Tracking the Cybercrime Trail by Bryan Sartin – Article Example

Download free paperFile format: .doc, available for editing

The paper "Tracking the Cybercrime Trail by Bryan Sartin" is a good example of an article on law. Technology is changing every day as a result of innovation. The rate at which people and organization are using computers has increased highly. There are risks involved in using computers and these risks have also been on the rise. Cybercrime is one security risk that has been discovered. This fraud occurs as a result of increased usage of computers and internet. In this assignment will tackle a number of questions with regard to an article by Sartin, Bryan about Tracking the Cybercrime Trail: In Addition to Knowing How to Follow the Bits of Evidence, Forensic Detectives Must Know How to Work with Law Enforcement.   Problem was identified and steps are taken to solve the problem According to Sartin (2004), the number of fraud was discovered to be on the increase by credit card associations and issuers.

The fraud is said to have been taking place for over three to four months stretch. Sartin states that by the look, the types and patterns of the cybercrime originated from one source.

The main source was identified to be a company that sells electronic payment software to various retail outlets such as internet companies, retail stores, and restaurants. No law enforcement was made since sufficient evidence was not there. The credit card issuers and associations came together decided to launch an investigation for cybercrime since there was difficult to enforce the law against the alleged company for cybercrime. The forensic investigations were to be carried out by Ubizen and began by contacting the alleged company to informing the company about the investigation regarding security breach within their production network environment.

Urizen also sorts for Maximum Corporation and the company was ready to cooperate though it said it was not aware of the security breach. Stages of Investigation In every forensic investigation, there has to be a forensic report. This report has methodologies or stages and it has to be a good one because if it’ s a poor one the results are rendered to be null. The stages include: a) Problem definition The main problem here was identified to be cybercrime a form of a security breach.

The main strategy after defining the problem was to get the source of the crime. In starting an article, the investigators made a discovery process before going to the site to gather evidence. This was done to identify the problem and its source. b) Gathering data The main goal of every forensic investigation is to gather evidence. Therefore, raw data has to be gathered before a conclusion is made. Here, the main strategy used by the investigator was by contacting the company alerting them about the security breach.

They also informed the company that they would send independent investigators to collect evidence. c) Evaluating and Analyzing the report When the raw data is collected it is analyzed and evaluated to ensure that it is in line with the goal of the forensic investigation. The analyzed data is usually referred to as findings which should have supportive details. According to Sartin, the investigators found out that the fraud was as a result of duplicated credit cards. The credit card duplicates are usually unauthorized and criminals use them in purchasing products using falsified information.

d) Conclusion The analysis was made after the investigations for the company and the report concluded that there was insufficient evidence were collected regarding the security breach. Therefore, no law would be enforced to the alleged company against cybercrime. Identifying and catching Criminals Apart from identifying and catching the criminal, the investigations also wanted to discover how the crime was being committed. In Sartin's article, the investigator's in-depth analyses indicate that the crime resulted from duplicated credit cards. The in-depth analysis also shows that for a credit card to be duplicated, one would require account information contained in the magnetic stripe at the back of the credit card.

There another ultimate goal of the crime was to alert the credit card issuers and association on how such crimes occur. Such awareness helps them to increase their security system with regard to credit cards. They also alert credit cardholders of such crimes so that such crimes are minimal in the future. Type(s) of Cybercrime There are about ten types of cybercrimes but the one that suits the type of crime discussed in Sartin's article is the credit card crime.

For such a crime to happen, one simply the credit card number into the website page of the vendor for only online transactions. In Sartin's article, it was discovered that credit cards were being duplicated. In cases where the electronic card is insecure hackers misuse the card by impersonating the owner of the credit card.

Download free paperFile format: .doc, available for editing
Contact Us