Lesson 14 Assignment
Computer crimes are offences that people commit utilizing computing systems, especially exploiting the convenience and broad reach that the resources allow among diverse organizations, societies, and their members across international borders. Regulation of the internet is largely impossible and impractical because of its international nature, meaning that computer criminals can exploit the vacuum of regulatory authority to perpetrate their offences. Because of several reasons, the enforcement of laws governing online conduct is essentially more problematic than the administration of traditional laws. Issues of jurisdiction are also significant in addressing and prosecuting computer crimes. Law enforcement agencies only have authority to implement laws inside their mandate or jurisdiction. The perpetrators of most computer crimes act across the jurisdictions of different law enforcement agencies, such as a perpetrator in Europe or Asia targeting organizations and individual victims in the U.S., thus raising the problem of jurisdiction for law enforcement agencies in solving the crime, arresting suspects, and confiscating systems that the offenders utilize in the crime (Brown, 2015). Another unique challenge in solving computer crime involves the complexities of identifying perpetrators. Computing systems and applications offer criminals a broad range of methods to achieve anonymity and conceal their identities, including their locations and IP addresses. Numerous services are available online to mask users’ IP addresses by routing traffic through different servers. The type of information on computer systems is also fragile, in terms of ease of loss and change, influencing problems in the solution of computer crimes (Brown, 2015).
The first responder to a crime of identity theft ought to secure the scene from all interference. After photographing essential parts of the system for evidence, including peripheral devices, first responders should confirm the power states of computing systems by checking for flashing lights, running fans, and the state of the monitor (sleep or off). The officer should photograph the monitor’s content/details and then sketch, photograph, and document all cables, wires, and other devices with connections to the computer, photograph uniquely labelled cords, and remove and secure the power supply. Other vital actions are placing tape over the floppy disk slot, recording the model, serial numbers, and other identifiers, ensuring that all drive trays are in retracted positions, and packaging all collected evidence according to agency procedures to avoid damage and alteration during storage and transport (Brown, 2015).
Brown, C. (2015). Investigating and prosecuting Cyber Crime: Forensic dependencies and Barriers to justice. International Journal of Cyber Criminology 9(1): 55-119. Retrieved from: http://www.cybercrimejournal.com/Brown2015vol9issue1.pdf