官术网_书友最值得收藏!

A brief history

Law enforcement first started to pay attention to the role that computers play in criminal activity in the middle of the 1980s. Prior to that, existing laws and law enforcement techniques were not adept at identifying and prosecuting computer criminals. As the use of computers by criminals began to gain more prominence, agencies such as the United State Federal Bureau of Investigation (FBI) decided to incorporate a dedicated digital and forensic investigations capability. This led to the creation of the FBI Computer Analysis and Response Team (CART). Other agencies such as the Metropolitan Police Service started to build a capability for investigating cyber crime.

A good historical document that addresses the FBI - CART is a short article in the US Dept. of Justice Crime Laboratory Digest dated January 1992.
https://www.ncjrs.gov/pdffiles1/Digitization/137561NCJRS.pdf

Two other seminal events brought the need for cyber investigations and forensics into the minds of many. The first was the break in of the Lawrence Berkeley National Laboratory by the hacker Markus Hess. This break-in might have gone undetected if not for the efforts of Clifford Stoll who hatched a plan to trap the attacker long enough to trace the connection. These efforts paid off and Stoll along with other authorities were able to trace the hacker and eventually prosecute him for espionage. This entire episode is recorded in Stoll's book, the cuckoo's egg.

The second high profile event was the Morris Worm that was unleashed on the fledgeling internet in 1988. The worm created and released by Robert Morris caused a denial of service on a number of systems, subsequently causing damage in excess of $100,000. A post incident investigation by a number of individuals, including Clifford Stoll found at least 6000 systems were infected. The rapid spread of the worm and the damage associated with it led to the creation of the Carnegie Mellon CERT/CC.

Throughout the 1990s, as more law enforcement agencies began to incorporate digital forensics into their investigative capabilities, the need for standardization of forensic processes became more apparent. It was in 1993, that an international conference was held to specifically address the role of computer evidence. Shortly thereafter in 1995, the International Organization on Computer Evidence (IOCE) was formed. This body was created to develop guidelines and standards around the various phases of the digital forensic examination process. In 1998, in conjunction with the IOCE, the federal crime laboratory directors created the Scientific Working Group on Digital Evidence (SWGDE). This group represented the United States component of the IOCE's attempt to standardize digital forensic practices.

As organizations continued to standardize practices, law enforcement agencies continued to implement digital forensics into their overall forensic capabilities. In 2000, the FBI established the first Regional Computer Forensic Laboratory(RCFL). These laboratories were established to serve law enforcement at various levels in a number of cyber-criminal investigations. The RCFL capability has grown over the last 15 years with 15 separate RCFLs spread across the United States. In addition, other federal, state, and local police agencies have formed task forces and standalone digital forensics capabilites. With the continual increase in computer-related crime, these agencies will continue to perform their critical work.

主站蜘蛛池模板: 盈江县| 泾源县| 民权县| 大城县| 武城县| 德兴市| 南宫市| 裕民县| 云南省| 遂昌县| 册亨县| 呼伦贝尔市| 富源县| 图们市| 托里县| 平乡县| 利辛县| 防城港市| 旬阳县| 永济市| 涡阳县| 怀远县| 竹山县| 万源市| 原平市| 阳高县| 阿拉善右旗| 石阡县| 芦溪县| 隆回县| 平果县| 红河县| 宝丰县| 仙游县| 三门县| 黄浦区| 安图县| 合水县| 阳春市| 松溪县| 固阳县|