Page 16 - Forensic News Journal Oct Nov 2017
P. 16

Forensic News Journal
        How Computer Criminals Control Information,  pg 16-21
        ©2014-2017  SYT Global, Inc.
                     HOW COMPUTER


               CRIMINALS CONTROL                                                                                        F





                                                                                                                        O
                            INFORMATION
                                                                                                                        R



                                                                                                                        N
                                   By Meshaal MacLean                                                                   E
                                                                                                                        S

                                                                                                                        I
                                                                           Photo Courtesy of  fbi.gov                   C
        As computer-related                  there be a human or tech-            systems and programs
        crimes become more prev- nological problem.                               with the intent to impede a           M

        alent, understanding the                                                  business or create chaos in           E
        types of computer-related  Here, the offender uses                        a business operations                 T

        crimes provides law en-              the computer to obtain               * Unlawful access to                  H
        forcement an insight for             information or to damage             criminal justice and other            O
        investigative strategies.            operating programs while  government records                               D

        The first insight is to know  committing the following                    * Changing a criminal his-            O
        and understand the types             computer crimes:                     tory, modifying want and              L

        of computer crimes.                                                       warrant information                   O
                                             * Theft of marketing in-             * Creating a driver’s li-             G
        Computer as the Target               formation, like customer             cense, passport, or another           Y

                                             lists, pricing data, or mar-         document for false identi-
        This computer crime in-              keting plans                         fication

        cludes theft of intellectual  * Blackmail based on                        * Changing tax records or
        property. The offender               information gained from              gaining access to intelli-
        accesses the operating               computerized files, like             gence files

        program under the guise              the medical information,             * Techno-vandalism
        of the system’s manager.             personal history, or sexual  through unauthorized ac-

        The intruder accesses the            preference                           cess to damage files or
        contents of computer files  * Sabotage of intellectual                    programs
        in the system through                property, marketing, pric-           * Techno-trespass violat-

        the trap door that permits           ing, or personnel data               ing the owner’s privacy as
        access to systems should             * Sabotage of operating              in criminal trespass


    16
   11   12   13   14   15   16   17   18   19   20   21