Maine Computer Crimes Task Force

By Webber, Michael | Law & Order, May 2002 | Go to article overview

Maine Computer Crimes Task Force


Webber, Michael, Law & Order


Cybercrime can be divided into two categories: traditional crimes and network crimes. Traditional crimes are threats- child pornography, fraud, gambling, extortion and theft of intellectual property- and all are migrating from the physical to the online world. This migration into the Internet frontier is occurring because criminals are realizing that they can reach more victims quickly, collaborate with other criminals and use the global nature of the Internet to remain relatively anonymous.

The Internet has also spawned an entirely new set of criminal activity that targets computer networks. Included among network crimes are hacking, releasing viruses and shutting down computers by flooding them with unwanted information. Our vulnerability to, and the damages caused by, this type of crime is incredibly high.

Cybercrime is a real and serious threat. Its complexity and constant progressive nature present tremendous challenges to law enforcement. Solutions to these challenges require novel approaches and close teamwork among agencies and with the private sector. There also is an urgent requirement for highly trained officers, armed with the right investigative tools and equipment, to gather, process and analyze data from computers and networks to acquire critical intelligence and evidence of criminal activity.

In addition to traditional investigative skills, cybercrime investigators must be well versed in the intricacies of technology to ensure that evidence is not lost or overlooked. Forensic experts must know how to handle electronic evidence to protect its integrity for later use at trial, as well as how to recover and analyze digital evidence from computers with hard drives that store gigabytes of data. And prosecutors must understand the jargon and complexities of high-tech crimes and be able to translate technical evidence into a form understandable to a judge and jury.

Today, special units and task forces are springing up across the county to battle the growing problem of cybercrime. Formed in 1999, the Maine Computer Crimes Task Force is just one of approximately 75 special law enforcement units throughout the United States making significant headway in tracking and bringing online criminals to justice.

Based in Lewiston, ME, the fourmember task force is a collaborative effort of the Northern New England Internet Crimes Against Children Task Force (Northern New England ICAC) and the National Center for Missing and Exploited Children. Its role is to focus on the emerging field of computer crimes investigations, electronic evidence recovery and forensic data analysis. In addition to investigating cybercrime originating in the state of Maine, the task force works closely with the New Hampshire State Police and the Chittendon, VT, Unit for Special Investigations.

The task force moves into action when it receives Internet-related complaints either via the tipline on its Web site or from other members of the law enforcement community. Force investigators then go online to track the physical location of the server on which the material in question is stored. Obviously, the location of the server determines which agency will investigate the complaint. When particular Web sites, such as those involving the trafficking of child pornography or fraud, fall outside of their jurisdiction, the Maine task force investigators relay their findings to counterparts in the appropriate jurisdiction.

The types of cases investigated by the Maine Computer Crimes Task Force are almost as diverse as the Web sites on the Internet itself. For homicide cases involving online activity, it is often necessary to perform a forensic analysis of e-mail messages and to conduct Web searches to determine whether the crime may have been premeditated. For cases involving e-mail threats, senders often use accounts established with providers such as Yahoo! and Hotmail, thinking that these accounts provide complete anonymity. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Maine Computer Crimes Task Force
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.