Tracking the Cybercrime Trail – Case Study Example

Tracking the Cybercrime Trail Introduction Technology is changing everyday as a result of innovation. The rate at which people and organization are using computers has increased highly. There are risks involved in using computers and these risks have also been on the rise. Cybercrime is one security risk that has been discovered. This fraud occurs as a result of increased usage computers and internet. In this assignment will tackle a number of questions with regard to an article by Sartin, Bryan about Tracking the Cybercrime Trail: In Addition to Knowing How to Follow the Bits of Evidence, Forensic Detectives Must Know How to Work with Law Enforcement.
Problem was identified and steps taken to solve the problem
According to Sartin (2004), the number of fraud was discovered to be on the increase by credit card associations and issuers. The fraud is said to have been taking place for over three to four months stretch. Sartin states that by the look, the types and patterns of the cyber crime originated from one source. The main source was identified to be a company that sells electronic payment software’s to various retail outlets such as internet companies, retail stores and restaurants. No law enforcement was made since sufficient evidence was not there.
The credit card issuers and associations came together decided to launch an investigation for cybercrime, since it there was difficult to enforce law against the alleged company for cybercrime. The forensic investigations were to be carried out by Ubizen and began by contacting the alleged company to informing the company about the investigation regarding security breach within their production network environment. Ubizen also sort for Maximum Corporation and the company was ready to cooperate though it said it was not aware of the security breach.
Stages of Investigation
In every forensic investigation, there has to be a forensic report. This report has methodologies or stages and it has to be a good one because if it’s a poor one the results are rendered to be null. The stages include:
a) Problem definition
The main problem here was identified to be cybercrime a form of security breach. The main strategy after defining the problem was to get the source of the crime. In sartins article, the investigators made a discovery process before going to the site to gather evidence. This was done to identify the problem and its source.
b) Gathering data
The main goal of every forensic investigation is to gather evidence. Therefore, raw data has to be gathered before a conclusion is made. Here, the main strategy used by the investigator was by contacting the company alerting them about the security breach. They also informed the company that they would send independent investigators to collect evidence.
c) Evaluating and Analyzing the report
When the raw data is collected it is analyzed and evaluated to ensure that the it is in line with the goal of the forensic investigation. The analyzed data is usually refered to as findings which should have supportive details. According to Sartin, the investigators found out that the fraud was as a result of duplicated credit cards. The credit card duplicates are usually unauthorized and criminals use them in purchasing products using falsified information.
d) Conclusion
Analysis was made after the investigations for the company and the report concluded that there was insufficient evidence were collected regarding the security breach. Therefore, no law would be enforced to the alleged company against cybercrime.
Identifying and catching Criminals
Apart from identifying and catching the criminal, the investigations also wanted to discover how the crime was being committed. In Sartins article, the investigators in-depth analyses indicate that the crime resulted from duplicated credit cards. The in-depth analysis also shows that for a credit card to be duplicated, one would require account information contained in the magnetic stripe at the back of the credit card.
There other ultimate goal of the crime was to alert the credit card issuers and association on how such crimes occur. Such awareness helps them to increase their security system with regard to credit cards. They also alert credit card holders of such crimes so that such crimes are minimal in future.
Type(s) of Cybercrime
There are about ten types of cybercrimes but the one that suits the type of crime discussed in Sartins article is the credit card crime. For such a crime to happen, one simply the credit card number into the website page of the vendor for only online transactions. In Sartins article, it was discovered that credit cards were being duplicated. In cases where the electronic card is insecure hackers misuse the card by impersonating the owner of the credit card.
Reference
Sartin, Bryan (2004). Tracking the Cybercrime Trail: In Addition to Knowing How to Follow the Bits of Evidence, Forensic Detectives Must Know How to Work with Law Enforcement. http://www.questia.com/read/1G1-122769624/tracking-the-cybercrime trail-in-addition-to-knowing