Essay on Computer Crimes

Essay on Computer Crimes

In the modern era, computers and the networks grew rapidly and at the same time it increased many opportunities for criminal activities, and organizations, law enforcement agencies are struggling to keep up from those attacks. Computer crimes not only include unauthorized user access but also include fraud, identity theft, altering user’s data, holding user information until ransom paid. Several methods of committing computer crimes are distributed denial of service (DDOS) attacks, ransomware attacks, viruses, worms, social engineering, phishing, key loggers. Computer crimes are rapidly growing which affecting many organizations and users as these crimes are frequently conducting in bulk and crimes span to the globe which leads to increased difficulty in finding the attackers.

Unauthorized access, informally called hacking which is a classic example of computer crimes. In so many ways, unauthorized access to a computer or computer system is like trespass which includes gaining access to sensitive information. An attacker can use the unauthorized access to the computer system in order to convert and use as per the attacker needs. A common example of such attacks called a botnet. A botnet is a computer network built on compromised systems that are used for resource-intensive tasks such as sending unwanted advertisement emails to a very large set of individuals at a time.

In recent years, there were many computer crimes conducted by attackers which affected many organizations and individuals by using the vulnerabilities found on the computer operating system. A common example of such an attack is ransomware attacks. A ransomware attack is one of the greatest security risks that most organizations currently face. Over the past few years, these attacks have been growing as it has the potential to cause much bigger damage to organizations which was evidenced in the last few years. The 2017 Ransomware WannaCry attacks and considered it as the biggest ransomware attack ever happen. This attack affected more than 200,000 computers across 180 countries including Britain’s National Health Services (Fruhlinger, 2018). WannaCry attacks mostly targeted Microsoft Windows operating system because of a vulnerability detected in the window’s server message block (SMB) protocol (Kilpatrick, 2019).

WannaCry ransomware first arrived on the malicious computer as a dropper program, a program that installs a malware onto a system drive or any other memory media which then extracts all other application components and then it proceeds to search/lookup for the kill switch to shut the device completely, if the kill switch hasn’t found on the computer, then the malware tried to encrypt all or some of the computer server data (Fruhlinger, 2018). Malware also tried to exploit the SMB vulnerability of windows operating system to spread out to other computer servers over the organization/user’s network rapidly and then displayed a ransom notice that your files have been encrypted and demanded payment through bitcoin. However, Microsoft has released the patch to the vulnerability before the attack, but the affected systems were not updated with the latest security patch and because of the unpatched systems were vulnerable to WannaCry ransomware attack.

In 2017 Equifax data was breached which is one of the largest credit card bureaus in US history, data breach revealed hundreds of millions of personnel user information were stolen including SSN, E-mails, addresses, date of births. Hackers used the vulnerability found on Apache struts, an enterprise open-source framework for creating enterprise Java applications. Attackers sent an HTTP request with malicious code which inserted into content header through the Equifax complaint web portal, in which struts could be tricked into running the code which opened to further intrusion into the system. The attackers were able to move the web portal to other servers because the Equifax system was not segmented, and the attackers were able to find the user information which was stored in plain text. However, Apache has released the patch for the vulnerability, but the Equifax didn’t patch the system on-time which resulted in the biggest data breach. The attacker was also able to pull the user’s information from the network in encrypted form in which Equifax was unable to detect the data transfer for months because Equifax mainly failed to renew their encryption certificate to one of their security tools.

In 2016, FACC an Austrian aerospace parts maker lost around $61 million through the attack that happens through email phishing. A hacker posed as the CEO of FACC and sent an email to an entry-level accounting employee of FACC who transferred the funds to a fake project resulting in a loss of million dollars. Phishing is the kind of situation where it underscores the importance of having strong security guidelines, educating the employees with cybersecurity awareness. The phishing attack has resulted in the company suing the CEO and CTO for not implementing strong security infrastructure, training employees and failed to set up internal controls.

Computer crimes have severe consequences if they are not addressed properly including loss of company user data such as credit cards, SSN, addresses and user information, company reputation and law settlements. In order, to protect the company assets from these computer crimes organizations must enforce strong security guidelines, training employees, frequently running security scans by using Microsoft business security analyzer which can run scans on an individual server or set of servers over the network by providing the IP Address range on the MBSA user interface. MBSA scan results are stored in XML format and can be able to review results set in HTML format, these reports include all the successful and failed tests along with the corrective measures and provide guidance how to resolve the issues. Scan result sets also include severity ratings from low too high in accordance with Microsoft’s recommended security standards. MBSA scans can be run through command-line interface and can be scheduled to run at any time. Running MBSA scans regularly will protect the windows server because it helps us in finding security misconfigurations, suggestions to improve the security standards and most importantly the MSBA scan also verifies whether system was updated or not if not, we need to install the patches on the system. Installing security patches, we can overcome the vulnerabilities found on the OS or the applications so, that we can avoid major computer crimes such as Ransomware. It is also equally important to enforce strong firewall rules to filter out the traffic in and out of network based on the current and future business requirements and need to make sure to review the firewall rules regularly so, no unauthorized users can pass through the firewalls and by strictly limiting open ports to prevent intruders from entering the corporate network.

Use of Computer in Criminal Investigation

Use of Computer in Criminal Investigation

Technological advancement in the criminal investigation system.

Technology is present everywhere in life and it became part of our life. Jobs related to criminal justice today involves GPS, advanced camera, robots, etc. all these technologies improve investigation system and made it easier. Some details about technologies are given below.

Database & information exchange

The computer database system is an important technology for criminal investigation systems. There are many database systems that deal with the profiling of criminals. They can also deal with DNA testing, hot-spot analysis, etc. this database can be transferred much faster between states and countries. There are Advanced matching technologies are also available. Also, there are many biometric tools that analyze fingerprints in more detail.

Digital video recording

The cameras that use this technology are in the practice already. These technologies are very practical and affordable. The video captured by this digital camera serves as important proof in the investigation system. These cameras are light weighted and don’t require more space and allow a police officers to carry them with their uniform or their car.

3D imaging of a crime scene

This technology looks like a part of science fiction. These devices take a 3D scan of the crime scene, switching a lot of photos. This way crime scenes can be shown in detail. By this method, crime scenes can be visualized and some missing proof can be found. This technology makes the investigation system easier and fast compared to the old system.

Crime pattern analysis system

The CPAC provides digital maps which display all or specific crimes that occur in a specific area. This system analyzes the data and prepares a colored graphical map to show the density of specific crimes. It also has a feature, using statics it extrapolates the total crime figure for many days and also predicts where crime will occur tomorrow.

Regional crime analysis project

This project was started by the university of Virginia along with their local police department. Recap uses a GIS with machine learning and statistical analysis to examine a corporate database. This system’s effectiveness is still good.

Ottawa police service

The Ottawa police service, Canada began the development of an expert system to investigate crime.

Eight initial functionality goals were set:

  1. Provide support for recording and gathering case data
  2. Generate suspect characteristics from the case
  3. Provide easy access to the investigators
  4. Identify the motive of suspects and cleared the cases
  5. Generate the list of possible suspects
  6. Identify patterns in the area
  7. Generate reports in the appropriate format
  8. Provide a graphic display capability

This system is used by many Canadian police departments and is marketed by a private software company.

Investigation management software

Case management software is a web-based solution to manage investigations. Dashboard reporting and custom report writing ability give you data on case status and crime trends. This software can be used for the investigation of fraud, employee relationships, privacy, security, and health and safety. It maintains complete case histories with instant access to all related information. Ex. i-sight, logikcull, formdocs etc.

Thus many new technologies help crime investigation systems. Some technologies are still under development like drones, robots, etc. these technologies also helps criminal to do crime effectively so investigation systems have to be one step ahead.

References:

  1. https://www.practicepanther.com/blog
  2. Personal interview with Mr. Paul Lee, Information Systems, Devon and Cornwall Constabulary 1600 hours Friday 3rd October 1997.
  3. Brahan, J.W. Valcour, L. Shevel, R. (1993), “The Investigator’s Notebook”, Unknown source, pp 37-46.
  4. Cantor D. V. (1994), Criminal Shadow Harper Collins, London.
  5. CRIS Sales Promotion Literature, Crime report Information System, Department of Technology, Metropolitan Police, London, England, 1997.
  6. https://www.capterra.com/investigation-management-software/