{"id":692,"date":"2022-03-21T11:09:56","date_gmt":"2022-03-21T10:09:56","guid":{"rendered":"https:\/\/www.susii.nrw\/prevention\/preservation-of-evidence-cybercrime\/"},"modified":"2022-04-22T10:14:41","modified_gmt":"2022-04-22T08:14:41","slug":"preservation-evidence-cybercrime","status":"publish","type":"page","link":"https:\/\/www.susii.nrw\/en\/prevention\/preservation-evidence-cybercrime\/","title":{"rendered":"Preservation of evidence cybercrime"},"content":{"rendered":"\n<p class=\"has-text-align-center su-page-intro has-black-color has-text-color\">Preserving evidence helps law enforcement identify the perpetrators.<\/p>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-person su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6920\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Inform system administrator<\/h2><div id=\"ac-6920\" class=\"c-accordion__content\">\n<p>If you find a virus or Trojan on your company computer, you should immediately inform your system administrator and disconnect the device from the network.&nbsp;<\/p>\n\n\n\n<p>If you do not report the incident internally, your company is at risk of further damage, which you are usually unable to assess.&nbsp;<\/p>\n\n\n\n<p>Viruses and Trojans can spread from your device to other devices and, for example, forward company data to third parties.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-search su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6921\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Check system, determine damage<\/h2><div id=\"ac-6921\" class=\"c-accordion__content\">\n<p>Businesses and individuals should perform a detailed system scan after a virus and Trojan detection on your network and determine if other devices are also affected.&nbsp;<\/p>\n\n\n\n<p>If you do not have the appropriate know-how internally, get external help, e.g. via specialized experts from your anti-virus vendor or a provider specializing in computer forensics.&nbsp;<\/p>\n\n\n\n<p>Pay particular attention to whether the viruses or Trojans have infected systems with sensitive data or services. This includes business and customer data, possible patents or control systems in production.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-pan-tool su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6922\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Do not remove viruses and Trojans on your own!<\/h2><div id=\"ac-6922\" class=\"c-accordion__content\">\n<p>Do&nbsp;<strong>not make any independent attempts<\/strong> &nbsp;to remove the malware at first. Only in this way is it possible for the police to secure evidence and initiate investigations.&nbsp;<\/p>\n\n\n\n<p>The police experts will give you further recommendations for action and advise you whether additional external experts need or should be involved.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-save su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6923\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Secure evidence<\/h2><div id=\"ac-6923\" class=\"c-accordion__content\">\n<p>Depending on the facts of the case, such as online fraud, other measures are necessary to preserve evidence.&nbsp;<\/p>\n\n\n\n<p>&#8211; Make printouts of the order correspondence.&nbsp;<\/p>\n\n\n\n<p>&#8211; Save possible chat logs, e.g. via screenshot or take a picture of the screen.&nbsp;<\/p>\n\n\n\n<p>&#8211; Back up existing log files, e.g. from the server or browsing history.&nbsp;<\/p>\n\n\n\n<p>&#8211; Consult with the police if you are unsure or need general assistance!&nbsp;<\/p>\n\n\n\n<p><strong>NOTE:<\/strong> Please be aware that if you back up child or youth pornographic material, you may be liable to prosecution yourself. In principle, the mere storage of evidence material for the sole purpose of handing it over to the police is not questionable. However, in any case, consult with the police and, if necessary, with a lawyer beforehand.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-save su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6924\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Preservation of evidence by the police<\/h2><div id=\"ac-6924\" class=\"c-accordion__content\">\n<p>Law enforcement agencies are able to preserve evidence in a way that has little or no impact on ongoing business operations at companies. In addition, there is also the possibility of real-time analysis in operational mode.&nbsp;<\/p>\n\n\n\n<p>Law enforcement agencies can also secure on-site evidence that is only accessible on the Internet (email servers, cloud storage, web servers).&nbsp;<\/p>\n\n\n\n<p>Confiscation of servers or computers does not usually take place. The focus is always on ensuring the company&#8217;s ability to operate.&nbsp;<\/p>\n\n\n\n<p>Law enforcement agencies are instructed to investigate on a case-by-case basis and only preserve evidence that is directly related to the online crime.&nbsp;<\/p>\n\n\n\n<p>Compliance with data protection principles in data processing, such as data economy, purpose limitation and necessity, applies.&nbsp;<\/p>\n\n\n\n<p>Disclosure of company data does not usually result in seized evidence, e.g. to the tax office or customs, or video or music collections being checked for copyright infringements.&nbsp;<\/p>\n\n\n\n<p>After consultation with the injured parties, external IT experts often also help with the preservation of evidence.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-link su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-6925\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Related links<\/h2><div id=\"ac-6925\" class=\"c-accordion__content\">\n<p>BSI f\u00fcr B\u00fcrger:&nbsp;<a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Leitfaden_IT-Forensik.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">BSI Leitfaden IT-Forensik<\/a><\/p>\n\n\n\n<p>TeleTrust.de&nbsp;<a href=\"https:\/\/www.teletrust.de\/veranstaltungen\/it-forensik\/\" target=\"_blank\" rel=\"noreferrer noopener\">Informationstag &#8220;IT-Forensik mit hilfreichen PDFs<\/a><\/p>\n\n\n\n<p>Polizei-praevention.de:&nbsp;<a href=\"http:\/\/www.polizei-praevention.de\/themen-und-tipps\/ihr-weg-zur-strafanzeige.html\" target=\"_blank\" rel=\"noreferrer noopener\">Informationen zur Online-Strafanzeige<\/a><\/p>\n\n\n\n<p>Computerstrafrecht.info:&nbsp;<a href=\"http:\/\/blog.computerstrafrecht.info\/it-forensik\/\" target=\"_blank\" rel=\"noreferrer noopener\">Was ist IT-Forensik?<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Preserving evidence helps law enforcement identify the perpetrators.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":691,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/692"}],"collection":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":2,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/692\/revisions"}],"predecessor-version":[{"id":776,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/692\/revisions\/776"}],"up":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/691"}],"wp:attachment":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/media?parent=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}