Cybercrimes-The FBI, and Obligations-To Prosecute-Be The Difference!










Cybercrimes:



 The US FBI&

Federal Law Enforcement-Making:

 A Difference Today

























11-19-2017: Due Date: Unit 6 Assignment 1

Response By: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

Capella University, MS NSA Computer Science Training Program: IAS1005

Professor: Dr. Susan Ferebee























Miss. Bayo Elizabeth Cary, AA, BA, MLIS

400 NW 1st Avenue, Apartment: 410,

Gainesville, FL 32601


Cell: 857-218-0146



11-19-2017





Unit 6 Assignment 1 Response

Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS





Directions:



  • Digital Forensics and Identification of Cybercrime

You are an IAS Cybercrime Specialist working for a major DoD contractor. You have been tasked with conducting an 1–2 page analysis and creating a 5–8 slide PowerPoint presentation on the cybercrime categories of (1) Using a Computer as a Target of a Crime and (2) Using a Computer as a Tool to Commit a Crime.

In addition to the required study materials, perform topic research over the Internet on cybercrime and the impact digital forensics has had.



The exponential growth in volume of data with wide variety of devices and formats has led to rise in use of digital forensics. Maximum use of digital forensics is done by the federal sector and will grow from $ 1,097.2 Million in 2015 to $2,060.5 Million by 2020. (M2 PressWire: 2020 Market, 2016, p. 1)





Introduction: Cyber Crime, and How it Relates, to Digital Forensics:



Digital forensics is a branch of forensic science. It is a process of obtaining, interpreting and uncovering electronic data from electronic storage devices. The purpose of this process is to preserve the probative value of anyevidence so that it can be of use in a court of law. (M2 PressWire: 2020 Market, 2016, p. 1)







Part 1 and Directions:

Write a 1-2 page paper that does the following:



    1. Describe what Cybercrime is:





       Cybercrime, is supported, and perpetrated by Intl terror, to: steal money, in order to fund, Intl acts, of terrorism.  The negative impacts, of cybercrime, are financial-draining the wealth, of American  Fortune 500 companies, and destroying, both: US, and Intl investment, and corporate markets (Howell, 2005, p. 1) Challening, continuing safety, of data, and digital information, stored, and traded online-are, the-major, American IT businesses, i.e.: Apple, Microsoft (Nakashima, 2016, p.).





        Maximum use of digital forensics is done by the federal sector and will grow from $ 1,097.2 Million in 2015 to $2,060.5 Million by 2020” (M2 PressWire: 2020 Market, 2016, p. 1). American companies-like: McAfee, Apple, Microsoft, etc., who are Intl producers, of: software, computers, and other electronic and OS components-that, facilitate counting processes, assist criminals, by including in coding: “Illegal Back Doors” (Stephenson, 2014, p. 1).



    1. Compare Digital Forensics and Cybercrime Methods:





The concerns of corporate sector regarding IP theft, data protection and security can be addressed using digital forensics” (M2 PressWire: 2020 Market, 2016, p. 1). Digital forensics, are especially designed, to meet the obstacles, which are presented, by various cyber crimes:





The exponential growth in volume of data with wide variety of devices and formats has led to rise in use of digital forensics. Maximum use of digital forensics is done by the federal sector and will grow from $ 1,097.2 Million in 2015 to $2,060.5 Million by 2020. (M2 PressWire: 2020 Market, 2016, p. 1)





At Capella University, we have at our disposal, through the MS Forensics, and Security-NSA academic training program, a: “Digital Forensics, Tool Lab” (NIST, 2014).





       On, the NIST, “Data Forensics, Tool Lab,” there is a long list, of forensic tools, and areas of investigation-that, they specialize in (NIST, 2014). You-as an investigation, chose an area of interest-then, you follow the links, to see, what Intl companies, have provided, as possible: “tools,” to solve-the problems, and to collect, any lost information, or data (NIST, 2014).





    1. Identify Cybercrime Instances Where the Computer was a Target of a Crime:





       In the US, I have frequently hd problems, with: “hackers,” illegally “boarding” my computers. In those instances, information, has been stolen, directl, from my computer’s memory files, and databases. The situation, is frustrating, and sad. In other situations-far more daunting, the perpetrators, of information, and data theft-simply stole, the entire computer, the entire, laptop, the entire server, the entire ipad, and did not worry, about the technical challenges-of boarding, my computers.





    1. Describe the Impact of Each Instance where the Computer was a Target:





        I have been illegally, “Blacklisted,” and refused all work-since: 2008, for: “political reasons.” Since, that time: 2008, the beginning of the Obama Administration-organized transational crime, working closely, with US police, and government, have stolen, trillions of dollars worth, of: information, work, computers, and other electronic devices, from me.





         The situation-in the US, is incredibly, unfavorable, for me, in the US. I am an applicant, for political asylum-like: Snowden, in Europe. I have personally lost, trillions of dollars+, in stolen data, information, and equipment, and-in, lost wages. I am over-qualified, to gain employment, in the IT, and related fields. I work, and I study, from dusk, to dawn-almost every day of the week-through almost 30 years, of undergraduate, and graduate degree University studies.





        The US government, has stolen, all of my: diplomas and transcripts from me, and almost every electronic device, I have ever owned-while, at the same time-refusing to offer me employment. However, at this time, I currently have several applications pending, with the: US FBI. I have no hope, that they will respond, to my applications. Last night, I had difficulties, with the US NSA again, and this morning, after speaking to FBI, I had to call: MI5, in the UK-again.





    1. Identify Cybercrime Instances where the Computer was used as a Tool to Commit a Crime:





       The: “Computer Crime Squad,” was established-after, the 9/11,terror attacks, as a necessary reaction, to illegal information, being traded, online, to fund and plan, domestic and Intl, terror attacks (Garfinkel, 2002, p. 68) FBI report, the first major US cybercrime investigation, they were handed, was in: 1986 (Garfinkel, 2002, p. 68). FBI fear, that IT information, will not be the only target, of the next massive cyber attack (Garfinkel, 2002, p. 68). FBI, worry, that cybercrime, is spreading, to almost any electronice device, that operates, on: OS softwear, i.e. (Garfinkel, 2002, p. 68):





·         Electric Utitilites;

·         Banking Services;

·         News Delivery Infrastructure;

·         Fax Communications;

·         Cellphone Usage;

·         Domestic and Intl Cell Towers;

·         Airport Traffic Control Aviation Direction Towers, etc. (Garfinkel, 2002, p. 68)





FBI, say, that a major cybercrime, can be effectively carried out, by only one person, and a personal computer-I do not know, if that is really true (Garfinkel, 2002, p. 68)? There are some many issues, pertaining, to, privacy, and additional contacts, and support-that is required, to even learn materials, that would allow, any individual, to engage, a full-blow, cyber attack.





    1. Describe the Impact of Each Instance where the Computer was used as a Tool:





         FBI, say, that the IT and cyber crimes, can be some of, the most challenging crimes (Garfinkel, 2002, p. 74). Cybercrimes, cause mass destruction, just like: White, and Blue Collarcrimes, and the situations, must be immediately addressed, or the culprits, could escape, to another country. Cybercrimes, that are low-budget, attacks, can be perpetrated, with a single computer: “Lone Wolf,” attack (Garfinkel, 2002, p. 74). An email, cyber attack, by a school administrator, who flooded email accounts, with infected messages, was prosecuted, by the FBI-after a 3 year, investigation (Garfinkel, 2002, p. 74).



  

        One primary reason, the impact of cybercrimes, is incredibly severe, in the US, is the lengthy, evidence collections time periods, that the FBI allows, in order to establish evidence, to prosecute, the crimes. After 20 years, of cybercrime exposure, the financial loss, to the US economy, is far greater, than if, the BI, were to solve the cases, in a few basic weeks, or even a few months. Sometimes, the criminals, are hidden: “In-plain-sight”-as if, the perpetrators, were sitting, right across the street-practically, from the local, FBI, field offices: Gainesville, FL USA.





        It is my sincerest belief, that in those exact situations, when the criminal, is contacting, the FBI offices-himself, to brag, about the horrendous extent, of his continuing: cyber warfare and other crimes, the FBI, is under a US Federal obligation, and duty-to: arrest, and, to prosecute-instead, of continuing to make excuses. Cybercrime, is only one aspect, on Intl terror, and how criminals, use: stolen information, and stolen money, to leverage: Americans, immigrants, and other countries, against the US. When, a criminal, is engaged, in terrorist activities, that individual, will more-than-likely, also be engaged, in other aspects, of illegal and illict, activities.





       The full-extent, damages, and impact, of cybercrime, and other acts, of Intl, and domestic terror, against the US, are ruining the country,shutting down our economy, and-creating a deadly: “Geneocide.” When Americans, talk, about the legal repercussions, of: Treason, and other acts of terror, against the US, they seem to have forgotten, that US law states, that the punishment, for treason-is death. In Florida, we support the death penalty, dependent upon, the extreme nature, of any given crime. When, a criminal cannot be cured, then, that person, has to die, for the crime, i.e.: “Hitler, and the Nurenburg Trials.”





         Criminals, who: “participate,” and willingly support, Intl terror, are: “sociopathic,” and can never be cured-the mentality, of: “peodiphilles,” there is no hope, for correction. I support, the FL death penalty, and encourage the application, of such, in cases specifically pertaining to sociopathic, criminals, i.e.: Charles Manson, Ted Bundy, etc. FBI, US government, and Federal agents, have a legal responsibility, to prosecute, to the fullest-extent-of-the-law, in cases that threaten, the lives, and livelihoods, of innocent, American citizens. I support, my US Federal law enforcement, and, the reinforcement, of my US Constitutional Rights.



Part 2: PowerPoint presentation that includes the following:



Power Point Presentation: Separate Discussion Link Submission:

·         A comparison of digital forensics and cybercrime methods;

·         Some examples of using a computer as a target of a crime;

·         Some examples of using a computer as a tool to commit a crime;

·         Some types of impacts that result from cybercrime;

·         Some Internet sources on cybercrime information.







References



Anonymous. (2009). MICROSOFT: Microsoft and National White Collar Crime Center Make Digital Forensics Tool Available to U.S. Law Enforcement Agencies; COFEE tool captures live computer evidence and gives law enforcement agencies a technological edge in the battle against

digital crimes. M2 PressWire: Coventry. Retrieved from www.proquest.com





Garfinkel, Simson. (2002). The FBI’s Cybercrime Crack Down. Technology Review. Vol. 105, No. 9. p. 66-74. Retrieved from www.technologyreview.com





Howell, Beryl, A. (2005). Cyber Security Liability: Is It Time To Get Off  The Soap Box. Computer and Internet Lawyer: Security. Vol. 22. No. 5. p. 1-4. (Double-Check).



M2 PressWire: 2020 Market. (2016). Digital Forensic Market Worth USD 4.8 Billion by

2020. M2 PressWire: Coventry. Retrieved from www.proquest.com



Nakashima, E. (2016). Apple vows to resist FBI demand to crack iPhone linked to San Bernadino attacks. Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html



National Institute of Standards and Technology (NIST). (2014). Computer forensics tool catalog. Retrieved from http://www.cftt.nist.gov/tool_catalog/index.php



Stephenson, Peter. (2014). Digital Forensic Tools. SC Magazine. Retrieved from www.scmagazine.com


Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2