High Technology Crime Investigation Association

Last updated

High Technology Crime Investigation Association (HTCIA) is an international non-profit professional organization devoted to the prevention, investigation, and prosecution of crimes involving advanced technologies. Author and cybercrime expert, Christopher Brown, [1] described HTCIA as "one of the largest and most respected" associations of its kind. [2]

Contents

The association was formally incorporated in 1989 and "designed to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas and knowledge about methods, processes, and techniques relating to investigations and security in advanced technologies." [3] [4] The association is open to law enforcement personnel, investigators, technicians or specialists and prosecuting attorneys engaged in the investigation and prosecution of criminal or civic activities in which computers and or other advanced technologies are utilized. The association is also open to security professionals whose primary duties are corporate security investigations. Average yearly membership usually exceeds 3,000. Members are located primarily in the United States, Canada, Europe and the Asia Pacific. [5]

HTCIA members have been involved in numerous high-profile cases over the years. [6] One of the most notable was the BTK Killer (Dennis Lynn Rader), [7] [8]

Numerous HTCIA members have written books on cybercrime investigations and collecting digital evidence, including, Christopher Brown, [9] Warren G. Kruse II, [10] Anthony Reyes, [11] [12] Art Bowker., [13] [14] Todd G. Shipley, [15] and D. Kall Loper. [16]

International Training Conference & Expo

The group holds an annual International Training Conference & Expo each year. The conference has alternated between the East (even years) and West (odd years) coasts of the United States. [17]

Related Research Articles

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Dennis Rader</span> American serial killer (born 1945)

Dennis Lynn Rader, also known as BTK, is an American serial killer who murdered at least ten people in Wichita and Park City, Kansas, between 1974 and 1991. Although Rader occasionally killed or attempted to kill men and children, he typically targeted women. His victims were often bound, sometimes with objects from their homes, and either suffocated with a plastic bag or manually strangled with a ligature.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Rizon is a large Internet Relay Chat (IRC) network with an average of around 20,000 users. The IRC network itself ranks number 5 among the largest IRC networks. Rizon is popular with many anime fansubbing groups who work online, many of whom provide their content through XDCC via IRC bots in their distribution channels. It is also used by many users of eRepublik as a means of communication. File sharing of other copyrighted material such as Warez is also common in some channels on the network.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

<span class="mw-page-title-main">TestDisk</span> Data recovery utility

TestDisk is a free and open-source data recovery utility that helps users recover lost partitions or repair corrupted filesystems. TestDisk can collect detailed information about a corrupted drive, which can then be sent to a technician for further analysis. TestDisk supports DOS, Microsoft Windows, Linux, FreeBSD, NetBSD, OpenBSD, SunOS, and MacOS. TestDisk handles non-partitioned and partitioned media. In particular, it recognizes the GUID Partition Table (GPT), Apple partition map, PC/Intel BIOS partition tables, Sun Solaris slice and Xbox fixed partitioning scheme. TestDisk uses a command line user interface. TestDisk can recover deleted files with 97% accuracy.

<span class="mw-page-title-main">PhotoRec</span> Open source data recovery software

PhotoRec is a free and open-source utility software for data recovery with text-based user interface using data carving techniques, designed to recover lost files from various digital camera memory, hard disk and CD-ROM. It can recover the files with more than 480 file extensions . It is also possible to add custom file signature to detect less known files.

<span class="mw-page-title-main">Dave Kleiman</span> American computer investigator

Dave Kleiman was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker at security related events.

<span class="mw-page-title-main">Angela Orebaugh</span> American computer scientist and author

Angela Orebaugh is a cyber technology and security author and researcher. In 2011, she was selected as Booz Allen Hamilton's first Cybersecurity Fellow. She is an assistant professor at the University of Virginia Department of Computer Science.

<span class="mw-page-title-main">EnCase</span>

EnCase is the shared technology within a suite of digital investigations products by Guidance Software. The software comes in several products designed for forensic, cyber security, security analytics, and e-discovery use. EnCase is traditionally used in forensics to recover evidence from seized hard drives. It allows the investigator to conduct in-depth analysis of user files to collect evidence such as documents, pictures, internet history and Windows Registry information.

Johnny Long, otherwise known as "j0hnny" or "j0hnnyhax", is a computer security expert, author, and public speaker in the United States.

<span class="mw-page-title-main">Robert Slade</span> Canadian information scientist

Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".

Justin Tanner Petersen was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.

Eoghan Casey is a digital forensics professional, researcher, and author. Casey has conducted a wide range of digital investigations, including data breaches, fraud, violent crimes, identity theft, and on-line criminal activity. He is also a member of the Digital/Multimedia Scientific Area Committee of the Organization for Scientific Area Committees. He helps organize the digital forensic research DFRWS.org conferences each year, and is on the DFRWS Board of Directors. He has a B.S. in Mechanical Engineering from the University of California, Berkeley, an M.A. in Educational Communication and Technology from New York University, and a Ph.D. in Computer Science from University College Dublin.

Guidance Software, Inc. was a public company founded in 1997. Headquartered in Pasadena, California, the company developed and provided software solutions for digital investigations primarily in the United States, Europe, the Middle East, Africa, and the Asia/Pacific Rim. Guidance Software had offices in Brazil, Chicago, Houston, New York City, San Francisco, Singapore, United Kingdom and Washington, D.C., and employed approximately 371 employees. On September 14, 2017, the company was acquired by OpenText.

The Trojan horse defense is a technologically based take on the classic SODDI defense, believed to have surfaced in the UK in 2003. The defense typically involves defendant denial of responsibility for (i) the presence of cyber contraband on the defendant's computer system; or (ii) commission of a cybercrime via the defendant's computer, on the basis that a malware or on some other perpetrator using such malware, was responsible for the commission of the offence in question.

Art Bowker is an American author and cybercrime specialist in corrections. His first book, The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century, describes the process of supervising cyber-offenders. Bowker, along with Todd G. Shipley, wrote a book called Investigating Internet Crimes, 1st Edition: An Introduction to Solving Crimes in Cyberspace, which provides step-by-step instructions for investigating Internet crimes.

<span class="mw-page-title-main">Microsoft Digital Crimes Unit</span>

The Microsoft Digital Crimes Unit (DCU) is a Microsoft sponsored team of international legal and internet security experts employing the latest tools and technologies to stop or interfere with cybercrime and cyber threats. The Microsoft Digital Crimes Unit was assembled in 2008. In 2013, a Cybercrime center for the DCU was opened in Redmond, Washington. There are about 100 members of the DCU stationed just in Redmond, Washington at the original Cybercrime Center. Members of the DCU include lawyers, data scientists, investigators, forensic analysts, and engineers. The DCU has international offices located in major cities such as: Beijing, Berlin, Bogota, Delhi, Dublin, Hong Kong, Sydney, and Washington, D.C. The DCU's main focuses are child protection, copyright infringement and malware crimes. The DCU must work closely with law enforcement to ensure the perpetrators are punished to the full extent of the law. The DCU has taken down many major botnets such as the Citadel, Rustock, and Zeus. Around the world malware has cost users about $113 billion and the DCU's jobs is to shut them down in accordance with the law.

Hit-and-run DDoS is a type of denial-of-service (DDoS) attack that uses short bursts of high volume attacks in random intervals, spanning a time frame of days or weeks. The purpose of a hit-and-run DDoS is to prevent a user of a service from using that service by bringing down the host server. This type of attack is to be distinguished from a persistent DDoS attack which continues until the attacker stops the attack or the host server is able to defend against it.

References

  1. Interview with Christopher Brown | Forensic interviews
  2. Brown, Christopher (2006), Computer Evidence: Collection and Preservation, Hingham: Charles River Media, p. 317, ISBN   1-58450-405-6
  3. Reyes, Anthony; Brittson, Richard; O'Shea, Kevn and Steele, James (2007), Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors, Rockland: Syngress, p. 85, ISBN 1--59749-133-0
  4. Barabara, John (2008), Handbook of Digital and Multimedia Forensic Evidence, New York: Humana Press, p. 31, ISBN   1617377759
  5. High Technology Crime Investigation Association
  6. "High Technology Crime Investigation Association". Archived from the original on 2012-06-28. Retrieved 2012-07-22.
  7. Dennis Rader
  8. Simmons, Erica "Forensic Computer Investigation Brings Notorious Serial Killer BTK (Dennis Rader) to Justice" in The Forensic Examiner, pg 5
  9. Brown, Christopher (2006), Computer Evidence: Collection and Preservation, Hingham: Charles River Media, ISBN   1-58450-405-6
  10. Kruse, Warren and Heiser, Jay (2001), Computer Forensics: Incident Response Essentials, Boston: Addison-Wesley Professional, ISBN   0201707195
  11. Reyes, Anthony; Brittson, Richard; O'Shea, Kevn and Steele, James (2007), Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors, Rockland: Syngress, ISBN 1--59749-133-0
  12. Reyes, Anthony and Wiles, Jack (2007), The Best Damn Cybercrime and Digital Forensics Book Period, Rockland: Syngress, ISBN   1597491330
  13. Bowker, Art (2012), The Cybercrime Handbook: Managing Offender Risk in the 21st Century, Springfield: Charles C. Thomas, ISBN   9780398087289
  14. Todd G. Shipley and Bowker, Art (2013), Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace, Syngress, ISBN   9780124078178
  15. Todd G. Shipley and Bowker, Art (2013), Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace, Syngress, ISBN   9780124078178
  16. Robert Taylor, Tory Caeti, D. Kall Loper, Eric Fritsch, and John Liederbach (2005). Digital Crime and Digital Terrorism, Prentice Hall, ISBN   0131141376
  17. "Home". htciaconference.org.