• Latest
  • All
  • News
  • Business

Cyber Crime – Can Locard’s Exchange Principle Be Applied to Cyber Crime?

Nov 6, 2016
How to Invest in Software and Security for Your Business

Unleashing Innovation: The Power of Custom Web Application Development

Sep 9, 2023
How to install and use a proxy for Instagram with OnlineProxy?

How to install and use a proxy for Instagram with OnlineProxy?

Sep 4, 2023
Unlocking the Power of Image Resizing in the Digital Era

Unlocking the Power of Image Resizing in the Digital Era

Sep 4, 2023
Top Benefits of Learning Salesforce for Beginners

Top Benefits of Learning Salesforce for Beginners

Sep 2, 2023

The Benefits of Implementing the SBG Bond Program in Your Organization

Sep 1, 2023
How Handheld Radios Improve Communication Efficiency in Industries

How Handheld Radios Improve Communication Efficiency in Industries

Sep 1, 2023
Impact and Importance of AI in Businesses

Revolutionizing Tech: Unveiling the Power of Specialized IT Solutions

Aug 29, 2023
Salesforce Training Best Practices: Strategies for Enhanced User Adoption

Salesforce Training Best Practices: Strategies for Enhanced User Adoption

Aug 29, 2023
Worldcoin (WLD) Price Today and Market Liquidity: Understanding Trading Volume

Worldcoin (WLD) Price Today and Market Liquidity: Understanding Trading Volume

Aug 29, 2023
Worldcoin (WLD) Price and Market Capitalization: Evaluating Token Value

Worldcoin (WLD) Price and Market Capitalization: Evaluating Token Value

Aug 10, 2023
How to Make Effective Business Videos for Your Marketing Campaign

Professional Finishing Techniques for Video Restoration

Aug 4, 2023
What Is AWS (Amazon Web Services)?

Why Cloud Computing Makes Working From Home A Stronger Proposition

Aug 4, 2023
  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy
Friday, September 15, 2023
Tech Featured
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips
No Result
View All Result
No Result
View All Result
Tech Featured
No Result
View All Result
Home News

Cyber Crime – Can Locard’s Exchange Principle Be Applied to Cyber Crime?

by techfeatured
Nov 6, 2016
in News
0
1
SHARES
38
VIEWS
Share on FacebookShare on Twitter

[ad_1]

Cyber Crime is replacing drug trafficking. Recent government findings indicate that cyber crime has pushed aside the illicit drug trade as one of the top sources for hundreds of millions of dollars in ill-gotten gains the world over. In its infancy, the Internet seemed like something that could develop into a useable tool for scientific research. If we had only known back then what potential it held, perhaps more thought would have gone into its protection.

Today the newswires are filled with reports of massive thefts of personal information as well as depleted bank accounts-all due to the criminal element that, for a small investment in a computer and an Internet connection, is changing the landscape of criminal investigation. One highly regarded research survey stated that 8.1 million Americans were victims of identity theft in 2010. Losses were in the hundreds of millions.

The Locard Exchange Principle (LEP)

Dr. Edmond Locard (1877-1966), known to many as the French “Sherlock Holmes,” was a pioneer in forensic evidence investigation. Locard formulated the basic principle of forensic science, “Every contact leaves a trace,” Of course Locard’s theory dealt with the physical contact made by the perpetrator to items in the crime scene. But today’s crime scene may not involve a physical structure-more than likely the crime scene is located out there in cyberspace.

So the question evolves, “Does Locard’s Exchange Principle apply to an electromagnet passing over a spinning disk?” Some digital detectives believe that it does. For example, a hacker gains access to a computer system that may or may not be secure. Is any computer completely secure? Granted, security software is effective against many such invasions, but a secure system will only take the hacker a little longer to get into it. Now, the question is, does the exchange principle apply?

Cyber crimes leave no physical evidence

On the surface, the infiltrator would leave no physical trace of his having been there. But other electronic trace evidence may be present. If the computer’s file access logs were accessible, it’s possible that a record will be available showing that the file was, in fact, accessed, and even that a network transmission followed. Also a possibility is that a side-channel analysis of any activity on the hard drive will uncover network operations. As a last resort, the examiner may check the access logs of the Internet Service Provider (ISP) to uncover surreptitious entry. This step will not necessarily divulge what specific data was removed, but it will indicate that data was, in fact, lifted from the line.

Industrial espionage is becoming commonplace

Personal information and cash are not the only targets of this spreading menace. Online industrial espionage is a growing threat to the U.S. economy as well as our national security. U.S. intelligence agencies recently warned elected officials that China and Russia are engaged in cyber-espionage. “Trade secrets developed over thousands of working hours by our brightest minds are stolen in a split second and transferred to our competitors,” said one counterintelligence executive. These foreign governments deny this claim.

The Cyber Exchange Principle

Perhaps when relating to cyber crime, the “Cyber Exchange Principle” applies. Forensic examination of a computer or server will uncover artifacts of invasion. The investigator is then, faced with a situation that the crime scene is not limited to a single computer and may involve another computer half the world away.

The hacker will not be leaving latent fingerprints, foot prints, or traces of physiological fluids in the wake of his intrusion. But electronic activity in this case can be far more valuable in the bits and bytes this activity leaves behind. The principle that Locard espoused so long ago must be forefront in the minds of our digital detectives as they seek what clues an invaded computer holds as well as what traces are awaiting discovery out there in cyberspace.

[ad_2]

Tags: androidapple iphonetechnology news
ShareTweetShareSendShare

For any queries, you can reach us at [email protected]

Latest Posts

  • Unleashing Innovation: The Power of Custom Web Application Development
  • How to install and use a proxy for Instagram with OnlineProxy?
  • Unlocking the Power of Image Resizing in the Digital Era
  • Top Benefits of Learning Salesforce for Beginners
  • The Benefits of Implementing the SBG Bond Program in Your Organization
Tech Featured

© 2022. All Rights Reserved.

Navigate Site

  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips

© 2022. All Rights Reserved.