FREE e-Newsletter
Important News - Hot Topics
Get them Now!

Cobalt Software Platform - Mark43
Mark43's Cobalt software platform unites a set of law enforcement tools securely...


6 Key Findings of Incident Reporting

Brought to you by:

Register now!

Thursday, December 13, 2018 -- 11:00 AM PT/2:00 PM ET

An exceeding number of police departments and law enforcement agencies, whose officers spend upwards of 3-4 hours a day completing incident reports and other time-sensitive paperwork*, are turning to smarter tools, such as speech recognition solutions, to help transform their police reporting workflows.

Join us on Thursday, December 13, 2018 at 2:00 PM ET to hear why these law enforcement professionals are embracing smarter tools to complete higher-quality reports and move mission-critical information within the CAD/RMS faster and more efficiently – all by voice.

This discussion will provide you with an understanding of:

  • What law enforcement has to say about current reporting processes
  • Why officers, especially recruits, want smarter tools to help with police paperwork
  • Why manual reporting has a negative impact on report accuracy and productivity and can hinder criminal proceedings
  • How departments can speed up data entry within the CAD/RMs and move mission-critical information more accurately and efficiently
  • How speech recognition technology can help increase officer safety and improve situational awareness and productivity on patrol
  • Why embracing smarter technology increases community visibility, and minimizes costs

Learn how your department can make incident reporting faster, safer and more complete by registering for our webinar today.

*Role of Technology in Law Enforcement Paperwork Survey 


Eric La Scola, Product Marketing Manager, Dragon, Nuance

Register now!

Demystifying the Convergence of LTE and LMR Networks for First Responders

Brought to you by:

View now!

Originally aired: Thursday, December 6, 2018 -- 11:00 AM PT/2:00 PM ET

Narrowband Land Mobile Radio (LMR) networks and user radio equipment have been the cornerstone of mobile communications for First Responders for decades. The trend from traditional analog to more robust wireless broadband networks in recent years has improved the overall accessibility but questions remain on whether the new networks can provide all the required capabilities First Responders need to do their job.

Increasing demand for bandwidth intensive applications such as video, advanced mapping and analytics, alongside critical voice communications has been driving adoption of broadband LTE cellular networks, such as FirstNet.

Join our panel of industry experts for this insightful 60-minute on-demand webinar as they discuss the critical differences between LMR networks and LTE networking, how these technologies can successfully co-exist, and explore the future of critical communications for First Responders.

In this session, you will learn:

  • Current and future industry trends for LTE and LMR technologies
  • Challenges and obstacles with the convergence of technologies
  • Real-life examples of successful hybrid communication strategies for First Responders
  • Recommendations for future proofing your agency; adoption of new technologies and how to bridge the gap


Tony Morris, VP North American Sales, Enterprise Solutions, Sierra Wireless

Jesus Gonzalez, Analyst II, Critical Communications, IHS Markit

Ken Rehbehn, Principal Analyst, Critical Communications Insights

Andrew Seybold, Senior Partner, Andrew Seybold Inc.

Cover Story

How To Investigate Cybercrime

Tracking bad guys on the Net takes the experience of a detective and the know-how of a tech head.

November 01, 2003  |  by - Also by this author

Back when the term “computer” meant mainframes and reel-to-reel tape drives, computer criminals were masterminds who used their programming talents to glean millions of dollars from banks and corporations. These crooks were so ingenious in their schemes that many banks and corporations cut deals to hire them as security consultants rather than send them to prison.

Today, the average desktop workstation has all the computing power of one of those old mainframes, the average American home has at least one computer, and computer criminals are no longer masterminds, just crooks and creeps doing what crooks and creeps do. Today and every day, thousands of people worldwide are being victimized by computer crime. That’s why just about every major municipal or county law enforcement agency in the United States now has a new breed of detective: the computer crime or “cybercrime” investigator.

It’s easy to pinpoint the reason why cybercrime has statistically exploded since the mid-1990s. Just about every computer on Earth is now connected via a once obscure research tool called the Internet. Once derided as a passing fad and the CB radio of the ‘90s, the Internet and its graphic component the Worldwide Web have become so prevalent since 1995 that they have altered almost all fields of human endeavor, including crime.

If it were possible to murder someone by sending computer code across the Internet, people would do it. After all, they commit just about every other type of crime via the computer. Name a form of theft, fraud, or exploitation, and it is probably now being perpetrated or abetted by computer. The computer crime hit parade includes distribution of child pornography, credit card fraud, industrial espionage, harassment, breaking and entering (hacking), solicitation of prostitution, conspiracy, child molestation (“traveler” cases), malicious mischief, and property destruction (viruses), and that barely scratches the surface.

So the need for cybercrime investigators is indisputable. But how do you go about transforming yourself into a cybersleuth?

Getting Started

Contrary to public perception, most cybercrime investigators are not propeller head geeks who spend all of their time on the Net, nor are they black-suited guys in sunglasses whose first name seems to be “special” and last name “agent.” A lot of the best cybercrime investigators are just local detectives who have branched into a new field.

Slomo Koenig, a detective with the Rockland County (N.Y.) Sheriff’s Department, has been working as a cybersleuth and computer forensics expert since 1997, and he believes any experienced investigator who is not afraid of technology can become an excellent computer crimes detective.

“I can teach a good detective how to investigate computer crime much faster than I can teach a computer guy to become a good detective,” explains Koenig. “If you already have good investigative skills, then all I have to teach you is what is considered evidence in the digital world, how you can contaminate that evidence, and how you preserve that evidence. But if you don’t understand what evidence is or how to go about conducting an investigation, then that makes the job a lot harder.”

Koenig’s comment shouldn’t be construed as a license for detectives without special training to start working cybercrimes. There are some basic skill sets you will need before you can start chasing evildoers on the Internet.

“You have to have a thorough understanding of how the technology works,” says Sgt. Ronald Levine of the Foothill-DeAnza College District Police Department in Los Altos Hills, Calif. “If an officer or deputy doesn’t have computer skills, they’re going to have to come up to speed and understand how the technology works before he or she can become an effective investigator,” adds Levine, who has been involved in computer crime investigation since the early 1980s.

Going After ‘Em

The typical cybercrime investigation begins like most other investigations with a citizen complaint. Perhaps a local individual has been defrauded of several thousand dollars on an Internet auction site, and he or she contacts your agency.

Your first step in such an investigation is to find the Internet protocol (IP) address of the individual who defrauded the citizen who filed the complaint. An IP address is a series of numbers and letters that is attached to every piece of data that moves on the Internet. When the auction crook set up his or her auction, that code was registered with the auction company.

Big dot-com companies like Web auction sites have their own security specialists. So once you have identified the host of the auction site, you will probably work with the company’s security people to gain access to the IP address of the Internet Service Provider (ISP) used by the person who set up the bad auction. They may cooperate fully, or you may need a subpoena, warrant, or court order just for the IP address.

Anyone who has an Internet account knows that the ISP is a subscription service that grants the user access to the Internet. What most people, including many crooks and cops, don’t know is that ISPs have records of everything a subscriber does on the Internet.

That’s the good news for investigators. The bad news is that the records are digital information with a very finite existence. In other words, if you’re investigating a cybercrime involving the Internet, you better move fast.

How fast depends on the policy of the ISP in question. Large ISPs often keep their data for as much as 30 days, but that’s not true in all cases. Data storage is a major cost center for ISPs, and some save money by dumping the data very quickly.

“There’s no law that requires people to maintain the data,” says Koenig. “Once we sent a subpoena to an ISP, requesting their records, and their answer was, ‘Sorry. We only keep our records for 30 minutes.’”

Because ISPs would rather dump data than store it, Koenig says one of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data until the investigator can secure a subpoena, warrant, or court order requiring the ISP to turn over its records.

The preservation letter does not legally require the ISP to turn over its records. But many ISPs will cooperate with a request to preserve data.

Once you get the records from the ISP, you’re probably in business. In order to subscribe to the service, the auction thief had to give personal information like his or her physical address. Yes, they can use false information and fake credit cards, but even that information can be valuable.

Here or There

When you have an address and a name for the suspect, your investigation is likely to involve another agency. Cybercrimes are not like in-person physical crimes. The victim is often in another state from the suspect. And that means you may work for the Dallas Police Department and suddenly need to serve a warrant in Reno.

Experienced cyber police say that jurisdictional disputes are rare occurrences during cybercrime cases and that other agencies are likely to cooperate with your investigation.

Comments (15)

Displaying 1 - 15 of 15

new learner @ 11/11/2011 9:16 AM

Well i m working on a live case which is abt some money its a cyber crime

and this knowledge is very much nice for learner good one and plz provide me some more information plz

ladu.jackson @ 4/25/2012 10:30 AM

i need to know cyber crime work, its importance, how to carry cyber crime investigation and how to implement cyber crime in a developing country, some evidence of cyber crime investigation

BAFANA LEPOTA @ 10/5/2012 3:09 AM


louis @ 10/22/2012 2:16 AM

Id love to an investigator

don fox @ 7/26/2013 2:37 AM

my colleague at work and my son some 8000 miles and my wife have received maliceous e mails about me from a false e mail address. these accusations are so bad it has caused a break up of our marriage, AND they are all false

don fox @ 7/26/2013 2:40 AM

How can i track this person . one email from a non existing Yahoo acount , another who have used a large company in states and another ( same person ) from the netherlands

US. (INDP) AGENT:TK, STRI @ 3/20/2014 7:57 PM

Not at this point and time!......

Lyn @ 3/28/2014 9:59 AM

Been harrassed for 3 months now, emails constantly accessed, had to request new PW for mails, credit card, ebay. etc. opend new e-mail but mysteriously closed. Cellphones accessed & controlled with security pin . Calls can be cut or re-routed. My no. was even changed but provider has no explaination. Frustrating, what advice do you have for this. Law enfrcement says "no economic loss" so no help yet!

WILLINGTON @ 8/14/2014 2:23 PM


ramkumar bista @ 9/19/2014 1:28 AM

been im facebook user and in my friend facebook he receive bad massage regarding my wife continously change name and id and send bad can i catch that person?he send message to my friend taking name of my wife but he dont send me any message.please help me to catch that person.his name in facebook sometime sudip rai,sometime gopal rai and some time in this same way other name but the personm is whoever but same.plz send me clue by mail to catch that name

susanta kumar parida @ 10/3/2014 6:17 PM

Sir, How I can detect a person using fake ID in faced book by making so in the name of another person. Please give me your valuable suggestion that how that person can be identified or nabbed.

Christina @ 9/24/2015 2:13 PM

My daughter is being harassed on Instagram. They keep creating fake profiles and saying horrific things to her. We are pretty sure they are students from the private school that she used to attend. I would like to get the law involved, how do I go about that?

Ryan @ 9/25/2015 6:19 PM

@Christina try using this website

Noelia Mata @ 4/11/2016 1:47 PM

I desperately need help it involves the security system of military officials that may have been compromised I have been frauded and am afraid if my safety! Please help me figure out or tell me if whom I can speak to in regards to this issue. Thank you

Amy bauer @ 4/11/2016 5:29 PM

My grand daughter is beefing bulled from a phony Facebook account and a false phone number. Who can help find the really person.

Join the Discussion

POLICE Magazine does not tolerate comments that include profanity, personal attacks or antisocial behavior (such as "spamming" or "trolling"). This and other inappropriate content or material will be removed. We reserve the right to block any user who violates this, including removing all content posted by that user.
Police Magazine