CHAPTER 61

WORKING WITH LAW ENFORCEMENT

David A. Land

61.1 INTRODUCTION

61.2 RELEVANT LAWS

61.3 PLAN AHEAD

61.3.1 Federal Bureau of Investigation

61.3.2 U.S. Postal Inspection Service

61.3.3 U.S. Secret Service

61.4 MEMORANDUM OF AGREEMENT

61.5 HANDLING EVIDENCE AND THE CHAIN OF CUSTODY

61.6 ISSUES OF LIABILITY

61.7 ASK LAW ENFORCEMENT TO GIVE BACK

61.8 THE KNOCK AT THE DOOR

61.9 KEEPING YOUR OPERATION RUNNING DURING AN INVESTIGATION

61.10 NONELECTRONIC RECORDS AND THE INSIDER THREAT

61.11 INFORMATION SHARING (THE HUMAN FACTOR)

61.12 CONCLUSION

61.13 FURTHER READING

61.14 NOTES

61.1 INTRODUCTION.

Today, working with law enforcement is likely one of the most important aspects of computer security, and of our collective need to protect our sites and our sites' information. The entire paradigm has shifted to one where you will need law enforcement, and they will most certainly need you. In times past, however, this was not the case. Understanding their needs before, during, and after the commission of a crime significantly enhances your organization's opportunity to come back online quickly, with, it is hoped, little or no disturbance to your users or customers. Likewise, conveying your needs to law enforcement prior to an incident will serve you well later on. Working with law enforcement is, however, not your opportunity to assume the role of law enforcement. You must know your limitations and at what point to engage your law enforcement contacts.

Most organizations, whether they ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.