Cyber Crime Essay examples

1172 Words Apr 9th, 2008 5 Pages
In today’s day and age, everyone uses a computer. Whether it is just for fun (surfing the internet, downloading music) or for work (using Excel, Word or the internet for sources) there are not too many people that do not understand how useful the computer can be. In fact, many people have figured out how to use the computer to commit crime anonymously, and sometimes without the victim even knowing a crime has been committed. There are many different types of internet crime. First, it is incredibly easy to hide one’s identity on the internet. Most people use “user names” as opposed to actual names, therefore anyone can choose anything for their name. Some people do this just so they can feel like they can be who ever they want to be …show more content…
Terrorists can use the internet to communicate their arrangements or to steal intelligence from companies or people that have useful information. Law enforcement has many ways to find evidence of who committed crime in order to arrest the criminal. First, one must search the victim’s computer. Despite being anonymous, criminals still leave “fingerprints” of their presence in the computers they choose to infect. Investigators can review disks and diskettes, magnetic tape storage units and media, circuit boards and components, modems, video cards and software (Clark 14-19). With computers being so sensitive, there are many precautions that must be taken in order to keep information safe on the computer. The more someone uses a computer, the easier it is to lose information off of it. Someone can hack into a computer to maliciously destroy or alter information. Also, improper handling or storage of the computer can destroy evidence. Most components of computers require a certain temperature in order to keep the computer running smoothly. A large fluctuation of climate could distort or remove information (NIJ 2). If searching the suspect’s computer(s), detailed searches of e-mail and internet service provider (ISP) addresses help with the investigation. The ISP logs files in the “router, firewalls, web servers, e-mail servers, and other connected devices” (NIJ 12). This tells investigators every step an e-mail (for example) takes

Related Documents