Identify and describe two or three traditional crimes in which computers are now used as an instrument. How has the nature of these crimes changed as a result of technology?
What is anonymity on the Internet? What are the pros and cons of anonymity?
Find a spam or phishing e-mail in your e-mail account. Analyze the condensed and full e-mail header fields. What did you observe? Which header fields were included in the chosen e-mail that were not covered in this week? What forensic value do they hold, if any?
What is the difference between stand-alone and networked computers? What are the different types of computer networks?
Mobile devices have been the targets of crimes, have been used to commit crimes, and have held evidence of crimes. Conduct an online search for a case (not described this week) where a mobile device (PDA, mobile phone, or smart phone) was involved in a criminal or civil investigation. What were the facts of the case? What was the role of the device in the investigation?
Traditional crimes that use computers as an instrument
The electronic age of personal computers and various devices have all been used as portals for information and various ways of communicating with others. However, there are many individuals throughout the world who have utilized these machines for committing crimes of a myriad of types. Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends. Computers are now used as an instrument in traditional crimes such as bank robbery and fraud. When committing computer fraud, the perpetrator usually steals something confidential or of great value from a company or agency.