Skip to main content

cyber crime

One of HSI's top priorities is to combat criminal activity conducted on or facilitated by the Internet.
HSI's Cyber Crimes Center (C3) delivers computer-based technical services to support domestic and international investigations into cross-border crime.
C3 is made up of the Cyber Crimes Unit, the Child Exploitation Investigations Unit and the Computer Forensics Unit. This state-of-the-art center offers cyber-crime support and training to federal, state, local and international law enforcement agencies. C3 also operates a fully equipped computer forensics laboratory, which specializes in digital evidence recovery, and offers training in computer investigative and forensic skills.

Cyber Crimes Unit

C3's Cyber Crimes Unit provides the management and oversight of the agency's cyber related investigations by focusing on the transnational criminal organizations that use cyber capabilities to further their criminal enterprise.
This unit provides training, investigative support and guidance to HSI field offices in emerging cyber technologies as well as subject matter expertise in cyber related investigations related to the following areas:
  • Identity and benefit document fraud;
  • Money laundering;
  • Financial fraud (including e-payment fraud and Internet gambling);
  • Commercial fraud;
  • Counter-proliferation investigations;
  • Narcotics trafficking; and
  • Illegal exports.
The Cyber Crimes Unit is also involved in the investigation of national and international cyber criminals and coordinates the dissemination of investigative leads worldwide.

Child Exploitation Investigations Unit

C3's Child Exploitation Investigations Unit is a powerful tool in the fight against the sexual exploitation of children; the production, advertisement and distribution of child pornography; and child sex tourism.
This unit uses sophisticated investigative techniques to target violators who operate on the Internet, including the use of websites, email, chat rooms and file-sharing applications.
Major initiatives include the following:
  • Operation Predator: HSI's flagship investigative initiative for targeting sexual predators, child pornographers and child sex tourists.
  • The Virtual Global Taskforce (VGT): An international alliance of law enforcement agencies and private-sector partners working together to fight online child sexual exploitation and abuse. HSI is a founding member and current chair of the VGT.
  • The National Child Victim Identification System (NCVIS): This system was developed to assist law enforcement agencies in identifying victims of child sexual exploitation.
  • Victim Identification Program (VIP): The use of technological and investigative capabilities and resources to rescue child victims of sexual exploitation. The VIP focuses on identifying and rescuing children who have been depicted in child abuse material.
  • In addition, ICE has partnered with other agencies (including the Internet Crimes Against Children Task Forces), foreign law enforcement agencies and non-governmental organizations (such as the National Center for Missing & Exploited Children). These partnerships have enabled C3 to successfully investigate leads and assist in identifying violators and associates all over the world.

Computer Forensics Unit

As the use of computers and digital devices has become widespread, C3's Computer Forensics Unit has grown to address the investigative challenges of a digital world. These devices have greatly increased the volume of data that HSI special agents must examine during the course of an investigation. In addition, HSI investigators now must manage digital evidence that is highly volatile, mobile and subject to encryption by any user. This makes recovery and stewardship of evidence challenging.
Computer forensics agents/analysts are HSI investigators or analysts trained to perform forensic examinations of seized digital storage devices, such as computer hard drives, flash drives, PDAs, mobile phones, DVDs, CDs and tape media. They use all available digital evidence recovery techniques to preserve an item's authenticity and integrity while maintaining a strict chain of custody.
Computer forensics agents are located in HSI field offices throughout the world to provide expertise on investigative strategies and to assist case agents in preparing search warrants targeting digital evidence. They are also called upon to furnish expert computer forensic testimony in criminal trials and to provide support to state and local law enforcement.
source ice.gov/cyber-crimes

Comments

Popular posts from this blog

QBasic and its history

QBasic Not to be confused with  Quick Basic . QBasic Paradigm Procedural Developer Microsoft First appeared 1991 ; 25 years ago OS MS-DOS ,  Windows 95 ,  Windows 98 ,  Windows Me ,  PC DOS ,  OS/2 , eComStation License Part of the operating system (a variety of  closed-source  licenses) Website www .microsoft .com Influenced by QuickBASIC ,  GW-BASIC Influenced QB64 ,  Small Basic QBasic  ( Microsoft  Quick Beginners All purpose Symbolic Instruction Code ) is an  IDE  and  interpreter  for a variety of the  BASIC programming language  which is based on  QuickBASIC . Code entered into the IDE is compiled to an intermediate representation , and this  IR  is immediately interpreted on demand within the IDE. [1]  It can run under nearly all versions of  DOS  and  Windows , or through  DOSBox / DOSEMU , on  Linux  and...

Manchester Small-Scale Experimental Machine

Manchester Small-Scale Experimental Machine Replica of the Small-Scale Experimental Machine (SSEM) at the  Museum of Science and Industry  in Castlefield ,  Manchester The  Manchester Small-Scale Experimental Machine  ( SSEM ), nicknamed Baby , was the world's first  stored-program computer . It was built at the  Victoria University of Manchester , England, by  Frederic C. Williams ,  Tom Kilburn  and Geoff Tootill , and ran its first program on 21 June 1948. [1] The machine was not intended to be a practical computer but was instead designed as a  testbed  for the  Williams tube , an early form of computer memory. Although considered "small and primitive" by the standards of its time, it was the first working machine to contain all the elements essential to a modern electronic computer. [2]  As soon as the SSEM had demonstrated the feasibility of its design, a project was initiated at the university ...

Timeline of computing hardware 2400 BC–1949

Timeline of computing hardware 2400 BC–1949 This article presents a detailed  timeline  of events in the history of  computing hardware : from prehistory until 1949 . For narratives explaining the overall developments, see  History of computing . Contents Prehistory –1640 Edit Date Event 80000 BC Two notched rib bones may have been used for counting but they could have been merely decorative. [1] 18000 BC The  Ishango bone , may indicate that – even so early – material objects were used for simple arithmetical operations, and it may provide evidence of some knowledge of  prime numbers  (although this is disputed). [2] c. 2400 BC The  abacus  – the first known calculator, was probably invented by the  Babylonians  as an aid to simple  arithmetic around this time period. This laid the foundations for  positional notation  and later  computing  developments. c.   1115 BC The...