Computer Crimes Investigations
Computer Crimes Investigations
Cyberstalking is a computer crime of application of the internet or electronic to harass a person, a group, an organization which can include sending threatening emails. According to the case, investigations were done to bring the culprits to the law for the cyber-crime they committed. Some of the crimes that were investigated in this case include hacking private accounts and posting pornography photos(Barry, 2013). One of the methods used to investigate the cyberstalking crimes is the use of forensic science investigations to get the evidence required. Western Digital Caviar Blue, Hard Disk Drive which is installed on the computer in which the folder is navigated to get the proof of the files that had the nude photos.
The personal information of the cyber stalkers using the files such as dates of birth can be used to access the information that is believed to be the evidence. The investigator should acquire the volatile data from the network connections, the ARP cache, the login sessions of the individual and the information in the Random Access Memory. Once the data has been retrieved, it has to be retrieved should be verified to have the right culprit to face the law (Barry, 2013). The data that is obtained is then analyzed by using the forensic knowledge to determine the details of the acts committed by the individual. The details of the crime may include the date and the location at which the action took place.
Forensic science significantly contributes to the prevention of the cyber-crimes that are committed by the computer criminals. The investigations should be carried thoroughly to bring the culprits to the law since eth cases of cybercrime have increased in the world. Training also should be provided to the individuals, to the groups, and to the organization management to create awareness of the threats they may face from cyber-crime in the society.
Apply the George Samuel Bronk cyberstalking case to the following:
Complete the following table to outline your responses.
|Explain the five steps required to conduct a cybercrime investigation.||Define three to five common terms and concepts used for cybercrime investigations that apply to this case.||Describe three to five types of electronic evidence that must be gathered.|
|1. The first step of carrying the computer crime investigation is verification of data. The investigator should carry out the step to determine the characteristics of the incident to collect enough evidence.||1. The first term mostly used in cybercrime investigation is cybercrime. Cybercrime refers to the crimes that are committed using information and communication technology for financial gain.||1. Computer documents are one of the electronic evidence that can be collected during investigations.|
|2. The step of system description involves gathering data about the particular occasion. In this step, an operating system is identified that will be used to verify the information||2. Information Age Forensic is the field in the cybercriminal and digital forensic investigations. The field is helpful in making the analysis of the data collected to come up with the evidence.||2. Emails are also a source of investigation evidence that is collected using electronic devices.|
|3. Evidence acquisition is the step in which the investigator acquires the volatile and non-volatile data(Barry, 2013). The data is then verified the integrity and come up with information on the culprit of the crime.||3. The Cyber stealth is an investigation concept that is used to determine the method that can establish and complete the target of the crime (Dreßing, et al., 2014). The users of||3. Images which are a source of evidence can be gathered electronically. In this case, the pornographic images can be viewed to produce the required evidence.|
|4. The evidence that is collected is then analyzed in the forensic lab which will explain the time of files modification, accessed and created in a readable format.||4. Malware is the malicious software such a virus that is used to attack another computer or system. Hackers use the programs to destroy other people’s information. Individuals have suffered the effect of malware in which the accounts such as Facebook accounts which has been attacked by criminals.||4. Finally, the internet histories which keep the record of the information can be obtained electronically to gather the evidence that is required for the judgement (Vacca, (2005).|
|5. After the analysis the results are released in which the actions performed are reported and also the recommendations are made on the guidelines and procedures to curb the cases of cybercrime(Barry, 2013). In this case, the analysis was done and the criminals faced eth law according to the cybercrime they had committed.||5. Cyber bulling is the act of harassing other people in the internet. The bullying can involve using the social media to pass threatening information to the other person.||5.|
Barry Chen. ( March 13, 2013). Computer Forensics in Criminal Investigations. Retrieved from: http://dujs.dartmouth.edu/2013/03/computer-forensics-in-criminal-investigations/#.WWoe3LZRVdghttp://dujs.dartmouth.edu/2013/03/computer-forensics-in-criminal-investigations/#.WWoe3LZRVdg
Dreßing, H., Bailer, J., Anders, A., Wagner, H., &Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior, and Social Networking, 17(2), 61-67.
Vacca, J. R. (2005). Computer Forensics: Computer Crime Scene Investigation (Networking Series)(Networking Series). Charles River Media, Inc..