Page 18 - Forensic News Journal Oct Nov 2017
P. 18

How the Computer Criminals Control Information: Typess of Computer Crime

        ing involving drug raids,                                                 of a computer-related of-

        money laundering sei-                * Violation of copyright             fense must be established
        zures, and other arrests in  restrictions of commercial  for successful prosecution.
        encrypt the data or design           software can result in the

        * Allowing computer                  staggering loss to busi-             * The physical act of a               F
        criminals to destroy the             nesses                               computer crime, actus                 O

        storage media, such as               * Hackers break into com- reus, may be demonstrated                        R
        disks, to eliminate evi-             puters with the help of the  best by an electronic im-                     E
        dence of their illegal ac-           software illegally written           pulse                                 N

        tivities                             and sold                             * It is difficult to define           S
        * Letting child pornogra-            * Successful computer                and track                             I

        phers exchange informa-              programs, like the word              * A computer crime can                C
        tion through BBSs                    processing, spreadsheets,            occur in 3 milliseconds
                                             and databases are dupli-             using a program code that             M

        These computer crimes re- cated, packaged, and sold  tells the software to erase                                E
        quire unique data recovery  illegally on a large scale                    itself after the computer             T

        techniques in order to gain  * Just like the pirated                      executes the action elimi-            H
        access to the evidence.              audio and video tapes,               nating the evidentiary trail          O
                                             counterfeit computers and  * Causation relates to the                      D

        Computer Crimes                      peripherals (items such as  self-destruction of com-                       O
        Associated With the                  modems and hard disks)               puter programs that fa-               L

        Prevalence of Computers are also manufactured and  cilitate computer crimes                                     O
                                             sold under the guise of              and an investigator can               G
        The presence of comput-              originals                            not show causation if the             Y

        ers, and microcomputers,                                                  offender erases the execut-
        generates sinister muta-             Legal Issues Of                      ing instructions

        tions of the traditional             Computer Crimes                      * The electronic data in-
        crimes like the software                                                  terchange (EDI) and its
        piracy/counterfeiting,               Some States have enacted  networks complicate the

        copyright violation of               laws specifically directed           legal elements by making
        computer programs, coun- toward computer crimes,                          computer crimes more dif-

        terfeit equipment, black             while other States rely              ficult for law enforcement
        market computer equip-               fundamentally on the                 to specify, document, and
        ment and programs, and               common law as it applies             materially link the crime

        theft of technological               to current and emerging              to an individual
        equipment.                           technology. The elements             * The EDI connects par-


    18
   13   14   15   16   17   18   19   20   21   22   23