Challenges and Solutions in Investigating Computer Crimes

Verified

Added on  2023/05/30

|7
|774
|390
AI Summary
Computer crimes are rapidly growing as information technology worldwide grows. In as much as local enforcement and municipalities are doing all they can in investigating computer crimes and trying to stop them, they encounter so many challenges and obstacles in their work. This article discusses the challenges faced by local enforcement and municipalities in investigating computer crimes and suggests solutions to improve their investigative response.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: COMPUTER CRIMES 1
Network and Security
Student’s Name
University Affiliation

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
Computer crimes are rapidly growing as information technology worldwide grows. In as
much as local enforcement and municipalities are doing all they can in investigating computer
crimes and trying to stop them, they encounter so many challenges and obstacles in their work.
According to Baryamureeba, & Tushabe, (2004), there are some reasons which give them a
challenge during investigations which are;
Lack of enough resources- Many departments which do investigations may have limited
resources like tools, new technologies, enough skills and expertise in the field of investigation.
For instance, the technology of drones can help during investigations as they are used for
surveillance and monitoring in various places or departments.
Lack of enough wide recognition of computer crimes- Computer crimes are rapidly
growing but they are not being recognized. Some people are ignoring that computer crimes exist
and are increasing at a higher rate. These people take minimal actions to deal with the problem
because they lack knowledge about the issue.
Components that local law enforcement agencies should have to improve their
investigative response (Taylor, Fritsch, & Liederbach, 2014).
Adding the number of experts- Increasing the number of experts makes work easier and
fast. These people must be competent in work, with good skills in investigations, technically
proficient and up to date with the new technology the criminals are using.
Adopting high technology- Agencies should adopt high technology like the multiagency
high technology task force which is used in California to improve their investigative response.
For example, the use of Global Positioning System (GPS) helps to track and show the location of
suspects faster or their movements.
Document Page
3
Use of honey ports- This will help agencies to learn the type of tools which the attackers
are using. In this case, they can develop mechanisms which will control attacks using those tools.
Document Page
4
References
Baryamureeba, V., & Tushabe, F. (2004, August). The enhanced digital investigation process
model. In Proceedings of the Fourth Digital Forensic Research Workshop (pp. 1-9).
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
Considerations that must be addressed when developing a search warrant
application during an investigation of computer-related crime according to Broadhurst
(2006).
There must be an evidence to support the occurrence of the crime. You cannot
develop a search warrant application during an investigation if the evidence is not there
and is not available because they are used to show and convince that the crime really
happened.
Another consideration is the place where the evidence was found and a brief
explanation of the evidence for estimation. You should ensure you have enough
information about the evidence and also the place where it was found for proper
investigations.
Single crime scene and multiple crime scenes affect cyber investigations in many
ways (Ciardhuáin, 2004).
First, poor communication and failure to communicate between the investigative
teams slows down investigation which could be postponed to a later date due to some
problems. Secondly, failure to capture undisrupted picture or photo of the crime scene
may affect investigations because it may lead to loss of root cause of the attack.
Therefore, they need to capture and store the data being targeted very well for
investigations.
Thirdly, failure to preserve and protect the crime scene(s) by preventing people
from getting there can make the evidence to be compromised or it may end up being lost.
Fourthly, lack of proper plans and policies on how to carry on with the process, how to
Document Page
6
collect evidence and how to handle the evidence. This will ensure that there is no
contamination of the evidence and the process of investigation is smooth.
Document Page
7
References
Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing:
An International Journal of Police Strategies & Management, 29(3), 408-433.
Ciardhuáin, S. Ó. (2004). An extended model of cybercrime investigations. International
Journal of Digital Evidence, 3(1), 1-22.
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]