Preview

Cyber Kidnapping Case Study Essay

Good Essays
Open Document
Open Document
664 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Kidnapping Case Study Essay
Cyberstalking Case Study

Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.

When investigator Peter L. Lockhart Jr., follows the basic steps in a cybercrime investigation, the evidence will be admissible in a court of law. Obtaining the evidence
…show more content…
One is the victims, the other has links to an address in California, and the last is from Poland and was never able to connect with the victims address. With an Ex-parte order, Trooper Aresco receives a response from Facebook with history logs as to what IP addresses are relating to the victims. Again, there is a link to the physical address in Sacramento. Trooper Aresco then receives information from Comcast to the address in Sacramento and the IP address is a match. Officer Lockhart receives a search warrant and confiscates a computer from Bronk's bedroom desk. The labeling of a computer is complete with a number two for identification purposes. A forensic examination uncovers pictures of the victim in the file C:\Documents and Settings\Geeg\Desktop\nextfomav\aalechnowicz."nextfornav" folder. The folder also holds the 172 folders of other email accounts Bronk can access and hack. Upon more searching, Lockhart discovers a "pass.txt" file that contains more information on the victims. Lockhart uncovers a file that contains child pornography picture and videos and documents his findings (Shinder, 2010). These acts are in violation of Penal Code sections 502(c) (1) (computer access and fraud); 529 (impersonation of another person); 520 (extortion) and 311.11(a) (possession of child

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    The factors that have limited local law enforcement’s efforts against digital crime are lack of training, lack of diagnostic equipment, lack of management level recognition and support, and a lack of specialized personnel. First off, training is a paramount need for local law enforcement. Many of the officers appointed to computer crimes at the local level do not have the requisite knowledge to deal with these types of crimes. Some of these officers are even put into these roles when they don’t even want to. Also, the lack of training to patrol officers could lead to valuable evidence being inadvertently destroyed. Most local agencies lack the equipment necessary to conduct digital forensics. Many local experts have even been reported to have purchased their own equipment to do their job (Taylor, et. al., 2011). The lack of management support and recognition of computer crime analysis has led to the lack of funding for these local cyber units. With a lack of funding comes a lack of equipment, training, and the ability for personnel to specialize in digital forensics.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hess, K. M., and C. H. Orthmann. Criminal investigation. 9. clifton park, NY: Delmar Pub, 2010.…

    • 1083 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Crime Theories

    • 353 Words
    • 2 Pages

    In conclusion I selected one (1) of the theories suggested to be the cause of digital crime and explain the theory in…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The increasing number of both criminal and civil cases is developing towards relying heavily on digital evidence and Internet activity. The ability to examine a criminals browsing history is often critical in not only high-profile criminal cases, but also in minor fraud cases. Web browser artifacts can help find offenses ranging from corporate policy violations, committed by employees of the company, to more serious crimes like child pornography or hacking related offenses. Even if the investigated crime itself isn’t a literal computer crime, the suspect…

    • 1025 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Collecting evidence is an essential factor to the world of criminology. The evidence can determine whether the person is guilty or not guilty. The matter of handling evidence correctly becomes a priority to anyone who is working in the case.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information Technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to more easier, speedy, efficient, and time saving method of transactions. Internet has emerged as a blessing for the present pace of life but at the same time also resulted in various threats to the consumers and other institutions for which it’s proved to be most beneficial. Various criminals like hackers, crackers have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Provider’s (IP) address, spoofing, phishing, internet phishing etc. and have been successful in gaining “unauthorised access” to the user’s computer system and stolen useful data to gain huge profits from customer’s accounts…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Problems of Cyber Crime

    • 1047 Words
    • 5 Pages

    Rapid developing of telecommunications and global computer networks has created the reasons, which allow to commit of cyber crimes in the high technologies field more easier. The telecommunication technologies opportunities use by criminal organizations very widely. The typical examples of such kind of crimes are:…

    • 1047 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Crime

    • 580 Words
    • 3 Pages

    From 2003 to 2012, the Anti-Transnational Crime Division (ATCD) of the Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) looked into 2,778 referred cases of computer crimes from government agencies and private individuals nationwide.…

    • 580 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crimes

    • 444 Words
    • 2 Pages

    Today Internet has become an integral part of everyone's life. In fact Internet is a world of virtually unlimited possibilities for all of us. But sadly also for the criminals. Every day they attack our computers, steal personal and confidential information, or send false messages. So, being an Information security student I, Shweta gupta would like to tell everyone present here about what actually is a crime over the internet. Any crime that involves the use of computer, network, devices, internet is termed as Cyber Crime. Today, the keyboard has become a more powerful tool and can be used to commit any crime easily by sitting at just one place. According to the National Crime Records Bureau, the cyber crimes in India has increased by 47.5% in past few years. Seven out of ten frauds are cyber crimes.…

    • 444 Words
    • 2 Pages
    Good Essays