SlideShare a Scribd company logo
1 of 7
Computer Forensics: The Emerging
Significance to Law Enforcement
Lillian Ekwosi-Egbulem
October 05, 2013
Ms Comfort is a 64 year old Nigerian, never had a formal educational training and lives
in the slum. Each morning she takes a bus ride to the nearest city internet café to resume from
where she left off on her business the previous day. Part of her self employed “yahoo-yahoo”
job description is to watch for incoming mails. Once she receives one, she pays someone to have
the mail content explained and a response sent for her. The name of her business is “Advanced
Fee Fraud” aka 419, a type of internet crime very prevalent in the developing countries.
Sometimes, she poses as a young African man and sends invitation to elderly single and
lonely western women, inviting them to join “him” in experiencing a life so beautifully primitive
in African. Other times, she asks her victims to help her transfer some unclaimed money from
the country’s central bank. Those who accept the invitation end up paying ransom to reclaim
their freedom and return back to their countries. Similarly, those who accept to help her transfer
funds pay thousands of dollars in fees before they realized there is no unclaimed money to
transfer.
This is one of the many cyber crimes being perpetuated each day. Others include
company policy violations, embezzlement, email harassment, murder, leaks of property
information, terrorism, child pornography, financial crimes, fraud, identity theft, espionage,
information theft, etc. The reason why there are many types of cyber crime is because it is very
lucrative and the feeling of safety flight gives the criminals a lot of confidence and if they feel
threatened, they can just pull the plug and walk away.
With the many faces of cyber crimes and the sophistication by which cyber criminals
operate, it becomes necessary to have a branch of the law enforcement agency dedicated to
combating this menace. The purpose of this paper therefore is to discuss the multitude of
reasons why the developing field of computer forensics is essential to modern-day law
enforcement.
According to the author of Guide to computer forensics and investigation, “computer
forensics involves obtaining and analyzing digital information for use as evidence in civil,
criminal or administrative cases” (Nelson & Phillips, 2010). The field is relatively new but
computer crime rate and the market has grown and will continue to grow, opening up a great
need for computer forensic professionals (Bussing, Null & Forcht, 2005). Today there are simply
not enough law enforcement officers with appropriate computer forensics and computer crime
investigative training to apprehend and prosecute criminals that commit various cyber crimes. Its
emerging significance to law enforcement cannot be overemphasized and the growth in computer
crime rate and the market is one of the reasons among others, why the developing computer
forensics is essential to modern-day law enforcement.
As recorded in Computer Forensics: An emerging practice in the battle against cyber
crime, an FBI report in 2000 showed 2,032 cases opened involving cyber crimes, however, only
921 were closed (Isner, 2003). The remaining unclosed cases were not processed due to lack of
trained investigators, evidence, tools, coupled with the high cost of investigation to prosecute the
cyber criminals. As a result, cyber criminals have been able to evade responsibility due to lack of
supporting evidence to convict them
As recorded in Guide to computer forensics and investigations “the general rule was at
least one law enforcement computer investigator for every 250,000 people in a geographical
region” (Nelson, & Phillips, 2010). Seemingly, with the rate of cyber crime escalating, there is a
great need to have at least two or three law enforcement computer investigator for every 250,000
people. Hence, the developing field of computer forensics that will train computer forensic
investigators is essential to modern-day law enforcement. These trained professionals will be
able to investigate cyber crimes, present admissible evidence to help convict more offenders for
the crimes they committed.
Awareness is a great tool for driving message across. With the developing field of
computer forensics being essential to modern-day law enforcement, more schools will offer the
training and grants in this field. With enough trained professional in the field, more cases will be
prosecuted. If more cases go to court and more cyber criminals are convicted, the anonymity
surrounding this type of crime will be eventually stripped. This is very important in making the
cyber criminals realize that no matter how invisible they think they are, they cannot out run the
law.
Computer technology is dynamic and has become an integral part of our everyday life.
The same technologies we use in sharing our children’s photographs with friends and family
members aide others in transmitting child pornography. Obviously, cyber criminals need
avenues and storage facilities to share and store their criminal activities. Consequently, computer
and internet represent the fastest growing technological tools used by criminals who maintain
files of incriminating evidence in their computer. However, they do not understand that sensitive
data tenaciously clings to life and can be retrieved and investigated for the purpose of
prosecution. The criminals unfortunately have no ability to properly destroy the evidence. The
developing field of computer forensics is essential to modern-day law enforcement to assist in
obtaining and analyzing digital information for use as evidence in criminal cases that will help
convict the cyber criminals.
As the computer technology advances and pervade the society, the cyber criminals are
not just folding their arms; they are getting more sophisticated and looking for better ways to
conceal their crimes. Cyber criminals do not have to be physically present on the crime scene.
Their tenacity is due to the lucrative nature of the business and the desire to demonstrate prowess
in cyber space. Cyber criminals are really motivated today to use the domain of cyberspace for
their personal gain and to satisfy their criminal urge. Also, they feel pretty comfortable because
of the anonymity of operating in an anonymous state through cyberspace which offers them low
risk (WebTycho, 2010). Law enforcement practitioners need more than the available tools to
deal with cyber crimes. They need professional training in computer forensics to be able to use
the available tools in fighting cyber crime.
“Computer evidence is very fragile and can be easily and unintentionally altered or
destroyed” (Anderson, 2008). As a result, evidence processing is not a task to be undertaken
lightly by just any IT worker but a trained computer evidence specialist (Kay, 2006). Also, there
are standards and procedures (state and federal laws) that must be followed to avoid risks. For
instance, the Fourth Amendment Rights (Search and Seizure) protects defendants against
computer forensic evidence and provide them reasonable or legitimate expectation of privacy.
An untrained investigator trying to process a computer forensic investigation without cognizance
of the legal framework is like a first aid technician performing brain surgery with a pocket knife
which can lead to severe consequences. Furthermore, the expenses involved in computer forensic
investigation are enormous and shortcuts by untrained practitioners should be avoided at all cost
(Anderson, 2008).
In conclusion, we live in the information age and so do criminals. Sophisticated attacks
on IT systems are increasing in number at an alarming rate. (Arasteh, Debbabi, Sakka & Saleh,
2007). Due to the ease at which the criminals operate, internet has been termed the “crooks
dream” and the law enforcement nightmare. No doubt, the law enforcement officers are doing a
good job but the training they have is not adequate in providing a “scientifically proven methods
in gathering, processing, interpreting, and using the digital evidence to bring a conclusive
description of cyber crime activities” (Arasteh et al., 2007).
This makes the developing field of computer forensics essential to modern-day law
enforcement because then, trained professionals can match the sophistication of the criminals
and operate through the standards and procedures to preserve data that can serve as evidence in a
court of law. Certainly, with enough computer forensic professionals, internet will be perceived
differently; perhaps as law enforcement dream and the “crooks’ nightmare.
References
Nelson, B., Phillips, A. (2010). Guide to Computer Forensics and Investigation (4th
ed.). Boston,
MA: Course Technology
Kay, R. (2006). Computer Forensics. Computerworld, 40(16), 49. Retrieved from ProQuest
Computing. (Document ID: 1024925931).
Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina.
Association for Computing Machinery. Communications of the ACM, 49(2), 81.
Retrieved from ProQuest Computing. (Document ID: 980873961).
Busing, M.E., Null, J. D., Forcht, K.A. (2005). Computer Forensics: the modern crime fighting
tool. The Journal of Computer Information Systems, 46(2), 115-119. Retrieved from
ProQuest Computing. (Document ID: 984317121).
Anderson, M.R. (2008). Electronic Fingerprints: Computer Evidence Comes Of Age. Retrieved
from http://www.forensics-intl.com/art2.html
Arasteh, A.R., Debbabi, M., Sakka, A., Saleh, M. (2007). Analyzing multiple logs for forensic
evidence. Elsevier,doi:10.1016/j.diin.2007.06.013. Retrieved from http:
http://www.dfrws.org/2007/proceedings/p82-arasteh.pdf
Isner, J. D. (2003). Computer Forensics: An emerging practice in the battle against cyber crime.
Global Information Assurance. Retrieved from
https://www.giac.org/paper/gsec/2797/computer-forensics-emerging-practice-battle-
Raduage, H. (2010). Deloitte center for cyber innovation. Document posted in University of
Maryland University College CIA3016382 online classroom, archived at:
http://webtycho.umuc.edu

More Related Content

What's hot

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systemssamis
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael SchmittJeffreyCarr7
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptDelforChacnCornejo
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceSam Bowne
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 

What's hot (20)

Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Intrusion prevention systems
Intrusion prevention systemsIntrusion prevention systems
Intrusion prevention systems
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
Tallinn manual 2.0 Prof. Michael Schmitt
Tallinn manual 2.0   Prof. Michael SchmittTallinn manual 2.0   Prof. Michael Schmitt
Tallinn manual 2.0 Prof. Michael Schmitt
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 

Similar to Computer Forensics: The Emerging Significance to Law Enforcement

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxtawnyataylor528
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 

Similar to Computer Forensics: The Emerging Significance to Law Enforcement (16)

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docxKathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
Kathryn E. ScarboroughEastern Kentucky UniversityMarc Ro.docx
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
attach3
attach3attach3
attach3
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Computer Forensics: The Emerging Significance to Law Enforcement

  • 1. Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem October 05, 2013
  • 2. Ms Comfort is a 64 year old Nigerian, never had a formal educational training and lives in the slum. Each morning she takes a bus ride to the nearest city internet café to resume from where she left off on her business the previous day. Part of her self employed “yahoo-yahoo” job description is to watch for incoming mails. Once she receives one, she pays someone to have the mail content explained and a response sent for her. The name of her business is “Advanced Fee Fraud” aka 419, a type of internet crime very prevalent in the developing countries. Sometimes, she poses as a young African man and sends invitation to elderly single and lonely western women, inviting them to join “him” in experiencing a life so beautifully primitive in African. Other times, she asks her victims to help her transfer some unclaimed money from the country’s central bank. Those who accept the invitation end up paying ransom to reclaim their freedom and return back to their countries. Similarly, those who accept to help her transfer funds pay thousands of dollars in fees before they realized there is no unclaimed money to transfer. This is one of the many cyber crimes being perpetuated each day. Others include company policy violations, embezzlement, email harassment, murder, leaks of property information, terrorism, child pornography, financial crimes, fraud, identity theft, espionage, information theft, etc. The reason why there are many types of cyber crime is because it is very lucrative and the feeling of safety flight gives the criminals a lot of confidence and if they feel threatened, they can just pull the plug and walk away. With the many faces of cyber crimes and the sophistication by which cyber criminals operate, it becomes necessary to have a branch of the law enforcement agency dedicated to combating this menace. The purpose of this paper therefore is to discuss the multitude of
  • 3. reasons why the developing field of computer forensics is essential to modern-day law enforcement. According to the author of Guide to computer forensics and investigation, “computer forensics involves obtaining and analyzing digital information for use as evidence in civil, criminal or administrative cases” (Nelson & Phillips, 2010). The field is relatively new but computer crime rate and the market has grown and will continue to grow, opening up a great need for computer forensic professionals (Bussing, Null & Forcht, 2005). Today there are simply not enough law enforcement officers with appropriate computer forensics and computer crime investigative training to apprehend and prosecute criminals that commit various cyber crimes. Its emerging significance to law enforcement cannot be overemphasized and the growth in computer crime rate and the market is one of the reasons among others, why the developing computer forensics is essential to modern-day law enforcement. As recorded in Computer Forensics: An emerging practice in the battle against cyber crime, an FBI report in 2000 showed 2,032 cases opened involving cyber crimes, however, only 921 were closed (Isner, 2003). The remaining unclosed cases were not processed due to lack of trained investigators, evidence, tools, coupled with the high cost of investigation to prosecute the cyber criminals. As a result, cyber criminals have been able to evade responsibility due to lack of supporting evidence to convict them As recorded in Guide to computer forensics and investigations “the general rule was at least one law enforcement computer investigator for every 250,000 people in a geographical region” (Nelson, & Phillips, 2010). Seemingly, with the rate of cyber crime escalating, there is a
  • 4. great need to have at least two or three law enforcement computer investigator for every 250,000 people. Hence, the developing field of computer forensics that will train computer forensic investigators is essential to modern-day law enforcement. These trained professionals will be able to investigate cyber crimes, present admissible evidence to help convict more offenders for the crimes they committed. Awareness is a great tool for driving message across. With the developing field of computer forensics being essential to modern-day law enforcement, more schools will offer the training and grants in this field. With enough trained professional in the field, more cases will be prosecuted. If more cases go to court and more cyber criminals are convicted, the anonymity surrounding this type of crime will be eventually stripped. This is very important in making the cyber criminals realize that no matter how invisible they think they are, they cannot out run the law. Computer technology is dynamic and has become an integral part of our everyday life. The same technologies we use in sharing our children’s photographs with friends and family members aide others in transmitting child pornography. Obviously, cyber criminals need avenues and storage facilities to share and store their criminal activities. Consequently, computer and internet represent the fastest growing technological tools used by criminals who maintain files of incriminating evidence in their computer. However, they do not understand that sensitive data tenaciously clings to life and can be retrieved and investigated for the purpose of prosecution. The criminals unfortunately have no ability to properly destroy the evidence. The developing field of computer forensics is essential to modern-day law enforcement to assist in obtaining and analyzing digital information for use as evidence in criminal cases that will help convict the cyber criminals.
  • 5. As the computer technology advances and pervade the society, the cyber criminals are not just folding their arms; they are getting more sophisticated and looking for better ways to conceal their crimes. Cyber criminals do not have to be physically present on the crime scene. Their tenacity is due to the lucrative nature of the business and the desire to demonstrate prowess in cyber space. Cyber criminals are really motivated today to use the domain of cyberspace for their personal gain and to satisfy their criminal urge. Also, they feel pretty comfortable because of the anonymity of operating in an anonymous state through cyberspace which offers them low risk (WebTycho, 2010). Law enforcement practitioners need more than the available tools to deal with cyber crimes. They need professional training in computer forensics to be able to use the available tools in fighting cyber crime. “Computer evidence is very fragile and can be easily and unintentionally altered or destroyed” (Anderson, 2008). As a result, evidence processing is not a task to be undertaken lightly by just any IT worker but a trained computer evidence specialist (Kay, 2006). Also, there are standards and procedures (state and federal laws) that must be followed to avoid risks. For instance, the Fourth Amendment Rights (Search and Seizure) protects defendants against computer forensic evidence and provide them reasonable or legitimate expectation of privacy. An untrained investigator trying to process a computer forensic investigation without cognizance of the legal framework is like a first aid technician performing brain surgery with a pocket knife which can lead to severe consequences. Furthermore, the expenses involved in computer forensic investigation are enormous and shortcuts by untrained practitioners should be avoided at all cost (Anderson, 2008). In conclusion, we live in the information age and so do criminals. Sophisticated attacks
  • 6. on IT systems are increasing in number at an alarming rate. (Arasteh, Debbabi, Sakka & Saleh, 2007). Due to the ease at which the criminals operate, internet has been termed the “crooks dream” and the law enforcement nightmare. No doubt, the law enforcement officers are doing a good job but the training they have is not adequate in providing a “scientifically proven methods in gathering, processing, interpreting, and using the digital evidence to bring a conclusive description of cyber crime activities” (Arasteh et al., 2007). This makes the developing field of computer forensics essential to modern-day law enforcement because then, trained professionals can match the sophistication of the criminals and operate through the standards and procedures to preserve data that can serve as evidence in a court of law. Certainly, with enough computer forensic professionals, internet will be perceived differently; perhaps as law enforcement dream and the “crooks’ nightmare.
  • 7. References Nelson, B., Phillips, A. (2010). Guide to Computer Forensics and Investigation (4th ed.). Boston, MA: Course Technology Kay, R. (2006). Computer Forensics. Computerworld, 40(16), 49. Retrieved from ProQuest Computing. (Document ID: 1024925931). Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina. Association for Computing Machinery. Communications of the ACM, 49(2), 81. Retrieved from ProQuest Computing. (Document ID: 980873961). Busing, M.E., Null, J. D., Forcht, K.A. (2005). Computer Forensics: the modern crime fighting tool. The Journal of Computer Information Systems, 46(2), 115-119. Retrieved from ProQuest Computing. (Document ID: 984317121). Anderson, M.R. (2008). Electronic Fingerprints: Computer Evidence Comes Of Age. Retrieved from http://www.forensics-intl.com/art2.html Arasteh, A.R., Debbabi, M., Sakka, A., Saleh, M. (2007). Analyzing multiple logs for forensic evidence. Elsevier,doi:10.1016/j.diin.2007.06.013. Retrieved from http: http://www.dfrws.org/2007/proceedings/p82-arasteh.pdf Isner, J. D. (2003). Computer Forensics: An emerging practice in the battle against cyber crime. Global Information Assurance. Retrieved from https://www.giac.org/paper/gsec/2797/computer-forensics-emerging-practice-battle- Raduage, H. (2010). Deloitte center for cyber innovation. Document posted in University of Maryland University College CIA3016382 online classroom, archived at: http://webtycho.umuc.edu