Page 34 - Cyber Defense eMagazine April 2021 Edition
P. 34
familiar with that how cybercrime looks like or in so many cases they will believe that no one will try to hack
their private devices. Basically, that’s the sword with two edges and if all the incidents would be reported
straightforwardly we would recognize that the harm from high-tech crime is much bigger and indeed, there is
the need to tackle such a challenge in much more serious manner.
Apparently, any activity in the cyberspace will leave the footage and there is increasing need for the skillful
cyber forensics that could investigate and document what happened in the virtual
environment and their reports could serve as the evidence on the court in proving someone’s
guiltiness and intents, so far. In other words, anyone committing the cybercrime will also leave the trace and
even if that person attempts to hide his IP address the trained forensic detectives can track that sort of the
activity. The huge challenge is that in sense of the criminology the offenders need the reliable communication
and they can get if their information exchange device emits the
signal, so the surrounding telecommunication infrastructure is able to collect those findings and make their
records in its memory storage. Indeed, anyone using the emerging technologies is not invisible and the ex-
perienced law enforcement staffs will know how to start the investigation.
So, some criminal justice cases will rely on cyber systems and in such a fashion anyone willing to pay for the
information will know that it is not smart taking the activated device on the crime scene. On the other hand,
when the incident happens the investigation will firstly do some tracking on the crime scene and if the device
is deactivated at that moment it could be hard to track such a route. Maybe the inspection will show that the
criminals have undoubtedly been there at that piece of time, but we will not catch the signal – so it can seem
that they used no devices at all.
As the bad guys have skill to commit their offenses the good case management is needed from the investi-
gators and the other case members. Essentially, there are no the perfect crimes as there is no an absolute
security so it’s only the matter of time and effort when some security system or the criminal scheme can be
broken and smashed once forever, so far.
About the Author
Milica D. Djekic is an Independent Researcher from Subotica,
the Republic of Serbia. She received her engineering
background from the Faculty of Mechanical Engineering,
University of Belgrade. She writes for some domestic and
overseas presses and she is also the author of the book “The
Internet of Things: Concept, Applications and Security” being
published in 2017 with the Lambert Academic Publishing. Milica
is also a speaker with the BrightTALK expert’s channel. She is
the member of an ASIS International since 2017 and
contributor to the Australian Cyber Security Magazine since
2018. Milica’s research efforts are recognized with Computer
Emergency Response Team for the European Union
(CERT-EU), Censys Press, BU-CERT UK and EASA European
Centre for Cybersecurity in Aviation (ECCSA). Her fields of
interests are cyber defense, technology and business. Milica is
a person with disability.
34 Cyber Defense eMagazine – April 2021 Edition
Copyright © 2021, Cyber Defense Magazine. All rights reserved worldwide.