Cybercrime, Digital Evidence, Computer Forensics Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

At the turn of the 21st century the world saw the explosion of computer technology, and it has taken many people by surprise. The prediction about computer technology doubling in capacity and complexity every six months came true. As a result computer software and computer hardware are more complicated compared to its predecessors in the past. There are many users who are not even aware of the true capability of their laptops, mobile phones, and tablets. At the same time cybercrime was also on the rise. In the first ten years of the New Millennium, billion-dollar companies were forced into bankruptcies because of fraudulent practices. These fraudulent practices were tied closely to computer systems.

Fraudulent accounting records in WorldCom and Enron were brought to the light of day, because of superb detective skills augmented by forensic investigators skilled in retrieving data from computer systems. However, as the success of one crime unit was made known to the public, there were also several cases that are still unsolved, because criminals are becoming more technically proficient in their desire to evade authorities. It is therefore important to update law enforcement’s knowledge regarding Information Technology in order to catch cybercriminals in the act of committing crime. A novice learning the ropes about the cat and mouse game of apprehending criminals may do well by visiting websites that talk about the science of hiding information in computer systems. The website “howstuffworks” carries an article discussing the basics of computer forensics, this is a good example of a website that is useful in explaining or understanding the reality of cybercrime and digital evidence.

The howstuffworks website is a good source of information regarding cybercrime and digital evidence. A closer examination of the said website revealed three major pieces of evidence to prove that the web creator has above-average knowledge regarding cybercrime due to the following evidences: 1) The website provides real-life examples of computer forensics; 2) The website provides an overview of computer forensic investigation techniques; and 3) The website provides examples of anti-forensics.

Website Provides Real-Life Examples of Computer Forensics

Enron used to be a popular company in the United States of America. Investors made money when they invested their hard earned money in this company. It was therefore a major scandal in the financial world when it was discovered that Enron’s corporate leaders were guilty of accounting fraud. According to the author of the article in “howstuffworks”, the United States Congress authorized the investigation of corporate misconduct (Strickland 1).

According to the website, the Federal Government sent a specialized detective force that was given the go signal to investigate Enron using computer forensics. The said specialized detective force was responsible in searching, preserving, and analyzing information that were stored in the computer systems. In this particular case, the data stored in the computer systems had a direct or indirect connection to the crime that was allegedly committed by the corporate leaders and their subordinates.

Website Provides an Overview of Computer Forensics Investigation

Before providing an overview of computer forensics investigation, the creator of the webpage cited the name of Judd Robbins who is a known computer scientists and a leading computer forensics expert. Thus, the reader can conduct a background search on Judd Robbins, to verify the claim that the information provided are accurate and relevant to the topic of discussion.

After naming the resource person, the site proceeded to highlight major steps undertaken by a computer forensics detective in handling a cybercrime case. For example, the first step is to secure the targeted computer system. Detectives must develop a foolproof protocol to prevent any type of unauthorized access to the computer or to its storage device. Finally, the webpage alerted the forensics detective to the importance of severing the connection to the Internet.

The discussion about the inaccessible parts of the computer’s hard drive, and the importance of documentation proves the usefulness of the website when it comes to understanding the nature of computer forensics. It gives the idea that cybercriminals are similar to other unscrupulous individuals who are determined to cover their tracks.

Website Provides Examples of Anti-Forensics

The best proof that the webpage creator had an in-depth understanding of computer forensics can be seen in the discussion on how to defeat the specialized detective force that was sent to detect cybercrime. The website talks about how to conceal data by dividing it into smaller sections. The next step was to conceal the smaller sections at the tail end of other files. According to the website, most data files have an unused portion that are named “slack space” (Strickland 4).

It is an eye-opening revelation for those who are new to the cybercrime game. At the same time, it is a useful piece of information for cybercrime detectives who are trying their best to extract all relevant information within a computer system. Not all the files that are inside a computer system are relevant pieces of evidences needed to build a case. Therefore, it is a challenge for investigators to navigate through a virtual world of computer files. They are reliant on specific computer software to help them understand where files are hidden. However, a skilled cybercriminal knows the weakness of law enforcement tools that were created to track all relevant files needed to convict the guilty party.

The website also pointed out that aside from using the “slack space”, cybercriminals are also prone to hide files inside executable files. In a normal file retrieval process, the software detection program skips over the executable files, because these are files needed to install software. But clever cybercriminals have found a way to hide files into executable files using programs called packers.

Conclusion

The website “howstuffworks” has created an article that is helpful for those who want to learn more about computer forensics. It is an excellent source of information because of three major reasons: 1) The website provides real-life examples of computer forensics; 2) The website provides an overview of computer forensic investigation techniques; and 3) The website provides examples of anti-forensics. The website contains information that is not commonly found in other sites. It provides basic information on what a detective needs to do in order to increase the probability of success when building a case against a cybercriminal. On the other hand, this website is accessible to the public. Therefore, it is not accurate to say that it serves a public service when it comes to defeating cybercrime. In fact, cybercriminals can use the information in the said website to improve their skills when it comes to hiding critical files.

Works Cited

Strickland, Jonathan. . howstuffworks, 2014. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, June 22). Cybercrime, Digital Evidence, Computer Forensics. https://ivypanda.com/essays/cybercrime-digital-evidence-computer-forensics/

Work Cited

"Cybercrime, Digital Evidence, Computer Forensics." IvyPanda, 22 June 2020, ivypanda.com/essays/cybercrime-digital-evidence-computer-forensics/.

References

IvyPanda. (2020) 'Cybercrime, Digital Evidence, Computer Forensics'. 22 June.

References

IvyPanda. 2020. "Cybercrime, Digital Evidence, Computer Forensics." June 22, 2020. https://ivypanda.com/essays/cybercrime-digital-evidence-computer-forensics/.

1. IvyPanda. "Cybercrime, Digital Evidence, Computer Forensics." June 22, 2020. https://ivypanda.com/essays/cybercrime-digital-evidence-computer-forensics/.


Bibliography


IvyPanda. "Cybercrime, Digital Evidence, Computer Forensics." June 22, 2020. https://ivypanda.com/essays/cybercrime-digital-evidence-computer-forensics/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1