Skip to content

170 Week 1 Assignment

LAW ENFORCEMENT CHALLENGES2Law Enforcement Challenges – Assignment 3Digital crimes are just extensions of their physical counterparts, as bank robbery has the same outcome but it is done much differently now. With law enforcement prosecuting these crimes the process of evidence collection and review of the evidence has to follow the same legalstandards as the physical crimes but with different tools and different arenas where the crimes arecommitted. Even with the change of scenery of the crimes law enforcement officers can still properly track criminals, collect electronic evidence, and prosecute these crimes. The greatest challenge facing law enforcement agencies is the handling of digital evidence as it can be easily manipulated or changed by accident if not handled correctly. “Network experts in law enforcement may not be sufficiently familiar with a target network to extract evidence with sufficient legal integrity and not disrupt the operation of the target network”[Tay14]. Being a trained network expert doesn’t mean you can navigate any and all networks without causing issues. If data is accessed incorrectly due to unfamiliarity of the network that evidence is tainted and inadmissible. To help with this the first on scene must make sure to secure all of the items by documenting the evidence, once documented they must secure it from tampering by any who are authorized access to it so the chain of custody is maintained and the evidence isn’t tainted accidently. There are a few methods of documentation available such as photography and video recording, both methods allow the officers to put the evidence back together in the same manner as when it was collected. These concerns are extremely

Computer Crime 2 Different Types of Computer Crime There are many types of computer crime, and each can fit into one of the four major categories. Some forms of computer crime are more common than others, and computer criminals use them to conduct their activities. There are some forms of computer crime that pose major threats to critical infrastructure and other areas. Even so, there are ways that the government and law enforcement can protect people from becoming a victim of one of these crimes. There are various types of computer crime, some of which may be commonly known, and some that are not as popularly known. But what is computer crime? According to the Computer Hope website, computer crime can be described as an act in which a person who is knowledgeable about computers, illegally views or steals information from a company or an individual, including private information, like your social security number or credit card numbers (Computer Hope, 2015). These people are often considered hackers, and they have been known to use malicious software to destroy or corrupt files or hardware. Some of the different types of computer crimes may include cyber terrorism, fraud, child pornography, identity theft, creation and distribution of malware (viruses, spyware), and DDoS (distributed denial of service) attacks. Each of these crime can be put into one of the four categories of computer crime. The first category of computer crime is that in which the computer is the target (Tayler, Fritsch, & Liederbach, 2015). This refers to any type of damage to the computer, whether it be physically vandalizing the hardware, theft of the computer, or malicious spyware and attacks against the computer system. An example of the latter would be a DDoS attack on a computer, preventing it from accessing certain information or servers. Another example would be an instance in which the hacker alters or corrupts files on a server or computer. The second category