The Internet as a Crime Scene

The Internet as a Crime Scene

Prior to beginning work on this discussion, watch the Heists: Cybercrimes with Ben Hammersley video below.

There are many obstacles for a criminal justice professional or a private citizen or corporation to

collect evidence at an electronic crime scene. Last week we examined how traditional notions of crime scene preservation may transfer into the world of cyber crime investigations. This discussion requires you to explain the details and the potential issues with gaining admissible, crime scene evidence for a virtual crime. The five elements provide the minimal requirements for crime scene preservation and data collection. Provide as much detail as possible in your initial post.

Your 400 word minimum initial post for this discussion will detail the following:

  • Explain how digital evidence must be handled to preserve the integrity of the physical device as well as the data it contains.
  • Examine how some digital evidence requires special collection, packaging, and transportation techniques.
    • What are the special considerations for various forms of data?
  • List the ways that data can be damaged.
  • Explain how investigators avoid damaging data.
  • Analyze how communication devices like computers, mobile phones, smart phones, and tablets should be secured and prevented from receiving or transmitting data once they are identified and collected as evidence.

 

Required Resources

Article

Sindhu, K. K., & Meshram, B. B. (2012).  Journal of Information Security, (3), 196-201. Retrieved from http://www.scirp.org/journal/PaperDownload.aspx?DOI=10.4236/jis.2012.33024

  • This article discusses the various tools and techniques being used in the field of digital forensics as well as suggesting a systematic approach to the science. Accessibility Statement does not exist.
    Privacy Policy does not exist.

Multimedia

Aspinall, W. (Director & Producer). (2014). [Video file]. Retrieved from https://secure.films.com/OnDemandEmbed.aspx?token=109729&wID=100753&plt=FOD&loid=0&w=560&h=315&fWidth=580&fHeight=365

  • The full version of this video is available through the Films on Demand database in the UAGC Library. This video examines organized cyber hackers and how criminals and networks commit cyber crime and will assist you with your learning activities this week. This video has closed captioning.

Recommended Resources

Article

Brown, C. S. D., (2015).International Journal of Cyber Criminology, 9(1), 55-119. doi: 10.5281/zenodo.22387. Retrieved from http://www.cybercrimejournal.com/Brown2015vol9issue1.pdf

  • This open access article centers on the systemic issues that face investigators when taking on a cyber crime scene. The topic of potential regulatory changes related to cyber crime investigation is also discussed.

Report

United States Department of Justice. (2008).PDF]. https://www.ncjrs.gov/pdffiles1/nij/219941.pdf

  • This source provides pragmatic and practical information necessary to individuals collecting evidence of cyber crime evidence for prosecution. The governmental report provides step by step guidance for “first responders” and is considerate of the unique nature of each crime scene encountered. The report focuses upon preserving electronic crime scenes and provides methods for recognizing, collecting, and safeguarding digital evidence.

Websites

(http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

     Place Your Order Here!

Leave a Comment

Your email address will not be published. Required fields are marked *