical school of criminology. That is, people commit

crimes because of choices they make, pure and simple. Well,

actually, not really all that simple, but close. No excuses,

alibis, or scapegoats, you did the crime because that what’s

served the satiation of your prurient desires.

Character, in the long run, is the decisive factor in the life of an individual and of nations alike. …….Teddy Roosevelt

Newsletter 2