CYBER ABUSE, CYBER CRIME

By: Richard Albee
DataChasers, Inc.

Tel: 877-DataExam (877-328-2392)
Website: www.DATACHASERS.COM

The Internet is a vast universe of discovery, with items of interest for everyone–regardless of your particular curiosity. Unfortunately, this availability often leads to abuse, and sometimes to crime. But, not unlike adolescent discovery, the steps to cybercrime are achieved in stages.

The first stage is availability

Without access to the Internet the potential for abuse becomes a moot point. It was common, several years ago, to simply advise employers against allowing employees access to the Internet; this is no longer practical. Internet access is an integral part of many businesses, and certainly a part of everyday life…
Read the Entire Article

DataChasers, Inc., is a select, exclusive computer forensics and e-discovery company. Our examiners find the evidence, interpret it, evaluate its importance, and articulate those facts to a jury. Computer forensics and e-discovery is our only business, and we welcome your inquiries about the process, or our procedures.

____________________________________________________________________________________________

CSI COMPUTER FORENSICS – Real Cases From Burgess Forensics #9 – The Case of the Teacher and the Trickster

By: Steven G. Burgess
Tel: (866) 345-3345

Website: www.BurgessForensics.com

The stories are true; the names and places have been changed to protect the potentially guilty.

It was a grey October day, the kind of day when a guy likes to cozy up next to a bank of servers to keep warm, when the Teacher first called me. “They think I’m nuts” were the words emanating from the phone. Well, just because you’re paranoid doesn’t mean they’re not out to get you. I sat up and went to my desk, away from the noisy fans cooling off all those Gigahertzes. “What’s the problem, Miss?”

The young woman explained that she was a not-yet-tenured teacher in a New England (greyer there than here) high school with a problem. Seems that a student in one of her classes was repeating things in the classroom that she had uttered only the night before in the apparently illusory privacy of her own living room…
Read the Entire Article

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the principal of Burgess Forensics, and a contributor to the just released Scientific Evidence in Civil and Criminal Cases, 5th Edition by Moenssens, et al.

Read More Articles on Computer Forensics

Posted by Experts-Blog

One Comment

  1. Among the advice/tips discussed, the best in my opinion is for employers to include cyber use policies in the employees’ manual. Having this in place sends signals to employees that employers are quite serious about such cyber crime/offenses. Ensuring that employees sign and accept the policies makes it binding. HR Department should be able to strictly implement it.

    Henry Ione
    Real World Computer Science

    Reply

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s