Available information indicates a rise in computer crime activities across the globe. This is evident from the emergence of more sophisticated malicious computer programs and fake websites which are tailored towards compromising the confidentiality of computer systems. Such advancements are claimed to be growing at a higher rate compared to institution IT technologies to maintain their purpose of fueling underground economies (Blakeslee, 2010).
There are numerous types of computer crimes. One of these is hacking which entails the entering into a computer system by unauthorized person (Blakeslee, 2010). Another type of computer crime is malicious computer programs such as virus and Trojan horse. Virus and worm serve to corrupt stored computer files or programs. On the other hand, Trojan horse functions to allow continued unauthorized remote access of the computer system (Blakeslee, 2010).
The third common type of computer crime is identity theft and fraud activities which involve the misrepresentation information by a criminal for illegal financial gains (Blakeslee, 2010). Some effective practices in tracking computer crime are computer forensics and network surveillance (Blakeslee, 2010). Based on the provisions of the 2001 Patriotic Act, law enforcement agents can engage in tapping suspicious online activities. This allows them to gain crucial information such as source and destination address and the nature of the activities.
On the other side, computer forensic is an important tool for determining actions which took place in a computer or digital machine and those responsible (Blakeslee, 2010). In other words, it is a scientific approach which allows for the recovering computer-based evidence. Another technique that can be employed in tracking computer crime activities is data mining (Blakeslee, 2010) which allows grouping of large sums of data into related groups for ease analysis.
Blakeslee, M. R. (2010). Internet Crimes, Torts and Scams: Investigation and Remedies. New
York: Oxford University Press.