Cybercrime and Digital Forensics – Key Vocabulary
Chapter Goals
- Recognize responsibilities of law-enforcement agencies at local, state, federal, and international levels in responding to domestic/international cybercrime.
- Understand which agencies respond to attacks on military/government systems versus those that protect citizens.
- Differentiate civil and criminal law in digital investigations; clarify role of private investigators (PIs).
- Appreciate difficulties of cybercrime investigations across national borders.
- Debate how governments balance citizens’ privacy with intelligence-collection strategies for national-security threats.
- Discuss how the perceived legitimacy of governments/companies is affected by their investigative or surveillance strategies.
- Citizens conditioned to dial emergency numbers (e.g., 911 US, 999 UK) but local police seldom resolve cyber incidents.
- Cybercrimes frequently transcend municipal, state, or national borders → local police jurisdiction ends at city/county lines.
- Example: identity-fraud victim in State A, offender in State B → local agency powerless; needs federal referral.
- Some events not deemed “crimes” locally (e.g., malware infection with no proven data misuse, single harassing tweet).
- Under-reporting consequences:
• Victims less willing to notify police about cyber harms than physical harms (Cross 2015; Graham et al. 2020; Van de Weijer et al. 2020).
• True prevalence/severity remains unknown; issue flagged since mid-1990s (Goodman 1997; Stambaugh et al. 2001). - Research on policing cybercrime still limited versus traditional topics (gangs, domestic violence).
Municipal Police & Sheriff Offices
- Local agencies respond to diverse calls, crime prevention, arrests, public safety within limited jurisdiction (Walker & Katz 2022).
- Size/capability varies dramatically; larger, more hierarchical agencies more likely to allocate cyber resources (Nowacki & Willits 2020).
- U.S. landscape:
• Majority are municipal police; sheriffs either police unincorporated/rural areas or run jails & civil processes.
• 48\% of local agencies (2016) have < 10 sworn officers (Hyland & Davis 2019).
• Most serve populations < 50{,}000. - UK: territorial police forces; Canada: city police; most nations—local level plays minor role except where victim & offender co-located (e.g., online harassment, stalking, child-sexual-exploitation cases).
Persistent Challenges for Local Agencies
- Jurisdictional mismatches (victim/offender in different areas).
- No single legal definition of “cybercrime.”
- Lower public outcry versus violent crime.
- “Invisible” nature of offenses → evidence hard to see.
- Technology costs (hardware, software, forensics; see Chs 14–16).
- Training/re-training/retention issues; lack of managerial support.
Proposed Solutions & Trends
- Advocacy for building specialized local cyber units; evidence of growth in large urban departments (Willits & Nowacki 2016).
- Emphasis on patrol officers as first digital-evidence responders:
• NIJ’s “Electronic Crime Scene Investigations” guide (2nd Ed., 2008).
• U.S. Secret Service “Best Practices for Seizing Electronic Evidence” (3rd Ed., pocket guide).
• Need to recognize IoT, smart vehicles, TVs, Alexa, etc. - Cultural resistance: patrol officers perceive cybercrime as low-priority unless child-sexual-abuse content; prefer citizen self-protection & legal reforms over expanded police roles (Hinduja 2004; Holt et al. 2019).
State / Provincial Agencies
- Provide investigative backup when local resources inadequate or multi-county jurisdiction (Walker & Katz 2022).
- Operate state labs (digital forensics) for smaller departments.
- Growth in state-level cyber units due to better budgets (Willits & Nowacki 2016).
- Fusion Centers (est. 2003 post-9/11):
• Joint DHS–DOJ initiative to share terror & crime intel – now includes cyber‐threats.
• Criticized for inaccurate reports (e.g., 2011 Illinois “water-pump hack” misattributed to Russian actors; actually contractor on vacation).
Federal / National Law Enforcement
- Highest resources; handle complex & transnational cases.
- U.S. agencies & overlapping jurisdictions:
• FBI – intrusions, IP theft, economic crime, CSEM, interstate stalking, cyber-terror.
• U.S. Secret Service – financial-sector intrusions, economic crimes.
• CBP – IP theft, economic crimes; ICE – ID theft, CSEM. - Other nations:
• UK National Crime Agency (NCCU), special police forces.
• Canada RCMP (national + provincial policing). - Military / intel domain: U.S. Cyber Command, NSA; UK MoD & GCHQ; Singapore CSA; Canada CSE.
Civil Law, Digital Evidence & Private Actors
- Criminal law: state prosecutes offenses violating moral/social rules; burden =\text{beyond reasonable doubt}.
- Civil law: disputes over private rights; plaintiff vs. defendant; damages:
• Compensatory (replace loss).
• Punitive (punish negligence/malice).
• Burden =\text{preponderance of evidence} > 50\% likelihood. - Digital forensics pivotal in divorces, employment disputes, contract breaches.
- Investigations done by private forensic examiners/PIs, not police.
Licensing & Certification Landscape (U.S.)
- 30 states require forensic examiners to hold PI licenses; only 4 distinguish PI vs. digital-forensics license.
- 15 states interpret existing law as no PI license needed; 5 have no PI statutes.
- Licensing ensures background checks but not technical competency; certification bodies (e.g., EnCE, GCFA) provide skills, yet landscape fragmented.
- Survey (Kessler 2017): some examiners had no certifications or piggy-backed on agency hardware.
Corporate Civil Actions
- RIAA / UK FACT & ISPs send cease-and-desist letters to suspected media pirates.
- Facebook lawsuits (2019):
• ILikeAd Media Intl. – ad-click malware compromise.
• LionMobi & JediMobi – Android apps with backdoor click-fraud. - Ethical debate: corporations as quasi-prosecutors; unclear victim remediation & platform hardening.
Nongovernmental Organizations (NGOs)
- Fill gaps in law-enforcement capacity; gatekeepers linking victims to justice.
Spamhaus (est. 1998, UK)
- Tracks spam, phishing, malware; maintains real-time block lists of malicious IPs.
- Claims to protect 3.1\text{ billion} email addresses worldwide.
Computer Emergency Readiness Teams (CERTs)
- Public/private expert groups; alert & respond to vulnerabilities.
- 503 CERTs worldwide in 2019 (+10.5\% vs. 2018; +59\% vs. 2015).
Cyber Civil Rights Initiative (CCRI, est. 2013)
- Volunteer NGO assisting non-consensual-porn victims; content takedowns, legal advocacy, policy reform.
International Enforcement Challenges
- Statutory language lacks parity; extradition gaps (e.g., U.S.–Russia/China/Ukraine) → safe havens.
- Prosecutors may decline cases when arrest improbable.
- Obama-era proposal: extend RICO statutes to hackers → tougher sentencing & investigative powers (pending).
Interpol – Multinational Support
- 194 member nations; 18 databases (physical & digital evidence).
- ICSE database for CSEM; Cyber Fusion Center publishes malware/phishing intel.
- Dark Web Monitor: scans markets/forums for actionable data.
- Provides training & task-force coordination; cannot arrest but vital for information exchange.
Security vs. Privacy Tension
- Post-9/11 priority: pre-empt terror & cyber threats; rise in social-media threat-monitoring arrests.
- Secrecy of surveillance tools vs. citizens’ right to know → civil-liberties debate.
San Bernardino iPhone Case (2015–2016)
- Terror attack killed 14, wounded 22.
- FBI sought Apple’s help to unlock county-owned iPhone 5c.
- Apple refused (Fifth Amendment / backdoor risk).
- FBI paid >1{,}000{,}000 to 3rd-party exploit; no useful intel recovered; method obsolete after iOS update.
Cambridge Analytica Data Harvest (2016 revealed 2018)
- 87\text{ million} Facebook profiles scraped via quiz app ⇒ psychographic ads to sway/suppress U.S. voters.
- Violated FB data-sharing rules; led to global privacy backlash, #DeleteFacebook movement, yet user retention largely unchanged.
Mass-Surveillance Programs
- NSA PRISM (est. 2007): machine-learning over bulk email/SMS/other data from ≥9 tech giants; shared with Five Eyes partners.
- UK GCHQ KARMA POLICE (est. 2009): tapped fiber-optic cables; logged \approx 50\text{ billion} metadata records/day; goal: “map every visible user.”
- Snowden leaks (2013) exposed both programs; sparked legal reviews (e.g., UK parliamentary overhaul).
- Critics argue mass data-retention overturns presumption of innocence.
Legitimacy & Public Trust
- Overreach by state or corporations erodes perceived legitimacy → lower compliance, cooperation (Sunshine & Tyler 2003).
- Need transparent checks & balances; excessive secrecy risks authoritarian drift.
Summary: Multi-Stakeholder Response Needed
- Cybercrime demands coordinated effort: local (first responders), state (labs, fusion centers), federal/national (complex & transnational cases).
- International cooperation hampered by legal disparities; Interpol & treaty work vital.
- NGOs & industry fill enforcement gaps but raise ethical/legal questions.
- Ongoing struggle to balance effective security intelligence with individual privacy and democratic legitimacy.