Cyber Crime

There are many types of Cyber crimes most of which are scams by people that want to obtain personal information or money from their victims. You have to be careful about the way you handle your personal life on the internet and keep your data safe by using a virus scanner and a personal fire wall.
Common Scams:
                Charity
                Counterfeit  Cashers Checks
                Foreign Lotteries
                Investment
                Mortgage
                Romance
                Telemarketing
                West African Advance – Fee

Compromised  internet usage:
Being told you have won a prize, sweepstake, or lottery
Credit help from a unknown source
Credit scores for advanced money
Share of money from a foreign country
Counterfeit cashier checks or money order for more than you paid
Providing too much personal information
Using pressured tactics to compensate for little decision making from sales representatives
Social accounts being emailed by people they do not know

During 2009 according to government investigation records 336,655 complaints have been filed and a whopping 559.7 Million dollars have been loss in cyber crime alone.
Other ways criminals obtain information are through viruses that are called Trojan Horses. These viruses scan you computer from the internet to obtain personal information that is of value to you some of the information that Trojan horses obtain is birth date, name, contacts, email addresses, credit card numbers and even social security numbers. Other cyber criminal go after corporations and make false web directory changes to intercept online payments. Cyber criminals redirect web site links to intercept your information. The large figures of pay off from cyber crime explain the reasoning of why people do such things.

Stopping cyber crime starts with you. First get a good reliable home networking carrier that has added security from the corporation. A router with a built in fire wall is always the first step to internet security. Having a brand name registered virus scanner and fire wall program on your personnel computer will help you cut down on cyber crimes affecting you and improve the performance of your computer. A well known virus scanner is McAfee another one is Norton look for web alerts on your virus scanner and pay close attention to unwanted down loads that may be dangerous for your privacy and your computer.

Forensic analysis of internet data and usage start with examining the computers web browser the internet cache displays parts of the web pages viewed, cookies store local files on the computer that come from web sites that the user has entered and internet history allows the investigator to know exactly what sites have been visited by the user. Email programs located on the personal computer also hold information about the TCPIP link to the email server and other tags included in the email that display the route path the email took before passage to the computer system.

 Other forensic analysis include fire wall sniffing devices to decipher where information is being transferred from and contacting www.internic.com to allow the forensic analyst the ability to find fraudulent internet sites and contact the administrators of the site. This site provides domain addresses and who support to contact the network administrators of the specific site. If all else fails contact the FBI at www.ic3.gov to report cyber crime.

References:
http://www.ic3.gov/media/default.aspx
http://www.consumerfraudreporting.org/internet_scam_statistics.htm

What To Confiscate When Using A Search Warrant  

Extra ,hard drives
Photograph Camera’s
Video Camera’s
Photographs
Internet email and site
Porno sites and addresses

When confiscating electronic media many different items need to be confiscated other than just the computer. Disks with media on them can have time date stamps of when the media was produced and in what format. Evidence of internet interchange such as web sites, my space, twitter, and email accounts needs to be confiscate too. This information will lead the investigator to find out if and where the other web sites may be located with pornographic material from the suspect. Camera equipment may have fingerprints of the suspect, others that may be involved with the child pornography ring both personal cameras for photographs, and cameras that take motion pictures need to be confiscated. When gathering information such as email accounts the data has to be sent to the lab for further analysis, other items that are not related to the computer such as clothing items and photographs that may be located near the vicinity of the suspect may be confiscated for further analysis. Connecting items that may be of help are samples of hair identifying the suspect and the victim putting both in the same place at the same time. Skin fragments, semen, and other biological evidence can be of help in such a crime.

No comments:

Post a Comment