A prominent local newspaper in the Washington, DC area has learned through federal channels of the expertise exemplified by your company, XY Investigative Services (XYIS) and would to interview you to discuss the nature and growth of high-tech crime also known as cybercrime, computer crime, Internet crime, and high-tech crime.
In your opinion, who you believe to be the 3 most important people that a forensic investigator must interview to secure evidence in computer-related crimes and 3 questions you would ask them concerning a high-tech crime.
Include what you believe to be the top 3 computer related crimes and how you view the future of computer related crimes in 20 years to change.
Include 3 types of evidence you would initially look for and why, including, but not limited to:
Hard drives
E-mail or text documents
Networks
Interviewer: Thank you for taking the time to speak with us today, Mr. Smith. Can you tell us a little bit about XY Investigative Services and the work that you do?
Me: Sure. XY Investigative Services is a private investigation firm that specializes in high-tech crime. We help businesses and individuals investigate and recover from a wide range of computer-related crimes, including:
We also provide training and consulting services to help businesses protect themselves from cybercrime.
Interviewer: That’s a wide range of services. Can you tell us about the three most important people that a forensic investigator must interview to secure evidence in computer-related crimes?
Me: Sure. The three most important people to interview are:
Here are three questions that I would ask each of these people:
Of course, the specific questions that I would ask would vary depending on the specific crime that was committed.
Interviewer: What do you believe to be the top three computer related crimes today?
Me: The top three computer related crimes today are:
Interviewer: How do you view the future of computer related crimes in 20 years?
Me: I believe that computer related crimes will continue to grow in the future. As technology becomes more sophisticated, so too will the methods that criminals use to exploit it. In 20 years, I believe that we will see even more sophisticated phishing attacks, malware, and ransomware attacks. I also believe that we will see an increase in the number of cyber attacks on critical infrastructure, such as power grids and water systems.
Interviewer: What are three types of evidence that you would initially look for in a computer-related crime investigation?
Me: The three types of evidence that I would initially look for in a computer-related crime investigation are:
I would also look for other types of evidence, such as social media posts, chat logs, and financial records. The specific types of evidence that I would look for would depend on the specific crime that was committed.
Interviewer: Thank you for your time, Mr. Smith. This has been very informative.
Me: You’re welcome. I hope this information was helpful.