PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

Similar documents
MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Typical Investigative Steps and Legal Framework

Digital Forensics for Attorneys

Supporting Law Enforcement's Needs in the Digital Age

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

PROVIDING INVESTIGATIVE SOLUTIONS

Recommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

Trends in Mobile Forensics from Cellebrite

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Case 5:16-cm SP Document Filed 03/10/16 Page 1 of 6 Page ID #:2395

CHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE

2017 National Law Enforcement Training on Child Exploitation

Solution: Business Analytics and Optimization (BAO), Business Continuity, Business Analytics and Optimization (BAO), ROI Study

COUNTER-TERRORISM. Future-oriented policing projects

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Cellular Site Simulator Usage and Privacy

CYBER SOLUTIONS & THREAT INTELLIGENCE

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form

LUNENBURG COUNTY DISTRICT RCMP OVERVIEW

ANALYSIS AND VALIDATION

Cybercrime and Forensic Sciences Executive Policy Forum. The Conference Center at Snowbird Snowbird, Utah June 9 10, 2011

RUSSELL BOHSE.

minimum job requirements and physical demands. CITY OF PEORIA AZ invites applications for the position of: Police Services Officer - Park Ranger

You Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124

Typical Investigative Steps and Traveler cases

Presentation to Mayors & Councils of the Villages of Anmore & Belcarra May 29 th, 2007

Establishing a Crime Gun Intelligence Program Within Your Agency/Region

9/20/2015. Cell Phone Data Retrieval and Its Legal Implications COPYRIGHT NOTICE

COUNTERING IMPROVISED EXPLOSIVE DEVICES

PROFILE: ACCESS DATA

Guelph Police Service

2017 YEAR END REPORT. 101 Sheriff Dierker Ct. O Fallon, MO Office: Fax:

Address: 730 Simms, Suite #109, Golden, CO Digital Government: Government to Citizen (G to C)*

Computer forensics Aiman Al-Refaei

Postal Inspection Service Mail Covers Program

Smart Policing and Technology Applications

Chief s Weekly Executive Summary

Texting and driving. Texting and Driving Report Angel Reyes

Signature: Signed by GNT Date Signed: 6/15/2015. To establish the policies and procedures of the Cyber Crimes Squad.

COUNTERING IMPROVISED EXPLOSIVE DEVICES

New Model for Cyber Crime Investigation Procedure

Rio Salado College LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION

Digital Evidence: I know it s there, how do I get it?

FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM

Responding to Cybercrime:

Summary of WISE Needs Assessment Project

Public Safety. Director. City-County Bureau of Identification. Drug Analysis. Emergency Response. Field Services. Latent Examination

COLORADO DEPARTMENT OF LABOR AND EMPLOYMENT Arapahoe Street Denver, CO

Communications Assistance for Law Enforcement Act (CALEA)

DOMESTIC ABUSE DEATH REVIEW TEAM Fatality Review Data Collection Form. Unknown


Law Enforcement Solutions

ROUND ROCK.

Using the MySpace Friend Mapper to Build Connections for an Investigation

A CONNECTED COMMUNITY, KANE COUNTY, ILLINOIS IMPROVES PUBLIC SAFETY, DELIVERS SERVICES MORE EFFECTIVELY, AND STIMULATES ECONOMIC DEVELOPMENT

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

The International Criminal Police Organization

environmental crime prosecution - the Netherlands -

AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE

11/1/2018 Application Forensics

ECONOMIC ASPECTS OF CYBERCRIME

Advisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service

026 - DISTRICT ATTORNEY

Searching Securely: Technical Issues with Warrants for Remote Search. Steven M. Bellovin June 28,

SPECIAL ISSUE, PAPER ID: IJDCST-09 ISSN

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

CITYWIDE Part I Crime CITYWIDE PROPERTY PART I CRIME

Case 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL

PIONEER TRAINING INSTITUTE

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Running head: MOBILE FORENSICS 1

Past employee questionnaires showed the perception of security measures to be unfavorable with employees.

White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011

AUTOMATED DIGITAL EVIDENCE COLLECTION AND PUBLISHING: REDUCE INVESTIGATION TIME AND COSTS

B. EXECUTIVE SUMMARY. Page 2 of 7

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

FIRST RESPONDER FORENSICS

Dallas Police Department 2008 Summer Crime Prevention Initiative. June 6 August 24, 2008

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions

Chernobyl: Capping a Catastrophe. High Plains Moochers. One Therapist, $4 Million in 2012 Medicare Billing

Vendor Fraud. Goals of Presentation. Detection and Investigation

Sonoma County s System-wide Efforts to Improve the Broader Criminal Justice System

Office of Inspector General Office of Professional Practice Services

Fort Pierce Police Department

Data Systems for Policing in the 21 st Century:

Caribbean Cyber Security: Not Only Government s Responsibility

JAIL TECHNICIAN. Some form of picture identification, such as a driver's license, will be required at examinations.

Organized Crime Agency of British Columbia

N-DEx Linking Corrections With Law Enforcement

Legal, Ethical, and Professional Issues in Information Security

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9

Objective: Education:

Organization of Scientific Area Committees for Forensic Science (OSAC)

Making a Victim Personal Statement. You have a voice in the criminal justice system and have a right to explain how the crime has affected you

Europol Unclassified Basic Protection Level. Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency

FORENSIC APPLICATIONS OF SOLID FREEFORM FABRICATION. R.S. Crockett, R.Zick

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

Transcription:

CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March 1, 2018 PRESS RELEASE Computer Forensic Investigations Explode For Chester County Law Enforcement A 20 year old man is found shot to death in a car. No witnesses. No weapon. How do police start to figure out who did it? One key is to determine what the victim was doing and who he had contact with directly before the murder. That may involve investigators painstakingly recreating the victim s activities through dozens of interviews with family and friends, reviewing hours of video from local businesses and homes, and pursuing multiple other leads. Or the investigators can simply check the victim s mobile phone. Today s average smart phone will contain all of the clues about who the victim was talking to, where he has been, and what he was doing until the body was discovered. The same information can be pulled from a potential defendant s phone. And because virtually everybody now carries a mobile phone, the ability to extract data from electronic devices has become a critical tool in modern law enforcement.

Addressing this tremendous change in technology, the Chester County District Attorney s Office maintains a Computer Forensics Unit (the CFU ) to deal with digital evidence. The CFU was created in 2003. The CFU processes electronic devices for all 46 police agencies in Chester County, and handles all electronic evidence for the District Attorney s Office. From 19 jobs handled in 2003 through 331 jobs in 2017, the CFU has dealt with an ever-expanding case load. Chester County District Attorney Hogan stated, Computer forensics is a growing and vital field for law enforcement. Whether we are investigating drug dealing, child pornography, white collar fraud, or violent crimes, the ability to retrieve and interpret electronic data is crucial. We are lucky to have such resources available in Chester County. The CFU is housed in a special computer forensics lab in the Chester County Justice Center. Such a lab requires sophisticated computer hardware and software, electronic storage capacity, and a climate-controlled environment. The Chester County Commissioners authorized the construction of the new lab in 2014. Chester County Commissioner Terence Farrell stated, Modern law enforcement needs the ability to deal with electronic evidence. In order to protect our citizens, Chester County is proud to have an outstanding computer forensics lab and investigators. The explosive growth in the field of computer forensics can be seen in the total number of jobs and devices handled by the CFU every year. A job is considered a single case, which may include multiple devices to be examined. For instance, one child pornography investigation will be shown as one job, but may involve the examination of three computers and four phones, meaning one job with seven devices. The following charts show the tremendous increase in work done by the CFU in criminal cases:

Chester County Detective Roy Calarese, the lead investigator for the CFU, added, The technology in computer forensics is constantly evolving. A smart phone today has more functions and storage capabilities than a full-size desktop computer in 2003. We like the challenge of staying on top of the technology and using that technology to catch the bad guys. The Chester County District Attorney s Office also partners with the FBI s Regional Computer Forensics Laboratory (the RCFL ). The RCFL is an FBI facility that merges the personnel and equipment of the FBI with local law enforcement. The District Attorney s Office has an investigator assigned to the RCFL, as do the other suburban District Attorney s Offices. FBI Supervisory Special Agent John Jack Martinelli, the director of the RCFL, stated, The FBI is committed to working with our law enforcement partners. Computer forensics is at the cutting edge of global law enforcement. Combining the FBI s assets with our local partners makes all of us better at fighting crime. One of the major issues for both the Chester County CFU and the FBI RCFL is what is called the Going Dark problem. Going Dark refers to technology companies intentionally creating security or encryption for electronic devices that cannot be pierced even with court-approved search warrants. This means that criminals can use certain devices or programs without any danger of the police being able to discover the communications. For instance, a drug dealer might use Snapchat to send and receive orders for heroin. Even if law enforcement manages to arrest the defendant and seize his phone, all of the Snapchat data has either been destroyed or is encrypted, effectively hiding the drug dealer s illegal conduct forever. And that assumes that law enforcement is even able to get beyond the initial locked security settings on the phone. District Attorney Hogan stated, Somebody once joked that the three main user groups for encrypted messenger services are: (1) teenagers who are hiding conversations from their parents; (2) drug dealers; and (3) terrorists. Law enforcement does not care about the secret teenage conversations, but the clandestine communications of the drug dealers and terrorists must be subject to lawful discovery, or we cannot protect the public.

Overall, Chester County has top-of-the-line computer forensic capabilities, with outstanding personnel, equipment, and teamwork. This is an area that will continue to expand with the evolution of technology, requiring Chester County to stay vigilant. * * * * * * * Approved for release: Thomas P. Hogan