Victim Identification Flashcards
Describe fully the ABC methodology of victim identification analysis
“Content – actual contents of picture
Metadata – file exif data, structure, file name
Collection – context of where images found”
Describe why Victim Identification investigations can be described as more important than capturing those who distribute or possess CAM?
Used as prevention. If contain abuse material, its likely that they’ll be subject to offending
List four basics that should be in place to ensure your machine is secure
“a. Anti-virus
b. Updated operating system
c. Firewall
d. Anti Malware Updates on applications”
Online Investigations can be broken into three distinct types. Name them and give a brief overview of each one.
“a. Overt: open and observable
b. Covert: secret/hidden, hiding function, origin and intention
c. Undercover: secret/hidden, to hide and protect ID, function, origin and intention, only accredited personnel “
What are the basic principles that must be in place before attempting an online investigations?
”
a. Protect yourself and your organisation
b. Understand your limitations
c. Be qualified or allocated
d. Record, Record, Record
e. Be Forensic. “
Briefly explain DCC and why is it an excellent policing tool
Direct client to client connection. Don’t have to connect to IRC to connect client to client. Can share files without connected to serveSocial Networks have made changes over the last number of years to make their systems less likely to be used by sex offenders to find victims. List two of these and outline why they have made a difference
Social Networks have made changes over the last number of years to make their systems less likely to be used by sex offenders to find victims. List two of these and outline why they have made a difference
“a. Search for people by age Search for people by region
b. Pushing for real name Cross referencing with open sex offender register”