Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Computer Crime Investigation Process
Crime investigation process
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Computer Crime Investigation Process
The FED or Federal Reserve Bank is the central banking system of the United States of America. It was created on December 23, 1913, after the enactment of the Federal Reserve Act, because of a series of financial panics from the America public referring to the panic of 1907. Recently the FED is celebrated it 100th anniversary. Which makes people wonder, “What will the FED look like 100 years from now?”. This is a very interesting question to ask. There are many different challenges/outcomes for the FED’s future. I will talk about one of those potential challenges/outcomes. Cyber hacking has recently been on the upswing. Target recently experienced a breach in their security which cost around 110 million Target customers their personal information. During the beginning of last February, the Federal Reserve has also hacked. The website that is which caused great concern. The hackers could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a profit or they are protesting or it is just something they like to do. There is a little underground community of hackers called the computer underground. There are other uses of the word hacker for example someone who has an advanced understanding of computers and computer software, but they are rarely used in the mainstream world. People have argued over the real definition of the term “hacker”. Compute... ... middle of paper ... ...bert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Andress, Mandy; Cox, Phil; Tittel, Ed (2001). CIW Security Professional. New York, NY: Wiley. p. 638. ISBN 0-7645-4822-0. Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Chabrow, Eric (February 25, 2012). "7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies". GovInfo Security. Retrieved February 27, 2012. Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds". New York Post. "The Hacker's Dictionary". Retrieved 23 May 2013.
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
Steier, R. (1985). Computer Crime and Security: A Congressional Retrospective. Communications Of The ACM, 28(12), 1275-1276.
In this book Sterling discusses three cyberspace subcultures known as the hacker underworld, the realm of the cyber cops, and the idealistic culture for the cyber civil libertarians. At the beginning of the story Sterling starts out with discussing the birth of cyberspace and how it came about. The Hacker Crackdown informs the readers of the issues surrounding computer crime and the people on all sides of those problems. Sterling gives a brief summary of what cyberspace meant back then and how it impacted society, and he investigates the past, present and future of computer crimes. For instance he explains how the invention of the telephone led to a world that people were scared of because the telephone was something that was able to let people talk to one another without actually being in the same area. People thought that it was so strange and so different because they didn’t understand all of the information behind it. Back then people thought of the telephone as a tool that allowed others to talk to them in a way that was so personal yet impersonal. Sterling then goes on to explain how “phone phreaks” played such an important part in relating the telephones to computer crimes and how they were so closely related back then.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
McQuade, Samuel C. "research on cybercrime." Issues: Understanding Controversy and Society. ABC-CLIO, 2011. Web. 21 Jan. 2011
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, PimplefacedTeenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they areoften very Sharp Minded..
To be able to understand cybercrimes we need to know where it started. It all started with the birth of the internet. In the late 1960s, one of the authors (HMD) was a graduate student at MIT. His research at MIT’s project MAC (now the Laboratory for computer – the home of the World Wide Web Consortium) was funded by APRA – the Advanced Research Projects Agency of the Department of Defense. Later on APRA proceeded to implement the APRANET, which even...
Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J. & Liederbach, J., 2006, Digital Crime and Digital Terrorism, 1st Edition, New York: Pearson Education, Inc.
Globalization enables cyber criminals to come together and collaborate on cybercrimes and share ideas on how to commit crimes, which makes it harder for police to prevent the criminals’ crimes. These criminals target many people to gain personal information or take advantage of the victims in another way. However, there are international and national agencies committed to combating cybercrime and making progress in accomplishing this goal. Lieutenant Amanda Simmons of the South Carolina Computer Crime Center believes “there is a possibility that nearly every crime will eventually involve some high-tech piece of evidence” due to the younger, technologically-savvy generation (Wolf, par.18). This shows the extreme increase in cybercrime as a security threat.
Computer crime or Cyber Crime is defined as any type of crime that involves or regards a computer or computer network. Cyber Crime mainly means that the computer may be used as a tool in the commission of the crime or the computer may be the main target of the criminal’s crime. The rapid growth of technology and gadgets as well as the further de...
Just as traditional criminal activities, cybercrime can take many forms and occur virtually anytime and anywhere. Criminals committing cybercrime use very different methods, depending on their abilities and goals. This should not surprise anyone after all cybercrime is merely an activity "criminal" to the ingredient that adds a computer or an electronic network for its commission.