HSM 438: Challenges & Solutions in Local Computer Crime Investigation

Verified

Added on  2023/05/30

|7
|774
|390
Discussion Board Post
AI Summary
This discussion post addresses the challenges local law enforcement and municipalities face when investigating computer crimes, such as a lack of resources and recognition of the severity of these crimes. It highlights key components for improving investigative response, including increasing the number of experts, adopting high technology like GPS and multiagency task forces, and using honey ports to understand attacker tools. The post also considers the development of search warrant applications, emphasizing the need for supporting evidence and proper documentation of crime scenes. Furthermore, it examines how single and multiple crime scenes affect cyber investigations, focusing on issues like communication failures, evidence preservation, and the importance of well-defined plans and policies for evidence collection and handling. The content references established works in the field, providing a comprehensive overview of the complexities involved in investigating computer-related crimes and is available on Desklib for students.
Document Page
Running Head: COMPUTER CRIMES 1
Network and Security
Student’s Name
University Affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Computer crimes are rapidly growing as information technology worldwide grows. In as
much as local enforcement and municipalities are doing all they can in investigating computer
crimes and trying to stop them, they encounter so many challenges and obstacles in their work.
According to Baryamureeba, & Tushabe, (2004), there are some reasons which give them a
challenge during investigations which are;
Lack of enough resources- Many departments which do investigations may have limited
resources like tools, new technologies, enough skills and expertise in the field of investigation.
For instance, the technology of drones can help during investigations as they are used for
surveillance and monitoring in various places or departments.
Lack of enough wide recognition of computer crimes- Computer crimes are rapidly
growing but they are not being recognized. Some people are ignoring that computer crimes exist
and are increasing at a higher rate. These people take minimal actions to deal with the problem
because they lack knowledge about the issue.
Components that local law enforcement agencies should have to improve their
investigative response (Taylor, Fritsch, & Liederbach, 2014).
Adding the number of experts- Increasing the number of experts makes work easier and
fast. These people must be competent in work, with good skills in investigations, technically
proficient and up to date with the new technology the criminals are using.
Adopting high technology- Agencies should adopt high technology like the multiagency
high technology task force which is used in California to improve their investigative response.
For example, the use of Global Positioning System (GPS) helps to track and show the location of
suspects faster or their movements.
Document Page
3
Use of honey ports- This will help agencies to learn the type of tools which the attackers
are using. In this case, they can develop mechanisms which will control attacks using those tools.
Document Page
4
References
Baryamureeba, V., & Tushabe, F. (2004, August). The enhanced digital investigation process
model. In Proceedings of the Fourth Digital Forensic Research Workshop (pp. 1-9).
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
Considerations that must be addressed when developing a search warrant
application during an investigation of computer-related crime according to Broadhurst
(2006).
There must be an evidence to support the occurrence of the crime. You cannot
develop a search warrant application during an investigation if the evidence is not there
and is not available because they are used to show and convince that the crime really
happened.
Another consideration is the place where the evidence was found and a brief
explanation of the evidence for estimation. You should ensure you have enough
information about the evidence and also the place where it was found for proper
investigations.
Single crime scene and multiple crime scenes affect cyber investigations in many
ways (Ciardhuáin, 2004).
First, poor communication and failure to communicate between the investigative
teams slows down investigation which could be postponed to a later date due to some
problems. Secondly, failure to capture undisrupted picture or photo of the crime scene
may affect investigations because it may lead to loss of root cause of the attack.
Therefore, they need to capture and store the data being targeted very well for
investigations.
Thirdly, failure to preserve and protect the crime scene(s) by preventing people
from getting there can make the evidence to be compromised or it may end up being lost.
Fourthly, lack of proper plans and policies on how to carry on with the process, how to
Document Page
6
collect evidence and how to handle the evidence. This will ensure that there is no
contamination of the evidence and the process of investigation is smooth.
Document Page
7
References
Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing:
An International Journal of Police Strategies & Management, 29(3), 408-433.
Ciardhuáin, S. Ó. (2004). An extended model of cybercrime investigations. International
Journal of Digital Evidence, 3(1), 1-22.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]