Cybercrimes-The FBI, and Obligations-To Prosecute-Be The Difference!
Cybercrimes:
The US FBI&
Federal Law Enforcement-Making:
A Difference Today
11-19-2017: Due Date: Unit 6 Assignment 1
Response By: Miss. Bayo Elizabeth Cary, AA, BA,
MLIS
Capella University, MS NSA Computer Science Training
Program: IAS1005
Professor: Dr. Susan Ferebee
Miss. Bayo Elizabeth Cary,
AA, BA, MLIS
400 NW 1st Avenue,
Apartment: 410,
Gainesville, FL 32601
Email: bayo_caryg1@yahoo.com
Cell: 857-218-0146
11-19-2017
Unit 6 Assignment 1
Response
Response from: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
Directions:
- Digital Forensics and Identification of Cybercrime
You are an IAS Cybercrime Specialist working for a major DoD
contractor. You have been tasked with conducting an 1–2 page analysis and
creating a 5–8 slide PowerPoint presentation on the cybercrime categories of
(1) Using a Computer as a Target of a Crime and (2) Using a Computer as a Tool
to Commit a Crime.
In addition to the required study materials, perform topic
research over the Internet on cybercrime and the impact digital forensics has
had.
The exponential
growth in volume of data with wide variety of devices and formats has led to
rise in use of digital forensics. Maximum use of digital forensics is done by
the federal sector and will grow from $ 1,097.2 Million in 2015 to $2,060.5
Million by 2020. (M2 PressWire: 2020 Market, 2016, p. 1)
Introduction: Cyber Crime, and How it Relates, to Digital
Forensics:
Digital
forensics is a branch of forensic science. It is a process of obtaining,
interpreting and uncovering electronic data from electronic storage devices.
The purpose of this process is to preserve the probative value of anyevidence
so that it can be of use in a court of law. (M2 PressWire:
2020 Market, 2016, p. 1)
Part 1 and Directions:
Write a 1-2
page paper that does the following:
- Describe what Cybercrime is:
Cybercrime, is supported, and perpetrated by Intl terror, to: steal
money, in order to fund, Intl acts, of terrorism. The negative impacts, of cybercrime, are
financial-draining the wealth, of American
Fortune 500 companies, and destroying, both: US, and Intl investment,
and corporate markets (Howell, 2005, p. 1) Challening, continuing safety, of
data, and digital information, stored, and traded online-are, the-major,
American IT businesses, i.e.: Apple, Microsoft (Nakashima, 2016, p.).
“Maximum use of digital forensics is done
by the federal sector and will grow from $ 1,097.2 Million in 2015 to $2,060.5
Million by 2020” (M2 PressWire: 2020 Market, 2016, p. 1). American companies-like: McAfee, Apple,
Microsoft, etc., who are Intl producers, of: software, computers, and other
electronic and OS components-that, facilitate counting processes, assist criminals,
by including in coding: “Illegal Back Doors” (Stephenson, 2014, p. 1).
- Compare Digital Forensics and Cybercrime Methods:
“The concerns of
corporate sector regarding IP theft, data protection and security can be
addressed using digital forensics” (M2 PressWire: 2020 Market, 2016, p. 1). Digital forensics, are especially designed, to
meet the obstacles, which are presented, by various cyber crimes:
The
exponential growth in volume of data with wide variety of devices and formats
has led to rise in use of digital forensics. Maximum use of digital forensics
is done by the federal sector and will grow from $ 1,097.2 Million in 2015 to
$2,060.5 Million by 2020. (M2 PressWire: 2020 Market, 2016, p. 1)
At Capella University,
we have at our disposal, through the MS Forensics, and Security-NSA academic
training program, a: “Digital Forensics, Tool Lab” (NIST, 2014).
On, the NIST, “Data Forensics, Tool
Lab,” there is a long list, of forensic tools, and areas of investigation-that,
they specialize in (NIST, 2014). You-as an investigation, chose an area of
interest-then, you follow the links, to see, what Intl companies, have
provided, as possible: “tools,” to solve-the problems, and to collect, any lost
information, or data (NIST, 2014).
- Identify Cybercrime Instances Where the Computer was a Target of a Crime:
In the US, I have frequently hd problems, with: “hackers,” illegally
“boarding” my computers. In those instances, information, has been stolen,
directl, from my computer’s memory files, and databases. The situation, is
frustrating, and sad. In other situations-far more daunting, the perpetrators,
of information, and data theft-simply stole, the entire computer, the entire,
laptop, the entire server, the entire ipad, and did not worry, about the
technical challenges-of boarding, my computers.
- Describe the Impact of Each Instance where the Computer was a Target:
I have been illegally, “Blacklisted,” and refused all work-since: 2008,
for: “political reasons.” Since, that time: 2008, the beginning of the Obama
Administration-organized transational crime, working closely, with US police,
and government, have stolen, trillions of dollars worth, of: information, work,
computers, and other electronic devices, from me.
The situation-in the US, is incredibly,
unfavorable, for me, in the US. I am an applicant, for political asylum-like:
Snowden, in Europe. I have personally lost, trillions of dollars+, in stolen
data, information, and equipment, and-in, lost wages. I am over-qualified, to
gain employment, in the IT, and related fields. I work, and I study, from dusk,
to dawn-almost every day of the week-through almost 30 years, of undergraduate,
and graduate degree University studies.
The US government, has stolen, all of my: diplomas and transcripts from
me, and almost every electronic device, I have ever owned-while, at the same
time-refusing to offer me employment. However, at this time, I currently have
several applications pending, with the: US FBI. I have no hope, that they will
respond, to my applications. Last night, I had difficulties, with the US NSA
again, and this morning, after speaking to FBI, I had to call: MI5, in the
UK-again.
- Identify Cybercrime Instances where the Computer was used as a Tool to Commit a Crime:
The: “Computer Crime Squad,” was established-after, the 9/11,terror
attacks, as a necessary reaction, to illegal information, being traded, online,
to fund and plan, domestic and Intl, terror attacks (Garfinkel, 2002, p. 68) FBI
report, the first major US cybercrime investigation, they were handed, was in:
1986 (Garfinkel, 2002, p. 68). FBI fear, that IT information, will not be the
only target, of the next massive cyber attack (Garfinkel, 2002, p. 68). FBI,
worry, that cybercrime, is spreading, to almost any electronice device, that
operates, on: OS softwear, i.e. (Garfinkel, 2002, p. 68):
·
Electric Utitilites;
·
Banking Services;
·
News Delivery Infrastructure;
·
Fax Communications;
·
Cellphone Usage;
·
Domestic and Intl Cell Towers;
·
Airport Traffic Control Aviation Direction
Towers, etc. (Garfinkel, 2002, p.
68)
FBI, say, that a major cybercrime, can be
effectively carried out, by only one person, and a personal computer-I do not
know, if that is really true (Garfinkel, 2002, p. 68)? There are some many
issues, pertaining, to, privacy, and additional contacts, and support-that is
required, to even learn materials, that would allow, any individual, to engage,
a full-blow, cyber attack.
- Describe the Impact of Each Instance where the Computer was used as a Tool:
FBI, say, that the IT and cyber crimes, can be some of, the most
challenging crimes (Garfinkel, 2002, p. 74). Cybercrimes, cause mass
destruction, just like: White, and Blue Collarcrimes, and the situations, must
be immediately addressed, or the culprits, could escape, to another country.
Cybercrimes, that are low-budget, attacks, can be perpetrated, with a single
computer: “Lone Wolf,” attack (Garfinkel, 2002, p. 74). An email, cyber attack,
by a school administrator, who flooded email accounts, with infected messages,
was prosecuted, by the FBI-after a 3 year, investigation (Garfinkel, 2002, p.
74).
One primary reason, the impact of cybercrimes, is incredibly severe, in
the US, is the lengthy, evidence collections time periods, that the FBI allows,
in order to establish evidence, to prosecute, the crimes. After 20 years, of
cybercrime exposure, the financial loss, to the US economy, is far greater,
than if, the BI, were to solve the cases, in a few basic weeks, or even a few
months. Sometimes, the criminals, are hidden: “In-plain-sight”-as if, the
perpetrators, were sitting, right across the street-practically, from the
local, FBI, field offices: Gainesville, FL USA.
It
is my sincerest belief, that in those exact situations, when the criminal, is
contacting, the FBI offices-himself, to brag, about the horrendous extent, of
his continuing: cyber warfare and other crimes, the FBI, is under a US Federal
obligation, and duty-to: arrest, and, to prosecute-instead, of continuing to
make excuses. Cybercrime, is only one aspect, on Intl terror, and how
criminals, use: stolen information, and stolen money, to leverage: Americans,
immigrants, and other countries, against the US. When, a criminal, is engaged,
in terrorist activities, that individual, will more-than-likely, also be
engaged, in other aspects, of illegal and illict, activities.
The full-extent, damages, and impact, of cybercrime, and other acts, of
Intl, and domestic terror, against the US, are ruining the country,shutting
down our economy, and-creating a deadly: “Geneocide.” When Americans, talk,
about the legal repercussions, of: Treason, and other acts of terror, against
the US, they seem to have forgotten, that US law states, that the punishment,
for treason-is death. In Florida, we support the death penalty, dependent upon,
the extreme nature, of any given crime. When, a criminal cannot be cured, then,
that person, has to die, for the crime, i.e.: “Hitler, and the Nurenburg
Trials.”
Criminals, who: “participate,” and
willingly support, Intl terror, are: “sociopathic,” and can never be cured-the
mentality, of: “peodiphilles,” there is no hope, for correction. I support, the
FL death penalty, and encourage the application, of such, in cases specifically
pertaining to sociopathic, criminals, i.e.: Charles Manson, Ted Bundy, etc.
FBI, US government, and Federal agents, have a legal responsibility, to
prosecute, to the fullest-extent-of-the-law, in cases that threaten, the lives,
and livelihoods, of innocent, American citizens. I support, my US Federal law
enforcement, and, the reinforcement, of my US Constitutional Rights.
Part 2: PowerPoint presentation that includes the following:
Power Point Presentation:
Separate Discussion Link Submission:
·
A comparison of
digital forensics and cybercrime methods;
·
Some examples of using
a computer as a target of a crime;
·
Some examples of using
a computer as a tool to commit a crime;
·
Some types of impacts
that result from cybercrime;
·
Some Internet sources
on cybercrime information.
References
Anonymous. (2009). MICROSOFT:
Microsoft and National White Collar Crime Center Make Digital Forensics Tool Available
to U.S. Law Enforcement Agencies; COFEE tool captures live computer evidence
and gives law enforcement agencies a technological edge in the battle against
digital crimes. M2 PressWire:
Coventry. Retrieved from www.proquest.com
Garfinkel, Simson. (2002). The
FBI’s Cybercrime Crack Down. Technology Review. Vol. 105, No. 9. p. 66-74.
Retrieved from www.technologyreview.com
Howell, Beryl, A. (2005).
Cyber Security Liability: Is It Time To Get Off
The Soap Box. Computer and Internet Lawyer: Security. Vol. 22. No. 5. p.
1-4. (Double-Check).
M2 PressWire: 2020 Market. (2016). Digital
Forensic Market Worth USD 4.8 Billion by
2020. M2 PressWire:
Coventry. Retrieved from www.proquest.com
Nakashima, E. (2016).
Apple vows to resist FBI demand to crack iPhone linked to San Bernadino
attacks. Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino
shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html
National Institute of
Standards and Technology (NIST). (2014). Computer
forensics tool catalog. Retrieved from http://www.cftt.nist.gov/tool_catalog/index.php
Stephenson, Peter. (2014). Digital Forensic Tools. SC
Magazine. Retrieved from www.scmagazine.com
Comments
Post a Comment