.

Friday, April 5, 2019

Technology Used By Drug Dealers Information Technology Essay

applied science Used By Drug Dealers In inningation engineering science EssayThe Report discuss intimately the lesson of an arrested medicine dealer who is suspected of the operations which argon cultivatening with the help of laptop computer. In the first variance of the glide by notice (of) it gives the details about main technologies which the suspect makes use in order to pass by with his co-conspirators, it in a manage(p) manner points out the problems posed by the technologies in carrying out the forensic investigation.In the second part the report discuss about the workable sources of yard which could be obtained from the laptops lodge form.2. Computer ForensicsComputer forensics is a counterbalance of forensic science getting to legal evidence found in computers and digital storage media, it is also cognize as digital forensics.The goal of computer forensics is to explain the current state of a digital artifact where as the term digital artefact stand i ncludes computer carcass, storage medium and an electronic catalogue.The subject matter of computer forensics has evolved into major field in the legal systems around the world, in the year 2002 the FBI stated that cubic decimeter percent of the cases the FBI now opens involve a computer1.similar to the pathological forensic which is called the forensic medicine where as the organic structure temperature cuts and marks etc atomic number 18 looked for, clues and marks are looked within the system memory to get the detail comment which effects to the relationship of the crime, these are looked by the digital forensic.We can make a challenge for the digital forensic which involves retrieving the entropy from the existing or from the deleted files.The challenge of the digital forensic examiner is toTo determine what attri excepte of pasts have been produced the evidence before us.To understand what figure of pasts could not have produced the evidence before us. fitting to giv e a demonstration on the value of the assessment to the third parties which it should be brain to them.3. Technology apply by medicate dealers jibe to the current analytic thinking we have to lift the answers for the questions that are searing which are the possible let out technologies that the medicine dealer could possible uses it,There are three questionsQno1 what is the study for the illicit drug dealers to turn on the computer technologies to run their business?Qno2 What are the attractive technologies that a drug dealer uses to perform his communication with co-conspirators without being caught by the police?Qno3 How and what possible conclusions can be obtained from the analysis?4. about the virgin technologyAns1 answer to the first one is twofold.Ans2 the latest communication technologies apply by the drug dealers areTo reach the outsizedr audience and to expand the base of the businessTo run the operations as secretly as possibleAnd not to leave both evidence to the police. harmonise to the current situation the dealings and the business runs by using the mobile phones, mobile phones are the around widely utilize by the drug dealers for the communication but this trend is changing because now a days the mobiles can be tapped on the lucre and even if the phone is misplaced or scattered indeed the contacts of all the drug dealers can be revealed and by using the mobile phones they cant communicate in the crowded places. Hence the selection of the new ways of communication is imminent.The advent of modern shekelswork technologies like computer to computer communication technologies and kindly networking websites had made the communication strong and had opened the new ways to communicate finished the various places for the each individual.The technologies adopted by the drug dealers for the communication isSpamming net drug dealer gets 30years in prison revealed by CNET news in the year 2007 2nd deluxeItalian drug dealers as early adapters of innovative communications technology revealed by Experiential in the year 2008 23rd august.Google site used by drug gang revealed by BBC news in the year 2005 22nd July.5. Key technologies used for communications by drug dealersListed below are or so of the key communication technologies that a drug dealer is believed to be using to perform his operations.1. Instant courier courses2. Social networking websites3. VOIP programs4. Email encryption programs and spamming.5. topic manduction websites.6. Private online chat rooms.7. Blogging and micro blogging websites.Instant courier ProgrammesInstant messenger curriculums had been the main source because these are fast and easy and they are lendable in the market for a quite while now, normal programmes like Google talk, yahoo messenger, windows live messenger, meebo and many early(a) are used by a large number of drug users. These import messenger programmes can be linked with free instant messenger chat encrypti on software which is used to useable considerably in the internet.IM ENCRYPTO is one much(prenominal) software which can be used in conjunction with the yahoo messenger and establish the capture connections which can only be deciphered by the computer which is having the reform encryption key.Having installed the program need to be generated a key pair which is used for the encryption and decryption, this type of operation is performed on the second stage of IM Crypto configuration wizard, and one more(prenominal) authorized point about the software is that the others cannot see the chat messages and they only see the garbled set of characters, but this software essential be installed by the two parties where the communication is done.Social networking websitesThere are so many social networking websites like face book, orkut, Hi5, Friendster MySpace, net log etc, The social networking sites also serve the qualitative purpose of the drug market as majority of the consumers of illegal drugs happen to be teenagers who are also largest spenders of time on the social networking websites and hence they have a great probability of being contacted by a drug dealer.The drug dealer could also use these social networking sites to keep in contact, exchange information, advertise his products, restore new drug peddlers, and get information on events and student gatherings all at the easy and loneliness tallyered by these websites.Orkut is one such popular website which it is to be operated by the Google which it is on the news on the upstart days for the wrong reasons. Criminals such as the drug peddlers establish members-only groups on popular social networking websites and thusly exchange messages and information with other members.And also the advent of 3G mobile communications ensured mobility and faster connectivity to the internet. Hence the drug dealers can communicate through social networking websites right from their mobile phones using unsecure wifi hot spots and hence get away un-detected.Similar to Instant messenger programmes, the social networkings websites can also used on the 3G phones and hence pose a danger of highly secure communication channel to the drug peddlers.VOIP programmesVoIP programmes could unfeigned well be the most popular and useful communication between the drug dealers because softwares like Skype is so useful in the communication because it offers with the less cost and even it is the secured communication Skype has been the most used software in the VoIP programmes which are followed by windows messenger and yahoo messenger.These VoIP programmes is that which it helps the drug dealers to communicate by the representative and by the video with their customers through the internet, it is the most secure communication to the drug dealers and these conversations cannot be kiboshed by the police.According to the Reports in BBC website, officers in milian say organised crime, arms and drug traffickers , and prostitution rings are tour to Skype in order to frustrate investigators.www.bbc.com stated that on 20/05/2010 that the Italy police warn of Skype threatSkype programme is secure because it uses the encryption system and it is easily available in the market where as the encryption system the company keeps the issue confidential and even it does not discloses to the law enforcement agencies.So according to the sources available in VoIP programmes the drug dealers uses this communication to perform their operations.Email encryption programmes and spammingData encryption is the source where it is done in a process because nobody can read the data or message expects the person whom the data is address.Drug dealers will very well make use of the different email encryptions like logical argument exchange, certified mail, read notify, which these encryptions work with the e-mail guests like Microsoft-outlook.Drug dealers send the spam messages to the people through email about thei r business, they use the email communication as the source to their advertisements in free off costs we have seen so many spam messages appear in Google mail accounts.Recently a famous website named www.pcworld.idg.com stated on 17/05/2010 that drug dealing spammers hits the Gmail accountsEncryption is a technique that it changes the data into a gibber value by using the mathematical algorithms this helps the drug dealers to communicate the data to the addressed person, and no other can read the data, gibberish value means the data will be written in technical word or in the meaningless sentences, if the recipient has the confidential key needed to decrypt the message the designation will be changed back to the original message.The increasing phenomenon fetching place in the internet is that if the criminals hiring the spammers and the specialists in IT, because the can promote the website where the drugs can be sold illegally. save these types of spammed websites can be quickly discovered, but the drug tracking dealers use the different multiple layers.5. Content sharing websitesContent sharing websites like mega upload, rapid share, Z Share etc are used by the drug dealers for communication and also torrent sharing websites are used for the communication.Websites like p2p sharing programmes and client softwares are also used by the drug dealers for the communication.Drug dealers use this because these types of websites can share the more content and can uses to upload or download for minimum of 10mb for free off cost.Whereas the lime wire, subroutine torrent, u torrent helps to upload or download the torrent files in the internet which these comes under the p2p sharing programmes.But compared to the other communications used by the drug dealers this is little bit slower but is secured.6. Private online chat roomsPrivate online chat rooms offer drug dealers and other criminals such as terrorists with secure communication channels where exchange of informa tion can only be mum by the communicating end users this is a form of synchronous conferencing which it exchanges text messages on the internet. Encryption technologies like SSL are applied by the private chat rooms because to make it impossible to access their conversations to any interceptor and even makes impossible to build evidence.7. Blogging and micro blogging websitesSimilar to the social networking websites the drug dealers uses the websites like twitter they form the members in groups, where they can make messages and information and this information can be made updated daily and it can reach all the members and in the groups in that network, this way of communication is secure and fast. Which it provides a most secure and fast mode of communication to the drug dealers, and no large chunks of data will be transferred as in a VoIP call or no packet sniffers can be used to intercept keywords in emails and in instant messages.Drug dealers places their advertisements in the f amous websites like they simply put an excerption to click if the button is clicked it directly goes to the websites of the drug dealers and it is accessed , using these type blogs by drug dealers develop their drug business.6. ConclusionsAs per the above analysis the most secure and used communication by the drug dealers is the VoIP programme softwares because this uses the Skype software and it is used with free of cost and secure of all the communication because it provides video calling and then the drug dealers can be sure that they are talking to the right person and the information that they are transmitting is reaching the right person and the Skype software is easy to access and is easy for the installation.The most important plus point in Skype is the impenetrable security aspect which the drug dealers can understand very well and hence use the system without putting their identities and information.Another key observation from the above analysis is that the drug dealers mainly follows the encryption techniques as the mode of communication, because they largely dependent on the encryption techniques .Be it the encrypted email, encrypted instant messenger programmes etc.All these technologies use method of encryption system that makes the flowing information gibberish to anyone other than the person with the right key to decrypt the message.Hence the computer forensics experts can easily find out the cracks and codes for those type of encryption and decryption methods and nab the criminals and can mount an evidence against them.7. Analysis of possible sources evidence in the laptop file systemExtraction of evidence from a computer file system and from other digital devices like mobile phones and PDAs usually deals with the extraction of the contents of the files and the folders which are available in the laptop file system.It also deals with the extracted content from the files and folders as the taken data where as the interpreted data can be used for the process of the ongoing investigation to complete the digital forensic. tied(p) though it reveals all the data, it is difficult and hard to the digital forensic expert to find out and it poses the real challenge. This section of the report deals with the discussion on the possible places where evidence may be found on the laptop file system. It also deals in finding the relative importance of the evidence by classifying it on the basis of the evidence obtained and the sources of the evidence obtained.8 .Sources of evidence in the laptop file systemIn order to understand the possible places in the file system we have to understand the file system and the technologies used for itThey should have a technical knowledge onSoftware packages present on the laptopThe operating system of the laptopThe file systems in the laptopThe type data organization that is available in the laptop.The forensic analysis on the seized laptop of the drug dealer would certainly contain thousands if not millions of files. Each of these files can be broadly classified into eitheruser created filessystem filesThere may be a number of locations to look for on the file systems and therefore it is important to make a note.Possible locations of finding digital evidenceEmail files.Calendars.Address books.Documents or text files.Bookmarks and favouritesText and document files.Image or graphic filesCompressed files.Hidden files.Audio filesVideo files.Spread sheet files. dual-lane files.Downloaded filesUploaded files.The possible locations under the system created files areLog filesSwap filesHistory filesTemporary filesBack up filesSystem filesCookiesPrinter filesHidden filesConfiguration filesStorage filesLarge filesData filesDrive filesApart from the user created files and the system files there are number of other places to look for evidences such asComputer dateComputer timeComputer passwordDeleted filesSlack shoesFree spaceBad clustersUnallocated spaceSystem areasLost clustersMeta data.Deleted filesReserved areasSoftware registrationOther partitionsSoftware informationThe most popular types of file systems are two typesFAT typeNTFS systemFAT stands for file allocation table, an understanding of the file system is important for the effective forensic analysis.NTFS system allows the file encryption and folder encryption where as it is not possible in the FAT32 system.The disk organisation is also an important concept to be understand for the effective analysisFile allocation tables, adding and deleting files, partitions and master boot records and the patterns behind them can give a very useful insight to the investigation. The retrieval of deleted files is another aspect of digital forensic investigation. The recovery of deleted files can be obtained by using debugging.9. ConclusionsAs discussed earlier even though a large amount of data can be obtained from a digital device such as laptop and from a PDA that is seized from drug dealer.But the problem for the forensic expert is to find the authentic evidence which can be presentable in the court.The common and known challenges to authenticity of digital evidence areAuthenticating content.Alterations authorship.Authenticating contentSo many several cases have considered that to evidence at the same time what creation is necessary for the contents and appearance of a website.Web pages which are having URL and having date stamp are not self-authenticating.So, according to the analysis courts require testimony of a person with knowledge of the websites appearance to authenticate images of that websiteAlterationsAs per the analysis the computer electronic records are easy to alter, even the opposing parties often declare that computer records lack the authenticity.Courts have rejected arguments that electronic evidence is inherently unreliable because of its potential for manipulation.AuthorshipAlthough handwritten records may be penned in a distinctive handwriting style, computer-stored r ecords do not inevitably identify their author there is a particular problem with the internet communications.For example internet technologies permit users to send effectively anonymous emails, and internet relay chat channels permit users for communication without uncover their real names.

No comments:

Post a Comment