Defintions Flashcards
Account Takeover
Means when a trained internet investigator (level 3 or higher) assumes the Social Networking account of another person for the purposes of capturing evidence
Communication based application
means a category of systems whose main purpoose is to communicate using text, audio, and video messages. The most common tools are email, chat, and messaging applications. This does not include social media platforms which offer direct messaging services
Covert Device
means a compuer, laptop, hand held device, etc. that is nonattributate to York Regional police or information technology (it) Bureau through purchase or support and does not contain any YRP -specific documents or files. A covert device does not include a personally owned device
Cybercrime
There are two parts
means a criminal offence, which is committed through the Internet and/or utilizing technology such as computers, tablets, personal digital assistants, or mobile devices. Cybercrime is divided into two categories
a.) Technology-as-Target - criminal offenses targeting computers and other information technologies, such as those involving the unauthorized use of computers or mischief in relation to data (i.e., computer hacking, defacing websites, ransomware)
b.) Technology-as-Instruments/Technology-as-Tool - criminal offences where the Internet and information technologies are instrumental in the commission of a crime, such as those involving fraud, identiy theft, intellectual property infringements, money laundering, drug trafficking, human trafficking, organized crime or terrorist activities, child sexual exploitation or cyber bullying (i.e. harassment through email or social networks, fraud over the internet)
Internet investigator
means a Police Officer, Crime Analyst, Computer Forensic Examiner, or a Civilian member that has the required training as determined by the Technical Investigations unit Cybercrime Section to conduct an internet investigation
Open Source Search
means information and/or evidence that is obtained from publicly available sources on the internet, using available search engines and social media websites.
Online Engagement
means when an internet investgator trained in conducting a covert internet investigation uses an online covert profile/account to message, befriend, or add contacts, for the purposes of gaining information and furthering / initiating an online relationship, etc. Online engagement does not include using communication based applications.
Passive Online Engagment
Means when a internet investigator trained in conducting a covert internet investigation uses an online covert profile/account to only befriend or follow another person in order to obtain access to their public information without any interaction with the subject
Cybercrime unit will take primary lead in investigations where
- Technology as target attacks to region of York critical infrastructure
- Ransomware attacks and data breaches to medium and large size businesses (greater than 100 employees)
- Pure Cybercrime Criminal Code investigations (ie. Mischief to data or unauthhorized use of a computer)
Level 1 - Worked related - General internet inquiry
a. There is no Online Engagement at this level
b. No social media investigations shall be conducted at this level
c. Level 1 inquiries consist of the use of a YRP Workstation or Communication device connected to the YRP network to complete day-to-day as outlined in procedures AI-308 information technology, use of technology and responsible internet use and AI-319 telecommunication devices.
d. A member may communicate with a subject(s) on the internet on behalf of YRP and is expected to openly identify that they are YRP employee (ie. email)
e. Members may conduct general internet searches utilizing search engines such as Google, phone directories and mapping programs.
f. When a member locates information which should be captured for evidentiary purposes, they should consult with a level 2 Internet investigator or the Technical investigations unit Cybercrime section to ensure the digitial evidence is captured properly
g. No specialized training is necessary to utilize a YRP Electronic device for day to tday operational requirements.
Level 2 - Open Source Search
a. Only Passive Online Engagement is allowed at this level
b. An open Source Search shall be conducted in a professional and lawful manner while ensuring that an individual’s and group’s civil rights, and civil liberties are protected.
c. to perform a level 2 open source search, members must be a designated internet investigator
Any Open Source Searches must be conducted using a covert device and Internet connection which is not attributable to the YRP network. The connections to the internet must utilize a VPN, Proxy, or covert internet connection as approved by the Technical Investigation unit.
Level 3 - Account Takeover - No Engagement
a. There is no Online Engagement at this level. An Account takeover with online engagement is considered a Covert internet investigation
b. Level 3 account takeovers are an approved investigation by an internet investigator who assumes a users internet profile for the purposes of gathering information and/or evidence through informed consent, judicial authorization, and any other lawful means.
c. An account takeover shall only be conducted by a Technical investigations unit member, a member of Internet child exploitation section who has received the required training, or a qualified level 3/4/5 internet investigator under the guidance of the technical investigations unit Cybercrime section.
d. All account takeovers must be conducted using an approved non-government electronic device and the internet connection shall not be attributable to the YRP network. The connections to the internet must utilize a VPN, proxy, or covert internet connection as approved by the Technical investigations unit Cybercrime section.
Level 4 - Covert Internet Investigation (Online Engagement)
a. Covert internet investigations are an authorized Online Engagement by a trained Undercover internet investigator who uses a covert internet identity or profile to engage a subject online regarding an investigation. These investigations shall be conducted in accordance with procedure LE-306 Undercover investigations.
b. The undercover internet investigator must be sworn YRP member who is designated pursuant to the criminal code Section 25.1
c. The investigation must be approved by a Supervisor within the Technical investigations unit and the Officer in charge of the Bureau/ Unit responsible for the investigation.
d. Online engagement does not include communication based applications
e. Any covert internet investigations must be conducted using a covert device and the internet connection is not atributable to the YRP network. Thhe connections to the internet must utilize a VPN, Proxy, or covert internet connection as approved by the Technical investigations unit Cybercrime section
f. This does not include use of a covert device to maintain an online undercover identity
Level 5 - Covert operation (undercover & online engagement)
a. An authorized Covert Operation shall be conducted by a trained undercover internet investigator who establishes and/or maintains a relationship online and conducts traditional undercover operations with a subject for a particular investigation that potentially may involve voice, “face to face”, or other contact between the undercover officer and a subject. These investigations shall be conducted in accordance with procedure LE-306 Undercover investigations
b. The undercover internet investigator must be a sworn YRP member who is designated pursant to the Criminal Code Section 25.1
c. The covert operation shall be approved by a Supervisor within the Technical investigations unit and Officer in charge of the Bureau/Unit responsible for the investigation
d. There shall be an undercover handler assigned to the investigation
e. Any covert operations shall be conducted using an approved covert device and the internet connection is not attributable to the YRP network. he connections to the internet must utilize a VPN, proxy, or covert internet connection as approved by the Technical investigations unit Cybercrime Section.
mischief to data Section 430(1.1).
In the Criminal Code of Canada, the term “mischief to data” is covered under Section 430(1.1). It refers to the act of willfully destroying or altering data, rendering data meaningless, useless, or ineffective, or obstructing, interrupting, or interfering with the lawful use of data or with any person’s lawful use of data.
To summarize:
Destruction or alteration: Intentionally destroying or altering data in a way that makes it unusable or ineffective.
Rendering data useless: Doing something to data that makes it meaningless or unusable.
Obstruction or interference: Preventing or hindering someone from lawfully accessing or using data.
These acts are considered a form of mischief, similar to damaging physical property, but applied to data in a digital context.