Page 34 - Cyber Defense eMagazine April 2021 Edition
P. 34

familiar with that how cybercrime looks like or in so many cases they will believe that no one will try to hack
          their private devices. Basically, that’s the sword with two edges and if all the incidents would be reported
          straightforwardly we would recognize that the harm from high-tech crime is much bigger and indeed, there is
          the need to tackle such a challenge in much more serious manner.


          Apparently, any activity in the cyberspace will leave the footage and there is increasing need for the skillful
          cyber forensics that could investigate and document what happened in the virtual
          environment and their reports could serve as the evidence on the court in proving someone’s
          guiltiness and intents, so far. In other words, anyone committing the cybercrime will also leave the trace and
          even if that person attempts to hide his IP address the trained forensic detectives can track that sort of the
          activity. The huge challenge is that in sense of the criminology the offenders need the reliable communication
          and they can get if their information exchange device emits the
          signal, so the surrounding telecommunication infrastructure is able to collect those findings and make their
          records in its memory storage. Indeed, anyone using the emerging technologies is not invisible and the ex-
          perienced law enforcement staffs will know how to start the investigation.


          So, some criminal justice cases will rely on cyber systems and in such a fashion anyone willing to pay for the
          information will know that it is not smart taking the activated device on the crime scene. On the other hand,
          when the incident happens the investigation will firstly do some tracking on the crime scene and if the device
          is deactivated at that moment it could be hard to track such a route. Maybe the inspection will show that the
          criminals have undoubtedly been there at that piece of time, but we will not catch the signal – so it can seem
          that they used no devices at all.

          As the bad guys have skill to commit their offenses the good case management is needed from the investi-
          gators and the other case members. Essentially, there are no the perfect crimes as there is no an absolute
          security so it’s only the matter of time and effort when some security system or the criminal scheme can be
          broken and smashed once forever, so far.










          About the Author

          Milica D. Djekic is an Independent Researcher from Subotica,
          the Republic of Serbia. She received her engineering
          background from the Faculty of Mechanical Engineering,
          University of Belgrade. She writes for some domestic and
          overseas presses and she is also the author of the book “The
          Internet of Things: Concept, Applications  and  Security” being
          published in 2017 with the Lambert Academic Publishing. Milica
          is also a speaker with the BrightTALK expert’s channel. She is
          the member of an ASIS International since 2017 and
          contributor to  the  Australian Cyber Security  Magazine  since
          2018.  Milica’s  research  efforts  are  recognized  with  Computer
          Emergency Response Team for the European Union
          (CERT-EU), Censys Press, BU-CERT UK and EASA European
          Centre for Cybersecurity in Aviation (ECCSA). Her fields of
          interests are cyber defense, technology and business. Milica is
          a person with disability.





             34    Cyber Defense eMagazine – April 2021 Edition
                   Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   29   30   31   32   33   34   35   36   37   38   39