UNIPOL Security Counter Measures May 2011
-
Upload
dr-randy-gonzalez -
Category
Documents
-
view
54 -
download
0
description
Transcript of UNIPOL Security Counter Measures May 2011
UNIPOL NEWSLETTER
Newsletter 1
SECURITY COUNTERMEASURES
“WARRIOR CREDO – CYBER TACTICS”
www.drgonzo.org UNIPOL - Security Countermeasures May 2011
Tactical Mindset – Duty, Discipline and Devotion
Cyber Tactics - 101
Analytical, exploratory or inspectional processes refer to a
multitude of tasks associated with collecting data. We all gather
and assemble information of one sort or another. Whether average
citizen, busy business person or law enforcement personnel,
everyone has investigative responsibilities of some characteristic,
fashion or format. From a lawful perspective, in terms of assessing
criminal activity, public and private entities hire selected personnel
to facilitate investigative activities. Eventually, as a particular case
unfolds, the complexity invites experts from the field. As such,
given the nature of the techno-savvy world of the 21st century, each
of us is called upon to be vigilant, proactive and responsive to
cyber threats, crimes and criminals.
With the ongoing evolution of the cyber-world, criminals can be
uniquely creative, surreptitious and seriously dangerous to all of us.
Much of what we do on the internet could eventually involve a
local law enforcement agency, or perhaps several police agencies,
as well as private sector resources. In other words, things could get
complicated. However, this work focuses on the basics. That’s
because not all of us are computer experts or share technical skills
related to computer crimes. It all depends on the nature of the
reported criminality. Within the scope of this material, discussed
herein, law enforcement refers to those police personnel primarily
at the city, county and state levels. So, the focus in this regard
pertains to first responders, and by primary linkage, the citizens
who report to them a variety of computer related criminal activities.
Let’s keep to the basics of an investigation. And, as the
discussion unfolds later, determine how we go about building the
case. For each juncture we encounter, we’ll want to ensure a
systematic, rational and well-reasoned approach. In terms of the
criminal nature, an investigation is a hunt for a breach of the
criminal law statutes. To that, we gather information from varied
sources. Some of it is physical, some is testimonial and some of it
is stored on a digital medium. Evidence induces the necessity to
apply forensic techniques to the process. For each state and the
federal government, there exists a set of criminal law codes. At the
first indication of a complaint, investigators typically assess
whether or not, in fact, a crime has been committed. If so, what
crime or crimes are at issue? Likewise, what evidence is available
in support of the alleged criminality?
At this juncture, it should be pointed out that the focus
here is directed toward the fundamentals of a competent
investigation. To that end, the investigative continuum, and
perhaps cycle of causality, is connected to the ever
expanding world of telecommunications, digital devices and
computerized interfaces. This is not intended to be a
comprehensive technical approach to the intricacies of
computerized criminality. Instead, the emphasis is toward
the gathering of evidence in order to establish a viable
criminal investigation for the generalist practitioner. For the
investigator, if in doubt as to the e-evidence in question, then
you seek out skilled resources.
As to that issue of forensic analysis, as may be required,
the investigative team can invite technical expertise from
credible forensic sources. These are typically available at
varying levels of governmental provision, as with federal,
state and local designations. In the process, crime labs can be
consulted via their cyber crime analytic capabilities. At
which time, the crime lab’s resources in the area of
electronic evidence, or “e-evidence”, can be more
technically analyzed. Regardless, every case signifies the
essentiality of ensuring problem-solving capacities come to
bear on uncovering the mystery at hand. In the field, we rely
on the creative ingenuity of the investigator. The process
turns toward her or his ability to objectively deduce the
elements involved.
For the criminal investigator, one realizes that criminal
investigations involve a significant effort of discovery. Such
is the challenge, and to some extent the adventure, of
developing the evidentiary criteria of the case. Detection
necessitates assessment, appraisal and access to information
availability. You expend energies and resources to assemble
data through a proactive process of extenuating inquiry. We
labor to reveal evidentiary probabilities to the extent
necessary that a finding of fact is revealed.
Growth, development and expansion in the Internet, in
addition to connecting innovations in electronic
technologies, swell the realm for perceivably limitless
criminal potentialities. When there are targets of opportunity,
then the criminal can be very inventive, deceptive and
dangerous. These multifaceted aspects of social interaction
offer sinister opportunities to those who desire to implement
their criminal nature. For the record, this discussion reflects
the classical school of criminology. That is, people commit
crimes because of choices they make, pure and simple. Well,
actually, not really all that simple, but close. No excuses,
alibis, or scapegoats, you did the crime because that what’s
served the satiation of your prurient desires.
Character, in the long run, is the decisive factor in the life of an individual and of nations alike. …….Teddy Roosevelt
Newsletter 2