Chapter 2

High Tech Interview

Information in this chapter:

ent A main goal of questioning a suspect

ent The line of questioning for suspects

ent Questions for victims

ent Questions for network administrators

ent Summary

Introduction

There are investigators with an uncanny knack for obtaining admissions and confessions during their interrogations. Other investigators avoid interrogations because of a pattern of only being able to get requests for an attorney from suspects. Reading books on interview techniques, taking course work in interviews and interrogations, and experience can each contribute to becoming a more effective interrogator. This chapter is not designed to teach interrogations. It will give you the questions needed for interrogations that are related to computer-related investigations. Each investigator must choose the timing and the delivery of the questions to elicit the truth from the suspect based on her own training, experience, and specific knowledge of the investigation.

Some of the most successful interrogations appear more like interviews or conversations, which many times could be the best description of the activity when speaking to suspects. Although an interview is an exchange of information and an interrogation is mainly a one-way road of information, the use of the terms “interrogation” and “interview” are used interchangeably throughout this chapter. The intention, regardless of definition, is eliciting truthful statements from suspects.

In cases where a suspect has been identified and arrested with enough evidence to charge them with a crime, the interview phase can solidify details, but only if the right questions are asked which elicit truthful answers. As with any suspect interview, some questions are asked to which the investigator already knows the answer, intermingled with questions to which answers are sought. Although not a foolproof method of guaranteeing all answers are truthful, it does provide a means of corroborating known and truthful information.

The Main Goal of Questioning a Suspect

The timing of contact with a suspect in any given case is not entirely dependent on the investigator. Sometimes, a suspect may not be identified until late in the case and the interview may only be used to corroborate evidence discovered previously. Other times, suspects may be contacted early in the case, during which time the evidence may be minimal.

Either situation still requires specific questions to be asked concerning technology involved. The listing of questions in this chapter gives the interviewer a foundation of evidence-gathering questions related to technology involved in the investigation. The questions do not depend upon whether or not the suspect is interviewed early in the case or prior to submitting charges.

The best case scenario is where the suspect freely admits guilt and confesses all details of the act. The sooner, the better for everyone involved. Sometimes that happens. Most times, it does not. For these investigations, it takes a person (the interrogator) to ask another person (the suspect) questions that elicit the truth. Unlike technology, there are no physical buttons to push, no debug program to determine why a question doesn’t work. It is purely human-to-human interaction.

Non-criminal cases employ many of the same interviewing techniques as criminal investigations, although confessions and admissions won’t necessarily result in criminal convictions more so than civil penalties or internal employee discipline. With many investigations, a computer system is only a part of the crime, either by use to facilitate a crime or maybe containing evidence of a crime. Therefore, not every crime has a digital forensics examiner assigned as the lead case agent. Additionally, since the digital forensics examiner in many organizations may be a rare breed, the non-digital forensics investigator conducts high-tech interviews, sometimes to the detriment of the case when necessary questions are not asked.

The information obtained by a suspect willing to be interviewed will be beneficial whether the suspect lies, tells the truth, stretches the truth, or omits facts. Everything admitted by the suspect needs independent verification to confirm the veracity of the statements. If the statements were true, then verification goes to show credibility. Conversely, if any statements were false or misleading and further investigation can show the inconsistencies and untruthfulness, those statements then lead to the suspect’s lack of credibility. Either way, statements made are statements that, if possible, need to be fact checked through independent means.

The suggested questions listed in this chapter can be used as a guide of questioning, in any order best suited to the investigator, the suspect, and the case. The particular manner of speaking, specific words used, and interviewing methods are up to the investigator to use with these. Technical information, for which the interrogator does not understand during the questioning, may even sometimes be best left to elaborate by the suspect. This not only educates the interrogator of the suspect’s mindset, but also allows the suspect to give even more information about the alleged crime.

To assist in the corroboration of suspect statements, any alleged suspect activity on computer devices should be detailed in order for forensic examiners to more quickly prove or disprove the statements. As an example, if a suspect denies ever using a peer-to-peer networking program or downloading files with such a program, a forensic examination may find information on the system that could counter the denial, thereby, discrediting that statement and suspect’s credibility. Other information given by a suspect, especially those statements made against a penal interest, could save hours or days of an examiner’s time in looking for electronic evidence that could have been identified by the suspect.

Investigators should keep an open mind as to the number and type of electronic devices that any suspect may have access at home, work, or public locations. For practical experience, an investigator can conduct a simple walkthrough of her own home and workplace, taking note of electronic devices and the interconnectivity to each other as well as to the Internet. Even with experienced investigators, conducting an informal visual survey of the home will most times be a surprise realization of the high number of devices used by family members on a regular basis. The actual devices used by cybercriminals will not be much different than the average computer user.

As can be seen in Figure 2.1, a multitude of devices exists outside the basic desktop computer. Some of the devices have specific uses but interconnected with each other. Modems, wireless routers, external storage devices, multiple computers, multiple cellular devices, and even Internet connected game stations may contain electronic evidence as single points of analysis or as obtaining corroborating evidence for a whole picture of user activity across a spectrum of devices.

image

Figure 2.1 Commonly used electronic devices, any or all, may be interconnected through wired or wireless networks at home or the workplace.

The Line of Questions for Suspects

The rule of not asking any question for which you don’t know the answer works, but only if you knew the answer beforehand. In every other instance, you are asking questions to get answers. As the interviewer, it really doesn’t matter if the answers are true, half true, or lies. The goal is to corroborate the answers with other facts, regardless of what you hear in an interview.

The sets of questions in this chapter are divided by topic and purpose. Not every question needs to be asked in every interview, but having a list of possible questions will help you guide the interview with a goal to accomplish.

Computer skills, ability, and knowledge

Obtaining a foundation of computer knowledge of the suspect helps counter arguments of ignorance of technology skills at some point in the case. Most questions are benign and innocent without any inference of guilt; yet could be vitally important to the investigation. Depending upon the position of the interviewer (whether the interviewer is the forensic examiner or the case agent), certain questions may seem unimportant. It is vital for the interviewer to understand that an unimportant question asked now may be extremely important for her counterpart in the investigation later.

Questions an interviewer may not understand can still be asked, as long as the interviewer is aware of the types of answers expected from each question. The assistance of a forensic examiner, or someone more versed in technology than the interviewer, would benefit the interviewer in obtaining accurate information from the suspect. Of course, one of the best questions to ask is simply, “Did you do it and how did you do it?” and take notes!

ent Do you have any computer training or education?

ent When and where?

ent What did the training and education consist of?

ent Have you ever taught computer subjects? When and where?

ent Have you ever written software?

ent Have you ever built a computer?

ent Have you ever replaced parts of a computer?

ent What parts?

ent Have you ever installed software?

ent What kind of software?

ent What operating systems have you used?

ent Are you comfortable using computers for basic tasks, such as Internet and word processing?

ent How often do you use computers each week? How many hours per day?

ent Do you have antivirus programs installed on your devices?

ent Is it kept up to date?

ent What is the program?

ent Have you ever had a virus on your device?

ent Did you clean the virus with any software?

ent Do you still have a virus?

ent Do you know what a virus or Trojan is? Do you have any on your devices?

ent Have you ever defragmented your hard drives?

ent How often?

ent When was the last time?

ent Have you ever reformatted your hard drives?

ent How often?

ent When was the last time?

ent Why did you reformat your hard drives?

ent Do you maintain or own any websites? Blogs? Forums? Lists?

ent What are the website Internet addresses?

ent When did you start maintaining or create the websites?

ent What content is on the websites? Blogs? Forums? Lists?

ent Do you own any computer-related books?

ent What kind of books are they?

ent Where are they?

ent Have you written technology books, papers, or guides?

Password, encryption, steganography, and deletion

The presence of encryption plays an important aspect of any digital forensics examination. Considering that many current operating systems include encryption features by default and Internet users can easily download any one of dozens of encryption programs, the odds of approaching encrypted systems or encrypted data increase. Depending upon the encryption scheme used coupled with a complex passphrase, it may be literally impossible to access certain files, folders, or entire storage devices that have been encrypted. The quickest method to obtain passphrases is usually just politely “ask” to be given the password by the suspect. And many times, it may be the only method to gain access.

As many electronic devices also have encryption or password protection features, such as smartphones and USB flash drives, interviewers should remember to obtain passphrase information to all devices. Assuming computer users have ill intent using encryption would be a risky assumption to make, especially as many devices and programs require a password to log into the system or program. Rather than assume data has been encrypted for nefarious purposes, let the suspect describe the intentions behind using encryption. Perhaps the use is innocent and unavoidable, but perhaps the suspect will detail intentional attempts to hide criminal evidence through the means of encryption.

An uncommon use of computers involves steganography. Steganography as it relates to electronic data simply means that data is hidden from view as to not be seen. The presence of data hidden using applications designed for steganography is significant to show intention of the suspect in knowingly concealing evidence. Forensic examiners will never know how many times they encounter steganography, other than the times they actually discovered steganography.

Given the high likelihood that properly hidden electronic evidence may never be found, it is crucial to obtain this information from the suspects through interrogations. Figure 2.2 shows a freeware utility capable of easily hiding files within files through a few clicks of the mouse. As the ease of hiding data increases, the odds that data will be hidden by suspects also increase.

ent Do you use encryption for files or computers?

ent What kind of encryption?

ent What software do you use to encrypt?

ent Why have you used encryption?

ent What are your current passwords?

ent What are past passwords you have used in the past?

ent Do you have hidden files? How are they hidden?

ent Do you have hidden partitions or volumes? How are they hidden?

ent Do you have any hidden volumes or partitions hidden within encrypted containers?

ent Does anyone else know or use any of your passwords?

ent Who?

ent Which passwords?

ent When do others use your passwords?

ent Do you have a written or printed list of your passwords?

ent What is your login information to each of your devices?

ent How do you delete files?

ent Do you empty the Recycle Bin/Recycler/Trash Bin? How often?

ent Do you use wiping programs?

ent What kind?

ent How often?

ent When was the last time used?

ent Have you ever wiped an entire hard drive?

ent When?

ent Why?

ent How did you wipe the hard drive?

ent Do you use steganography or data hiding programs?

ent What kind?

ent How often?

ent How do you use it?

ent On what files do you use it?

ent Why do you use data hiding programs?

ent Who do you want to hide data from?

image

Figure 2.2 Steganography programs can easily hide electronic data within electronic data. Xiao Steganography, http://www.nakasoft.net.

Control of the device(s) in question

A claim from a suspect that no other person had access to the computer device used in a crime is a powerful statement. However, specific questions asked about the control of the devices should still be asked to ensure no details, alibis, or failure to recollect details accurately occur later by the suspect. These specific questions clarify any doubts as to the person or persons that had access or control of an evidence device.

ent Is this device (computer, phone, etc.) yours?

ent Do you own it?

ent Did you purchase it?

ent When did you obtain it?

ent From where?

ent Who owns it?

ent Why do you have it?

ent When did you obtain it?

ent Do you have the owner’s permission?

ent Does anyone else have permission to use it?

ent Who?

When did they use it last?

How often do they use it?

ent Does anyone else have access to it?

ent Who?

ent How?

ent Does anyone else have the login information?

ent Who?

ent What is the name of their account?

ent Does anyone else use your account? Who? Why? When?

ent Do you have other devices?

ent Where are they currently?

ent Did you ever have other devices?

ent Does anyone else have access to them? Who?

ent When was the last time you used the device?

ent When was the last time someone else used the device?

ent Who was it?

ent What did they use it for?

ent Did they have your permission?

ent What do you use the device for?

ent Where do you normally use the device?

ent Where else have you used the device? Home? Work? Public places?

ent Is the room secured where the device is stored?

ent Is there a key to enter the room/office/home?

ent Who has access to the key or spare keys?

ent Is there a keycard access to the room/building/office?

ent Have you allowed use of your keycard to anyone?

Who used it?

Why did you allow someone to use your keycard?

When did they use it?

ent Do you have remote access configured for any computer?

ent How is it configured?

ent What software do you use?

ent From where do you remotely access your computer?

ent What activity do you usually conduct when connected remotely?

ent Does anyone else connect to your computer remotely?

Who do you allow to do this?

Why do you allow others to connect remotely to your computer?

Other devices used by suspect

ent What other devices do you own? (Laptops, PDA, smartphones, external hard drives, etc.)

ent How many cell phones do you have?

Where are they?

Which carriers do you use?

Have you taken photos or videos with the cell phones?

Where are the photos and videos saved?

ent How many desktop and laptop computers do you have?

ent Do you have other types of computer systems?

ent Where are the other devices?

ent When did you last use each device?

ent What did you use the devices for?

ent Does anyone else have access to them?

ent Who else has access?

ent When were the devices used by someone else?

ent Do you use your computers at your work for personal use?

ent How many work computers have you used for personal use?

ent Do you have an assigned computer?

ent Have you downloaded personal files with work computers?

ent How else do you use work computers for personal business?

ent Do any of these devices require passwords to use?

ent What are the passphrases?

ent Do you use your personal computers for business?

Software used by suspect

ent What operating systems do you use?

ent What types of programs do you use?

ent Do you use any password or encryption programs?

ent Do you use any programs that hide your identity?

ent Do you install the programs yourself?

ent Do you download programs from the Internet?

ent What kind of programs have you downloaded?

ent Have you ever written any programs or code?

ent Have you modified the code of any programs?

ent Have you ever used cracked or pirated software?

ent Which software?

ent How did you crack it?

ent Where did you obtain it?

ent Have you ever shared a copy of it?

ent Did you install “name of software?”

ent When did you last use this software?

ent How did you use this software?

ent Where did you obtain this software?

ent Have you changed the default settings?

Internet use by suspect

ent Do you have Internet access at home?

ent What is your Internet Service Provider (ISP)?

ent Do you have wireless Internet in your home?

ent How long have you had this ISP?

ent What was your previous ISP?

ent Is your wireless encrypted or open access?

ent What is the login?

ent Does anyone else have access to your Internet account?

ent Does anyone else have access to your Internet?

ent Who else has access? When was the last time used by someone else?

ent Do you have other means to access the Internet?

What are they?

How often do you use it?

Why do you have other Internet access accounts?

ent Which Internet browsers do you use?

ent Do you clear your Internet history?

ent How?

ent How often do you clear the history?

ent Why do you clear the history?

ent Do you use any method of concealing your IP address?

ent What method?

ent How often do you use it?

ent Why do you use it?

ent Which search engines do you use?

ent Do you bookmark favorite websites?

ent Which websites have your bookmarked as favorites?

ent How often do you revisit these websites?

ent What are some of your favorite bookmarked websites?

ent What search terms do you usually search?

ent How often do you search for these terms?

ent When was the last time you searched for these terms?

ent What were the most recent words you searched?

ent Do you use any method to clear your search history?

Why do you clear your search history?

When was the last time you cleared your search history?

ent Do you search for pictures on the Internet?

ent What words do you search for pictures?

ent What kinds of pictures show in the search results?

ent Do you download these pictures? When? How many? How often?

ent Do you view pornography on the Internet?

What kind of pornography?

Do you download pornography? How much? How often?

ent Have you written stories?

ent Are they posted online or shared with anyone?

ent What are the stories about?

ent Do you search for movies or videos on the Internet?

ent What kind of movies or videos?

ent What search terms have you used?

ent When was the last time you searched for movies or videos?

ent Did you download the movies or videos?

ent Did you watch any of the movies or videos?

ent Did you share any movies or videos with anyone?

ent Have you sold any of the videos or movies you downloaded?

Who did you sell them to?

Did you sell them online or in person?

ent Have you ever used Virtual Private Networks?

ent What VPN did you use?

ent When did you last use it?

ent What did you use it for? Why?

ent What is your login information?

ent Have you ever used Tor or other anonymity software?

ent When did you last use it?

ent What did you use it for? Why?

ent Where did you use it?

ent Do you make purchases online?

ent What type of purchases

ent What have you purchased?

Online chat, email, forums, boards, online social networking

Few persons are not connected through any number of social networking Internet services. Information posted in these accounts by the users can assist in obtaining investigative leads or evidence from the services directly. Most social networking services keep logs of a user’s access to their websites which can include Internet protocol (IP) addresses, date/time of login, and information posted.

Alibis may be proven or disproven depending upon the totality of the alibi with other corroborating information, such as obtaining the IP address of specific logins to place a person at a location during a specific time. Also, other related victims and suspects may be identified through the review of information obtained from these online services.

ent Do you chat online?

ent What program do you use to chat?

ent What are your nicknames/user names/screen names?

How did you pick these names?

Do you use these names on multiple chat system?

What are your passwords to access chat?

ent How often do you chat online?

ent Who do you chat with?

ent When was the last time you chatted online?

ent What did you/do you chat about?

ent Have you ever transferred files while chatting?

What types of files?

Who did you transfer the files to/who did you receive files from?

ent Do you play games in chat rooms?

ent What kind of games?

ent How often do you play these games?

ent Do you play games online to meet children?

ent Have you ever met anyone in person that you met online?

ent Who did you met?

ent When did you meet?

ent Where did you meet?

ent Have you met more than once?

ent Have you met more than one person?

ent Who were these people you met?

ent What type of email do you use?

ent What are your email addresses?

ent Do you download your email?

ent What program do you use?

ent Do you save or delete your email?

ent Does anyone have access to your email accounts or passwords?

ent Who else has access?

ent Why do you allow access to your email?

ent Do you send attachments in emails?

What kinds of attachments do you send?

Who do you send attachment to?

ent When was the last time you used your email accounts?

ent What are other email accounts you have used in the past?

Are these accounts closed?

When did you last use them?

Did anyone else have access to these accounts?

ent Do you visit forums or Internet boards?

ent Which forums/boards?

ent Have you commented or shared files on these forums/boards?

ent What comments did you make?

ent What files did you share?

ent Have you received files from any of these forums/boards?

ent How often do you visit these forums/boards?

ent What are your user names/screen names/login for these forums/boards?

ent What user groups do you belong?

ent What is your screen name?

ent Who is on your “buddy” or “friend” lists?

ent Do you know them personally?

ent Have you met any face to face?

ent Do you have a Facebook account?

ent What is your user name and login information?

ent Does anyone else have access to your account?

ent How often do you log into the account?

From where do you log in?

Do you chat with Facebook?

Do you play games on Facebook?

ent What other social websites do you visit or have accounts?

ent Do you use dating websites? What is your user information?

ent Do you use game websites? What is your user information?

ent Others? What are your logins?

ent How often do you use these social networking sites?

Suspects that browse the Internet with applications configured to allow for anonymity on the Internet have the ability to interact with others, such as victims of their harassment without being tracked by their true IP address. Some methods of anonymous browsing configurations include using virtual private networks (VPN) and The Tor Project (Tor) browser. With each of these methods, the IP address of the suspect is hidden through a series of random global nodes.

Figure 2.3 shows the Tor Network Map, in which the suspect’s originating IP address is hidden behind dozens of anonymous relays, preventing detection. The IP address will only be from a Tor exit node, not the actual IP address of the suspect. Although these methods of remaining anonymous online are not illegal, questioning the intentions of use of these applications by suspects builds evidence in their knowledge of attempting to thwart investigative efforts.

image

Figure 2.3 The Tor Project (Tor) application allows for anonymous Internet surfing. http://www.torproject.org.

Identifying each uncommon use of a computer system gives the investigator insight into the mindset of the suspect. The average computer user does not typically hide data under other data, encrypt data, wipe data, and cloak IP addresses while surfing the Internet on a regular basis. The combination of all of these types of activity gives the impression that not only was the suspect well versed in computer technology, but also took advantage of uncommonly used technology to facilitate crimes. This is not to say use of these applications is illegal, but coupled with criminal activity, their use can show facilitation of the criminal activity.

Another key component in questioning suspects about their use of programs includes discovering their intention and knowledge of using file sharing programs. File sharing programs, such as Frostwire seen in Figure 2.4, allow for files to be downloaded from many sources, globally. Several file sharing applications can be configured to search and download files automatically and be left virtually unattended by a computer user.

image

Figure 2.4 Frostwire is one of many “Peer-to-Peer” file sharing applications. http://www.frostwire.com.

Claiming ignorance as to the types of files downloaded may be plausible if enough information is not obtained to prove or disprove knowledge and intention. Digital forensics most likely will show the use of file sharing programs to include the files searched, downloaded, and shared. For example, downloaded files that have been renamed, placed into a folder other than the default download folder, or copied onto removable media show the suspect’s intent to view and save the files.

Peer-to-Peer Networking

ent Do you use Peer-to-Peer Networking software?

ent What is the name of the software?

ent How often do you use it?

ent Do you search for files with the software?

ent Have you downloaded files with the P2P programs?

ent Have you shared files or folders with the software?

ent What kind of files have you downloaded?

ent What kind of files have you shared?

ent Is your software installed by default or did you make changes?

ent Is file sharing on or off?

ent What other changes did you make?

ent Why did you make those changes?

ent Have you used other file sharing software applications?

ent Which applications?

ent How often?

ent When was the last time used?

ent Have you changed any of the default settings? Why?

Duplicating and storing data on a local media, such as desktops, laptops, and external storage devices, has quickly become common practice in homes and businesses. Forensic examinations of storage media can find all files that have been backed up or copied and sometimes deleted. However, forensic examinations of storage media will not be able to recover data that has been stored online. Finding traces of information leading to believe data may be stored online is important, but more important is being able to access that data.

Online data storage services, otherwise known as the “Cloud,” range from freely available to paid services. Configurations of online storage can be set to backup specific folders or an entire system, automatically and incrementally. Online data storage services usually encrypt the customer’s data and may not be able to decrypt the data that exists on their storage servers without the customer’s credentials. Without having access to any notes containing login credentials, it is critical to obtain them from the suspect through the interview process.

Investigators should also be aware that data stored in the Cloud may be shared with other users. Having shared access allows for the users to upload and delete files as well as potentially cancel accounts. If electronic evidence is suspected of being stored in the Cloud, precautions need to be taken immediately, such as sending preservation orders to the providers in preparation of obtaining search warrants to prevent destruction of the evidence.

There are a number of services currently available at no charge, such as ADrive seen in Figure 2.5. ADrive offers a free online storage capacity of 50 GB for every account. Paid accounts allow for even more online storage. Those investigators tasked with investigating child pornography cases may want to remember the potential evidence cache of online storage. Offenders using these types of freely available systems can share illicit images directly with other offenders, without the need of peer-to-peer networking applications.

image

Figure 2.5 ADrive online storage, http://www.adrive.com.

File storage

ent Do you store files on your computer hard drive?

ent Where do you store them on your hard drive?

ent Do you organize your saved files?

ent How do you organize files?

ent What kind of files do you save?

ent Do you make backups of your computer hard drive?

ent What software do you use?

ent What do you store the backups on?

ent Where are the backups?

ent Are they encrypted? What are the passwords?

ent Does anyone else have access to your backups?

ent Do you use flash drives?

ent Where are they?

ent How many flash drives do you own?

ent What is stored on the flash drives?

ent Do you use external hard drives?

ent Where are they?

ent How many external hard drives do you own?

ent What is stored on the external hard drives?

ent Do you encrypt these hard drives?

What are the passwords?

ent Have you ever replaced a hard drive on your computer/s?

ent Why was it replaced?

ent What did you do with the previous hard drive?

ent Do you use online storage?

ent What service do you use to store files online?

ent How often do you use online storage?

ent What is you login information?

ent Are the online files encrypted?

ent Are the files accessible by anyone else? Who else? Why?

ent Do you share files with others with these services?

ent Who do you share with?

ent What files do you share?

ent Does anyone else have access to your online storage?

ent Who? Why?

ent When did they last access your files?

ent Has anyone else uploaded files to your storage? Who? When? What files?

Crime specific—child pornography

Child pornography investigations sometimes involve hundreds of thousands of images with most of the images leaving no question that the subjects in the images are children. Other times, the subjects may not be clearly identified as children. As the mere possession of child pornography is a crime, these investigations could be considered easier than other computer-related crime.

However, that would be an incorrect assumption. If not simply for the benefit of other past and future victims, questioning suspects involved in this crime could not be more important, to not only prove a case, but to also find unreported cases of exploited and missing children. The following list of questions for Child Pornography is not all inclusive but is specific to computer use. Other questions, such as asking specific details related to the crime and victims, should also be asked.

ent Can you tell me what you believe child pornography to be?

ent Have you ever seen it before?

ent When did you see it?

ent How did you see it?

ent How do you know it was child porn?

ent Did you save it?

ent Did you share it with anyone?

ent Have you searched online for child pornography?

ent What search engine did you use?

ent What search terms did you use?

ent Did you find child porn through searching online?

ent Did you download any child porn from searches?

ent Have you ever uploaded child porn to the Internet?

ent Have you used Peer-to-Peer Networking programs to access child porn?

ent Have you downloaded child porn using P2P?

ent Have you shared child porn using P2P?

ent Have you ever encountered child porn on the Internet unintentionally?

ent Did you download any?

ent Did you delete any?

ent Did you share any?

ent Is there child pornography on your computer/s?

ent Where is it saved?

ent How did it get there?

ent When did it get saved?

ent Describe the child pornography on the computer.

ent What file formats do you use? JPG? AVI?

ent Did you rename any child porn files?

ent Did you organize any child porn files? By age group? By sex? By act?

ent Did you copy any child porn to compact disks or other devices or media?

ent Have you ever deleted child pornography from your computer?

ent How many images and videos of child porn do you estimate to have?

ent Have you ever sent or received child porn in an email?

ent To/from whom?

ent When did this happen?

ent How else do you trade/buy/sell child porn?

ent Have you ever received spam that was child porn?

ent Have you printed child pornography from your computers?

ent Where are those printed photos?

ent When did you print them?

ent What printer or printers did you use?

ent Where are those printers?

ent Have you shared those printed photos with anyone?

ent Who have you shared them with?

ent Have you ever copied printed pages of child porn?

ent What copy machine did you use?

ent When did you make the copies?

ent What did you do with the copies?

ent Do you keep any photos of children?

ent Why do you keep these photos?

ent Where do you keep them?

ent Do you search for “pre-teen” images or “Lolita” websites?

ent Have you saved these images?

ent Where are they saved?

ent Do any of your friends or family know you have child pornography?

ent Who else knows?

ent Do they also have child pornography?

ent Have you shared child pornography with them?

ent How old do you think the children are in the images?

ent Are you sexually aroused by the child porn images?

ent Have you taken photos of children…

ent …with clothes on?

ent …without clothes?

ent …in sex acts?

ent Where did you meet these children?

ent Where are they now?

ent How did you meet these children?

ent Did you touch the children?

ent Have you communicated with minors online?

ent With email? With chat?

ent Have you sent photos to the minor? What kind of photos?

ent What were the screen names of the minors?

ent Have you ever meet a minor face-to-face that you met online?

ent Where did you meet?

ent What was the minor’s name?

ent How old was the minor?

ent What took place during the meeting and any subsequent meetings?

ent How far did you have to travel?

ent Did you bring any gifts?

ent Did you have sex with the minor?

ent Did you touch the minor?

ent What percentage of your pornography collection are minors?

ent Do you know anyone that has taken photos of minors engaged in sex acts?

ent Do you have or have you seen those photos or videos?

ent Who took the photos or videos?

ent How were they distributed?

ent Where the children were first met?

ent Where are the children now?

ent Have you had sexual fantasies about children you have seen in photos/videos?

ent Do you know what NAMBLA refers to?

ent Do you know what Lolita refers to?

ent Do you know what “pre-teen” refers to?

ent What percentage of your pornography collection are adults only?

Crime specific—identity theft

ent Have you ever made ID cards?

ent Have you ever purchased ID cards fraudulently?

ent Have you ever used a stolen ID to purchase items or obtain credit?

ent Have you ever sold a person’s personal information?

ent Did you sell it online?

ent How did you sell it?

ent Have you used scanners to scan stolen ID cards or ID cards you created?

ent What scanner?

ent Where is the scanner now?

ent Have you ever portrayed yourself with another’s personal information to obtain items or credit?

ent Have you ever searched for methods of obtaining personal information to create fraudulent ID card?

ent What search engine did you use?

ent What search terms did you use?

ent What websites did you find?

ent Have you used software programs to create and alter ID cards?

ent Which programs?

ent What are the names you have used that were obtained through theft or fraud?

ent What items have you purchased using fraudulent ID and credit cards?

ent Do you know any persons that create fraudulent ID cards and credit cards?

ent Have you provided them with someone’s personal information?

ent Have you paid for services from them? When?

ent Where did you get personal information used to obtain credit in someone else’s name?

ent Do you have personal information about other persons on your device?

ent What information do you have on other people?

ent Where did you get this information?

ent Have any of the names been used to create credit cards or ID cards?

ent Have any of the names been used in any manner by you or others?

Other alleged crimes

Creating an atmosphere where suspects admit their guilt with graphicaly details helps any investigation. But it may be also helpful for other investigations to not only obtain information about their involvement in the criminal acts under investigation, but also about other yet to be detected crimes.

At times, asking questions about criminal activity, other than the crime in question, can lead to information beneficial to other cases. Suspects may also be more apt to give information on others and their crimes rather than personally admit guilt.

ent Do you know why you are arrested/investigated/questioned?

ent Have you ever been questioned about this sort of thing before? When? By whom?

ent Have you ever been charged or arrested for this type of crime before? When? Where?

ent Do you know what this alleged act consists of?

ent Do you know why someone would accuse you of any crime or this crime? Who?

ent Do you know the identity of anyone that may have committed this crime?

ent Do you know of any others that may be involved in any aspect of this crime?

ent Who are they?

ent How do you know them?

ent How do you know they are involved?

ent Where are they now?

ent Do you know any others involved in any other crimes?

ent What types of crimes?

ent Who are they?

ent How do you know them?

ent How do you know they are involved?

ent Where are they now?

ent Do you know the victims?

Questions for Victims

Computer-related questions for victims are not intended to prove or disprove their knowledge of computer systems, but rather to help determine the role of those systems in a crime. Victims may not be as well versed with computer systems as their victimizers, which can make them easy prey to scammers, phishing attacks, and hacking.

The questions posed to the victims will hopefully lead to information as to how they were victimized in order to determine the identity of the suspect. The questions also will help prevent overlooking physical evidence to be collected, such as recorded voicemails or printed pages of emails and websites.

Computer crime victim questions—identity theft

ent How often do you use your computer?

ent Do you have anti-virus software installed? Is it up to date?

ent Have you had viruses on your computer before?

ent Have you given your name, date of birth, social security number to anyone in any email?

ent Do you still have the email?

ent Did you speak to anyone on the telephone too?

ent Do you have any contact information or name of the person?

ent Did you fax or mail any information?

ent Have you received emails from a bank or other institution asking to provide your account information?

ent Did you provide any information?

ent Do you still have the emails?

ent Have any friends told you that they received spam from your email account?

ent When did this happen?

ent Did you change your password?

ent Has this happened before?

ent Have you seen unauthorized banking activity in any of your accounts?

ent Have you contacted the banks?

ent Does anyone else have access to your online banking information?

Who else?

Why would they access your account?

Do they have permission to access your account?

ent Do you have a Facebook (or other) page?

ent Have you “friended” any strangers?

ent Have you posted personal information online, such as your date of birth?

ent Have you applied for credit cards online?

ent Did you bookmark the website address?

ent Did you receive any credit cards for which you applied?

ent Did you receive a denial if not a credit card?

Computer crime victim questions—harassment via email/text/online postings

ent Did you save all emails that you consider harassing?

ent Do you know the person that may have sent the emails?

ent Did you reply to any of the emails?

ent Did you give permission to post your personal photos online?

ent Did you share these photos with anyone?

ent Were any photos manipulated?

ent How often are you receiving harassing emails/texts?

ent Have you printed or saved harassing webpages that have been uploaded by others?

ent Has anyone posted information online using your name?

ent Why do you think someone is harassing you?

ent Have you received phone calls that are harassing?

ent Do you have Caller ID?

ent Do you know the person(s)?

ent Do you have voicemails from the person(s)?

ent How long has this been happening?

Questions for Network Administrators

Network administrators are needed many times to obtain information necessary for search warrants when they are third-party hosts to electronic evidence stored by their customers. These questions will help the investigator draft affidavits that specifically request information sought in support of their investigations. The customer referenced in these questions refers to the alleged suspect in a crime. Any computer-related crime requires sensitivity to timeliness of evidence identification and collection. The Order of Volatility applies to data that naturally becomes unavailable in time due to natural processes such as shutting off a computer. It also applies to data that is intentionally deleted through normal business operations or computer use.

Document retention policies are not written with the purpose of preserving evidence as it is more so written to support business operations. Questioning network administrators as soon as each is identified will reduce the risk that relevant evidence will be destroyed through normal business operations.

Customer accounts—Internet Service Provider, online data hosting, other online services

ent Who is the system administrator or contact?

ent What log files are kept of customer logins?

ent How far in the past are they kept?

ent What information is contained in the log file?

ent Are incorrect attempts logged?

ent Are IP addresses logged?

ent Are backup copies made of customer data?

ent Are backups available?

ent How far back in time do backups exist?

ent Does customer “x” currently have an account?

ent What is the email address of customer “x?”

ent Is communication tracked with customers?

ent Is this communication able to be produced?

ent Does it include phone calls and emails?

ent Where does the data physically reside for customer “x?”

ent Is any customer identifying information needed for verification to create an account?

ent What customer information is maintained?

ent What Internet addresses do customers use to access their accounts?

ent Can customers share files with their accounts?

ent Is information maintained by all users included shared users, on accounts?

ent Can you describe how data is saved onto customer accounts?

ent What is the document retention policy of cancelled accounts?

ent Is encryption employed on customer accounts?

ent Are payment records maintained? For how long?

ent Can you immediately preserve the account of customer “x” in preparation of a search warrant?

Summary

The suggested questions are crucial in a computer-related criminal investigation. Answers may be truthful, untruthful, or portions of answers willfully omitted. Having the suspect commit to answers in one or more interviews will benefit the case regardless if the suspect was entirely truthful. Either the suspect tells the truth, providing incriminating statements, or the suspect is untruthful, which potentially discredits statements of innocence.

The investigator should intermingle questions with known answers to help determine the truthfulness of the questioning and to lead to additional questions. The suspect should not know which answers to questions are known as control questions. As the investigator, it is not only the confession that is sought, but also the admissions that will bolster physical and circumstantial evidence.

Confessions and admissions are only part of the investigative process and cannot solely be relied upon. Statements can be retracted, restated, or disproven. If evidence is weak in other areas of the investigation, the case can begin to be disrupted and torn apart, even if the suspect is guilty. Yet, confessions can be the most powerful evidence as the statements are made against the suspect’s penal interest.

Bibliography

1. ADrive. <http://www.adrive.com>.

2. Frostwire. <http://www.frostwire.com>.

3. The Onion Router (Tor). <http://www.torproject.org>.

4. Xiao Steganography. <http://www.nakasoft.net>.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.181.146