Cyber Crime Investigation Essay

Great Essays
As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information.
This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.
…show more content…
A piece titled “Protecting digital data privacy in Computer Forensic Examination,” explains how multiple parties are affected by investigations, “There are instances when investigation is required on a corporate email server. The email server only contains a small portion of emails that are related to the investigation subject but the process allows the digital investigator to access millions of emails which are not related to the case. Regardless of the investigator focusing on email messages… there may be occasions during which other messages are read by the investigator.”(Law, …show more content…
As we have learned, there are many instances in which investigating authorities will collect information that not related to the case. “With the advent of computer forensic tools, it is also simple to search and locate specific data sets, such as emails, credit card numbers, passport numbers, telephone numbers, identity card numbers, photographs, videos etc.” (Law,

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The advancement of forensic science has progressed immensely since its conception. The contributions it has made for the legal system are immense. One such example are its techniques used to extract DNA during forensic cases. DNA is considered to be one of the most well regarded and highly assessed sources of information (Gershaw et al., 2010). Another important development used during investigations is CODIS or the Combined DNA Index System.…

    • 1040 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    This incorporated the intention to make sure that the tools and facilities are located to make sure that the data is collected properly and that the employees of the GCU are trained so that any evidence collected and stored is carried out in a way that will make it permissible in any legal or internal disciplinary proceedings. They must decide the prerequisite on how it is confirmed that they will meet unobstructed with the organization process of the GCU, an orderly process that confirms that the capacity can completely reduce the expenses and time of an internal examination, as a way in which GCU deals with confirms the ability can decrease the expenses of any affidavit requested by the court or the administrator or the legitimate need to disclose the information. Evaluate evidence collection and how the organization will handle the following two questions: 1. Can the evidence be gathered without interfering with…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In a homicide investigation, there are many factors which may impact the likelihood of a successful case. In order for a suspect to be convicted on trial, investigative processes must be followed that involve several imperative elements. However, sometimes these procedures aren’t followed and it is in these circumstances that major errors and flaws in the inquiry process are exhibited. It is then due to this that recommendations and frameworks must be created in order to avoid such weaknesses in future cases. Although, sometimes extrinsic factors, such as the influence of the media, may also impact the outcomes of such cases.…

    • 1989 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Secondly is to protect and secure the useful promising information that is relevant to the computer. An investigator should ensure that no available evidence are damaged, destroyed, or contaminated, and no possible computer virus is brought in to the suspect computer during the forensic inspection. Information represented by physical items, such as computer hardware and printed files, can be described easily by correctly following traditional physical evidence procedures. The actual challenge comes from acquiring evidence stored in these physical items, such as hard drives, CDs, DVDs, zip disks, or floppy disks. All data residing in the suspect computer’s hard drives and disks need to be protected from any potential evidence and this has…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    However, there are several challenges to the digital forensic investigative process that make the investigation process susceptible to incongruities, particularly during the legal process. There are several proposals that are considered to improve the digital forensic investigation process but essentially, to avoid massive attacks such as the ones these companies have faced, companies to need be proactive in their attempts to combat malicious activity in their digital environments. Background In 2001, the Digital Forensics Research Workshop (DFRWS) established a formal definition of digital forensics. This definition is noted in the conference report drafted by Gary Palmer as:…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The Office of Personnel Management reported individual information on 21.5 million people was bargained by the hack of the organization's examination database called e-QIP. OPM's endeavors to settle vulnerabilities in the framework used to oversee foundation examination information, known as Electronic Questionnaires for Investigations Processing (e-QIP). However, the recuperation on these individual’s information will forever be lost. In the domain of cybersecurity, the government houses information related to national security that follow cyber ethnics and the government is morally obligated to secure online database environments. Establishing polices relating to cyber ethical values include cyber incident complications immediately to all affected users.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    Criminal Law Concepts

    • 156 Words
    • 1 Pages

    CJ 205-Criminal Investigation Principle. Pearson Custom Edition ed. New York, NY: Pearson Learning Solutions, 2014. Print.…

    • 156 Words
    • 1 Pages
    Brilliant Essays
  • Improved Essays

    Computer Forensics uses different command and tools to find out all that they need to know or want to know. The police are not allowed to search anyone’s electronic devices unless they have a warrant to search, but I’m sure that it happens…

    • 720 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybercrime In Canada

    • 546 Words
    • 3 Pages

    In Canada to strengthen the security of already existing law and electronic devices vivid kinds of tools are being used. To implement national and international responses to collect electronic evidence in cybercrime activities Canada using wide range of tools. Following are the important national and international tools: [4] International Tools: United Nations Convention against transnational organized crime: This instrument came in to effect on 25th of December 2003. It is one among the major international instruments in action counter to transnational organized crime. The code of the tool is to hinder, abolish and punish trafficking in persons, exclusively women and children.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Loss Of Evidence

    • 1706 Words
    • 7 Pages

    My opinion has been that the intellectual property infringement which is on the rise globally must be dealt, and suspects must be prosecuted. This could be achieved by having private experts and law enforcers working together. I always recommend that forensic experts should involve law enforcement in a situation where search warrant and arrest warrant are necessary. I believe by having computer forensics expert witness working with police, they can make a lot of difference in the admissibility and acceptance of the evidence in the court of law in the cases of trade secrets and intellectual property violation. The work of a company forensic expert is to detect and prevent computer aided attacks; they should also ensure that digital evidence that is submitted to court in an event of prosecution is credible.…

    • 1706 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays