SlideShare a Scribd company logo
1 of 7
Computer Forensics: The Emerging
Significance to Law Enforcement
Lillian Ekwosi-Egbulem
October 05, 2013
Ms Comfort is a 64 year old Nigerian, never had a formal educational training and lives
in the slum. Each morning she takes a bus ride to the nearest city internet café to resume from
where she left off on her business the previous day. Part of her self employed “yahoo-yahoo”
job description is to watch for incoming mails. Once she receives one, she pays someone to have
the mail content explained and a response sent for her. The name of her business is “Advanced
Fee Fraud” aka 419, a type of internet crime very prevalent in the developing countries.
Sometimes, she poses as a young African man and sends invitation to elderly single and
lonely western women, inviting them to join “him” in experiencing a life so beautifully primitive
in African. Other times, she asks her victims to help her transfer some unclaimed money from
the country’s central bank. Those who accept the invitation end up paying ransom to reclaim
their freedom and return back to their countries. Similarly, those who accept to help her transfer
funds pay thousands of dollars in fees before they realized there is no unclaimed money to
transfer.
This is one of the many cyber crimes being perpetuated each day. Others include
company policy violations, embezzlement, email harassment, murder, leaks of property
information, terrorism, child pornography, financial crimes, fraud, identity theft, espionage,
information theft, etc. The reason why there are many types of cyber crime is because it is very
lucrative and the feeling of safety flight gives the criminals a lot of confidence and if they feel
threatened, they can just pull the plug and walk away.
With the many faces of cyber crimes and the sophistication by which cyber criminals
operate, it becomes necessary to have a branch of the law enforcement agency dedicated to
combating this menace. The purpose of this paper therefore is to discuss the multitude of
reasons why the developing field of computer forensics is essential to modern-day law
enforcement.
According to the author of Guide to computer forensics and investigation, “computer
forensics involves obtaining and analyzing digital information for use as evidence in civil,
criminal or administrative cases” (Nelson & Phillips, 2010). The field is relatively new but
computer crime rate and the market has grown and will continue to grow, opening up a great
need for computer forensic professionals (Bussing, Null & Forcht, 2005). Today there are simply
not enough law enforcement officers with appropriate computer forensics and computer crime
investigative training to apprehend and prosecute criminals that commit various cyber crimes. Its
emerging significance to law enforcement cannot be overemphasized and the growth in computer
crime rate and the market is one of the reasons among others, why the developing computer
forensics is essential to modern-day law enforcement.
As recorded in Computer Forensics: An emerging practice in the battle against cyber
crime, an FBI report in 2000 showed 2,032 cases opened involving cyber crimes, however, only
921 were closed (Isner, 2003). The remaining unclosed cases were not processed due to lack of
trained investigators, evidence, tools, coupled with the high cost of investigation to prosecute the
cyber criminals. As a result, cyber criminals have been able to evade responsibility due to lack of
supporting evidence to convict them
As recorded in Guide to computer forensics and investigations “the general rule was at
least one law enforcement computer investigator for every 250,000 people in a geographical
region” (Nelson, & Phillips, 2010). Seemingly, with the rate of cyber crime escalating, there is a
great need to have at least two or three law enforcement computer investigator for every 250,000
people. Hence, the developing field of computer forensics that will train computer forensic
investigators is essential to modern-day law enforcement. These trained professionals will be
able to investigate cyber crimes, present admissible evidence to help convict more offenders for
the crimes they committed.
Awareness is a great tool for driving message across. With the developing field of
computer forensics being essential to modern-day law enforcement, more schools will offer the
training and grants in this field. With enough trained professional in the field, more cases will be
prosecuted. If more cases go to court and more cyber criminals are convicted, the anonymity
surrounding this type of crime will be eventually stripped. This is very important in making the
cyber criminals realize that no matter how invisible they think they are, they cannot out run the
law.
Computer technology is dynamic and has become an integral part of our everyday life.
The same technologies we use in sharing our children’s photographs with friends and family
members aide others in transmitting child pornography. Obviously, cyber criminals need
avenues and storage facilities to share and store their criminal activities. Consequently, computer
and internet represent the fastest growing technological tools used by criminals who maintain
files of incriminating evidence in their computer. However, they do not understand that sensitive
data tenaciously clings to life and can be retrieved and investigated for the purpose of
prosecution. The criminals unfortunately have no ability to properly destroy the evidence. The
developing field of computer forensics is essential to modern-day law enforcement to assist in
obtaining and analyzing digital information for use as evidence in criminal cases that will help
convict the cyber criminals.
As the computer technology advances and pervade the society, the cyber criminals are
not just folding their arms; they are getting more sophisticated and looking for better ways to
conceal their crimes. Cyber criminals do not have to be physically present on the crime scene.
Their tenacity is due to the lucrative nature of the business and the desire to demonstrate prowess
in cyber space. Cyber criminals are really motivated today to use the domain of cyberspace for
their personal gain and to satisfy their criminal urge. Also, they feel pretty comfortable because
of the anonymity of operating in an anonymous state through cyberspace which offers them low
risk (WebTycho, 2010). Law enforcement practitioners need more than the available tools to
deal with cyber crimes. They need professional training in computer forensics to be able to use
the available tools in fighting cyber crime.
“Computer evidence is very fragile and can be easily and unintentionally altered or
destroyed” (Anderson, 2008). As a result, evidence processing is not a task to be undertaken
lightly by just any IT worker but a trained computer evidence specialist (Kay, 2006). Also, there
are standards and procedures (state and federal laws) that must be followed to avoid risks. For
instance, the Fourth Amendment Rights (Search and Seizure) protects defendants against
computer forensic evidence and provide them reasonable or legitimate expectation of privacy.
An untrained investigator trying to process a computer forensic investigation without cognizance
of the legal framework is like a first aid technician performing brain surgery with a pocket knife
which can lead to severe consequences. Furthermore, the expenses involved in computer forensic
investigation are enormous and shortcuts by untrained practitioners should be avoided at all cost
(Anderson, 2008).
In conclusion, we live in the information age and so do criminals. Sophisticated attacks
on IT systems are increasing in number at an alarming rate. (Arasteh, Debbabi, Sakka & Saleh,
2007). Due to the ease at which the criminals operate, internet has been termed the “crooks
dream” and the law enforcement nightmare. No doubt, the law enforcement officers are doing a
good job but the training they have is not adequate in providing a “scientifically proven methods
in gathering, processing, interpreting, and using the digital evidence to bring a conclusive
description of cyber crime activities” (Arasteh et al., 2007).
This makes the developing field of computer forensics essential to modern-day law
enforcement because then, trained professionals can match the sophistication of the criminals
and operate through the standards and procedures to preserve data that can serve as evidence in a
court of law. Certainly, with enough computer forensic professionals, internet will be perceived
differently; perhaps as law enforcement dream and the “crooks’ nightmare.
References
Nelson, B., Phillips, A. (2010). Guide to Computer Forensics and Investigation (4th
ed.). Boston,
MA: Course Technology
Kay, R. (2006). Computer Forensics. Computerworld, 40(16), 49. Retrieved from ProQuest
Computing. (Document ID: 1024925931).
Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina.
Association for Computing Machinery. Communications of the ACM, 49(2), 81.
Retrieved from ProQuest Computing. (Document ID: 980873961).
Busing, M.E., Null, J. D., Forcht, K.A. (2005). Computer Forensics: the modern crime fighting
tool. The Journal of Computer Information Systems, 46(2), 115-119. Retrieved from
ProQuest Computing. (Document ID: 984317121).
Anderson, M.R. (2008). Electronic Fingerprints: Computer Evidence Comes Of Age. Retrieved
from http://www.forensics-intl.com/art2.html
Arasteh, A.R., Debbabi, M., Sakka, A., Saleh, M. (2007). Analyzing multiple logs for forensic
evidence. Elsevier,doi:10.1016/j.diin.2007.06.013. Retrieved from http:
http://www.dfrws.org/2007/proceedings/p82-arasteh.pdf
Isner, J. D. (2003). Computer Forensics: An emerging practice in the battle against cyber crime.
Global Information Assurance. Retrieved from
https://www.giac.org/paper/gsec/2797/computer-forensics-emerging-practice-battle-
Raduage, H. (2010). Deloitte center for cyber innovation. Document posted in University of
Maryland University College CIA3016382 online classroom, archived at:
http://webtycho.umuc.edu

More Related Content

What's hot

Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareCompTIA
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseShujun Li
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Mukesh Chinta
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 

What's hot (20)

Security Basics
Security BasicsSecurity Basics
Security Basics
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in Healthcare
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Computer Forensics: The Emerging Significance to Law Enforcement

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 

Similar to Computer Forensics: The Emerging Significance to Law Enforcement (16)

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
attach3
attach3attach3
attach3
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Computer Forensics: The Emerging Significance to Law Enforcement

  • 1. Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem October 05, 2013
  • 2. Ms Comfort is a 64 year old Nigerian, never had a formal educational training and lives in the slum. Each morning she takes a bus ride to the nearest city internet café to resume from where she left off on her business the previous day. Part of her self employed “yahoo-yahoo” job description is to watch for incoming mails. Once she receives one, she pays someone to have the mail content explained and a response sent for her. The name of her business is “Advanced Fee Fraud” aka 419, a type of internet crime very prevalent in the developing countries. Sometimes, she poses as a young African man and sends invitation to elderly single and lonely western women, inviting them to join “him” in experiencing a life so beautifully primitive in African. Other times, she asks her victims to help her transfer some unclaimed money from the country’s central bank. Those who accept the invitation end up paying ransom to reclaim their freedom and return back to their countries. Similarly, those who accept to help her transfer funds pay thousands of dollars in fees before they realized there is no unclaimed money to transfer. This is one of the many cyber crimes being perpetuated each day. Others include company policy violations, embezzlement, email harassment, murder, leaks of property information, terrorism, child pornography, financial crimes, fraud, identity theft, espionage, information theft, etc. The reason why there are many types of cyber crime is because it is very lucrative and the feeling of safety flight gives the criminals a lot of confidence and if they feel threatened, they can just pull the plug and walk away. With the many faces of cyber crimes and the sophistication by which cyber criminals operate, it becomes necessary to have a branch of the law enforcement agency dedicated to combating this menace. The purpose of this paper therefore is to discuss the multitude of
  • 3. reasons why the developing field of computer forensics is essential to modern-day law enforcement. According to the author of Guide to computer forensics and investigation, “computer forensics involves obtaining and analyzing digital information for use as evidence in civil, criminal or administrative cases” (Nelson & Phillips, 2010). The field is relatively new but computer crime rate and the market has grown and will continue to grow, opening up a great need for computer forensic professionals (Bussing, Null & Forcht, 2005). Today there are simply not enough law enforcement officers with appropriate computer forensics and computer crime investigative training to apprehend and prosecute criminals that commit various cyber crimes. Its emerging significance to law enforcement cannot be overemphasized and the growth in computer crime rate and the market is one of the reasons among others, why the developing computer forensics is essential to modern-day law enforcement. As recorded in Computer Forensics: An emerging practice in the battle against cyber crime, an FBI report in 2000 showed 2,032 cases opened involving cyber crimes, however, only 921 were closed (Isner, 2003). The remaining unclosed cases were not processed due to lack of trained investigators, evidence, tools, coupled with the high cost of investigation to prosecute the cyber criminals. As a result, cyber criminals have been able to evade responsibility due to lack of supporting evidence to convict them As recorded in Guide to computer forensics and investigations “the general rule was at least one law enforcement computer investigator for every 250,000 people in a geographical region” (Nelson, & Phillips, 2010). Seemingly, with the rate of cyber crime escalating, there is a
  • 4. great need to have at least two or three law enforcement computer investigator for every 250,000 people. Hence, the developing field of computer forensics that will train computer forensic investigators is essential to modern-day law enforcement. These trained professionals will be able to investigate cyber crimes, present admissible evidence to help convict more offenders for the crimes they committed. Awareness is a great tool for driving message across. With the developing field of computer forensics being essential to modern-day law enforcement, more schools will offer the training and grants in this field. With enough trained professional in the field, more cases will be prosecuted. If more cases go to court and more cyber criminals are convicted, the anonymity surrounding this type of crime will be eventually stripped. This is very important in making the cyber criminals realize that no matter how invisible they think they are, they cannot out run the law. Computer technology is dynamic and has become an integral part of our everyday life. The same technologies we use in sharing our children’s photographs with friends and family members aide others in transmitting child pornography. Obviously, cyber criminals need avenues and storage facilities to share and store their criminal activities. Consequently, computer and internet represent the fastest growing technological tools used by criminals who maintain files of incriminating evidence in their computer. However, they do not understand that sensitive data tenaciously clings to life and can be retrieved and investigated for the purpose of prosecution. The criminals unfortunately have no ability to properly destroy the evidence. The developing field of computer forensics is essential to modern-day law enforcement to assist in obtaining and analyzing digital information for use as evidence in criminal cases that will help convict the cyber criminals.
  • 5. As the computer technology advances and pervade the society, the cyber criminals are not just folding their arms; they are getting more sophisticated and looking for better ways to conceal their crimes. Cyber criminals do not have to be physically present on the crime scene. Their tenacity is due to the lucrative nature of the business and the desire to demonstrate prowess in cyber space. Cyber criminals are really motivated today to use the domain of cyberspace for their personal gain and to satisfy their criminal urge. Also, they feel pretty comfortable because of the anonymity of operating in an anonymous state through cyberspace which offers them low risk (WebTycho, 2010). Law enforcement practitioners need more than the available tools to deal with cyber crimes. They need professional training in computer forensics to be able to use the available tools in fighting cyber crime. “Computer evidence is very fragile and can be easily and unintentionally altered or destroyed” (Anderson, 2008). As a result, evidence processing is not a task to be undertaken lightly by just any IT worker but a trained computer evidence specialist (Kay, 2006). Also, there are standards and procedures (state and federal laws) that must be followed to avoid risks. For instance, the Fourth Amendment Rights (Search and Seizure) protects defendants against computer forensic evidence and provide them reasonable or legitimate expectation of privacy. An untrained investigator trying to process a computer forensic investigation without cognizance of the legal framework is like a first aid technician performing brain surgery with a pocket knife which can lead to severe consequences. Furthermore, the expenses involved in computer forensic investigation are enormous and shortcuts by untrained practitioners should be avoided at all cost (Anderson, 2008). In conclusion, we live in the information age and so do criminals. Sophisticated attacks
  • 6. on IT systems are increasing in number at an alarming rate. (Arasteh, Debbabi, Sakka & Saleh, 2007). Due to the ease at which the criminals operate, internet has been termed the “crooks dream” and the law enforcement nightmare. No doubt, the law enforcement officers are doing a good job but the training they have is not adequate in providing a “scientifically proven methods in gathering, processing, interpreting, and using the digital evidence to bring a conclusive description of cyber crime activities” (Arasteh et al., 2007). This makes the developing field of computer forensics essential to modern-day law enforcement because then, trained professionals can match the sophistication of the criminals and operate through the standards and procedures to preserve data that can serve as evidence in a court of law. Certainly, with enough computer forensic professionals, internet will be perceived differently; perhaps as law enforcement dream and the “crooks’ nightmare.
  • 7. References Nelson, B., Phillips, A. (2010). Guide to Computer Forensics and Investigation (4th ed.). Boston, MA: Course Technology Kay, R. (2006). Computer Forensics. Computerworld, 40(16), 49. Retrieved from ProQuest Computing. (Document ID: 1024925931). Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina. Association for Computing Machinery. Communications of the ACM, 49(2), 81. Retrieved from ProQuest Computing. (Document ID: 980873961). Busing, M.E., Null, J. D., Forcht, K.A. (2005). Computer Forensics: the modern crime fighting tool. The Journal of Computer Information Systems, 46(2), 115-119. Retrieved from ProQuest Computing. (Document ID: 984317121). Anderson, M.R. (2008). Electronic Fingerprints: Computer Evidence Comes Of Age. Retrieved from http://www.forensics-intl.com/art2.html Arasteh, A.R., Debbabi, M., Sakka, A., Saleh, M. (2007). Analyzing multiple logs for forensic evidence. Elsevier,doi:10.1016/j.diin.2007.06.013. Retrieved from http: http://www.dfrws.org/2007/proceedings/p82-arasteh.pdf Isner, J. D. (2003). Computer Forensics: An emerging practice in the battle against cyber crime. Global Information Assurance. Retrieved from https://www.giac.org/paper/gsec/2797/computer-forensics-emerging-practice-battle- Raduage, H. (2010). Deloitte center for cyber innovation. Document posted in University of Maryland University College CIA3016382 online classroom, archived at: http://webtycho.umuc.edu