Skip to main content

cyber crime

One of HSI's top priorities is to combat criminal activity conducted on or facilitated by the Internet.
HSI's Cyber Crimes Center (C3) delivers computer-based technical services to support domestic and international investigations into cross-border crime.
C3 is made up of the Cyber Crimes Unit, the Child Exploitation Investigations Unit and the Computer Forensics Unit. This state-of-the-art center offers cyber-crime support and training to federal, state, local and international law enforcement agencies. C3 also operates a fully equipped computer forensics laboratory, which specializes in digital evidence recovery, and offers training in computer investigative and forensic skills.

Cyber Crimes Unit

C3's Cyber Crimes Unit provides the management and oversight of the agency's cyber related investigations by focusing on the transnational criminal organizations that use cyber capabilities to further their criminal enterprise.
This unit provides training, investigative support and guidance to HSI field offices in emerging cyber technologies as well as subject matter expertise in cyber related investigations related to the following areas:
  • Identity and benefit document fraud;
  • Money laundering;
  • Financial fraud (including e-payment fraud and Internet gambling);
  • Commercial fraud;
  • Counter-proliferation investigations;
  • Narcotics trafficking; and
  • Illegal exports.
The Cyber Crimes Unit is also involved in the investigation of national and international cyber criminals and coordinates the dissemination of investigative leads worldwide.

Child Exploitation Investigations Unit

C3's Child Exploitation Investigations Unit is a powerful tool in the fight against the sexual exploitation of children; the production, advertisement and distribution of child pornography; and child sex tourism.
This unit uses sophisticated investigative techniques to target violators who operate on the Internet, including the use of websites, email, chat rooms and file-sharing applications.
Major initiatives include the following:
  • Operation Predator: HSI's flagship investigative initiative for targeting sexual predators, child pornographers and child sex tourists.
  • The Virtual Global Taskforce (VGT): An international alliance of law enforcement agencies and private-sector partners working together to fight online child sexual exploitation and abuse. HSI is a founding member and current chair of the VGT.
  • The National Child Victim Identification System (NCVIS): This system was developed to assist law enforcement agencies in identifying victims of child sexual exploitation.
  • Victim Identification Program (VIP): The use of technological and investigative capabilities and resources to rescue child victims of sexual exploitation. The VIP focuses on identifying and rescuing children who have been depicted in child abuse material.
  • In addition, ICE has partnered with other agencies (including the Internet Crimes Against Children Task Forces), foreign law enforcement agencies and non-governmental organizations (such as the National Center for Missing & Exploited Children). These partnerships have enabled C3 to successfully investigate leads and assist in identifying violators and associates all over the world.

Computer Forensics Unit

As the use of computers and digital devices has become widespread, C3's Computer Forensics Unit has grown to address the investigative challenges of a digital world. These devices have greatly increased the volume of data that HSI special agents must examine during the course of an investigation. In addition, HSI investigators now must manage digital evidence that is highly volatile, mobile and subject to encryption by any user. This makes recovery and stewardship of evidence challenging.
Computer forensics agents/analysts are HSI investigators or analysts trained to perform forensic examinations of seized digital storage devices, such as computer hard drives, flash drives, PDAs, mobile phones, DVDs, CDs and tape media. They use all available digital evidence recovery techniques to preserve an item's authenticity and integrity while maintaining a strict chain of custody.
Computer forensics agents are located in HSI field offices throughout the world to provide expertise on investigative strategies and to assist case agents in preparing search warrants targeting digital evidence. They are also called upon to furnish expert computer forensic testimony in criminal trials and to provide support to state and local law enforcement.
source ice.gov/cyber-crimes

Comments

Popular posts from this blog

QBasic and its history

QBasic Not to be confused with  Quick Basic . QBasic Paradigm Procedural Developer Microsoft First appeared 1991 ; 25 years ago OS MS-DOS ,  Windows 95 ,  Windows 98 ,  Windows Me ,  PC DOS ,  OS/2 , eComStation License Part of the operating system (a variety of  closed-source  licenses) Website www .microsoft .com Influenced by QuickBASIC ,  GW-BASIC Influenced QB64 ,  Small Basic QBasic  ( Microsoft  Quick Beginners All purpose Symbolic Instruction Code ) is an  IDE  and  interpreter  for a variety of the  BASIC programming language  which is based on  QuickBASIC . Code entered into the IDE is compiled to an intermediate representation , and this  IR  is immediately interpreted on demand within the IDE. [1]  It can run under nearly all versions of  DOS  and  Windows , or through  DOSBox / DOSEMU , on  Linux  and  FreeBSD . [2]  For its time, QBasic provided a state-of-the-art IDE, including a  debugger  with features such as on-the-fly expression evaluation and

Top 10 keyboard shortcuts everyone should know

Top 10 keyboard shortcuts everyone should know Using keyboard shortcuts can greatly increase your productivity, reduce repetitive strain, and help keep you focused. For example, to copy text, you can highlight text and press the Ctrl + C shortcut. The shortcut is faster than moving your hands from the keyboard, highlighting with the mouse, choosing copy from the file menu, and then returning to the keyboard. Below are the top 10 keyboard shortcuts we recommend everyone memorize and use. Ctrl + C or Ctrl + Insert and Ctrl + X Both  Ctrl + C  and  Ctrl +  Insert  will  copy  the  highlighted  text or selected item. If you want to  cut  instead of copy press  Ctrl + X . Apple  computer users can substitute the Ctrl key for the  command (cmd) key  on their computers. For example, pressing  Cmd + C  copies the highlighted text. Ctrl + V or Shift + Insert Both the  Ctrl + V  and  Shift + Insert  will  paste  the text or object that's in the clipboard . For Apple computer

computer network

A network may refer to any of the following: 1. A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data. An excellent example of a network is the Internet, which connects millions of people all over the world. Below is an example image of a home network with multiple computers and other network devices all connected to each other and the Internet. Computer network Examples of network devices *Desktop computers, laptops, mainframes, and servers *Consoles and thin clients *Firewalls *Bridges *Repeaters *Network Interface cards *Switches, hubs, modems, and routers *Smartphones and tablets *Webcams *Network topologies and types of networks The term network topology describes the relationship of connected devices in terms of a geometric graph. Devices are represented as vertices, and their connections are represented as edges on the graph. It describes