Essays on digital evidence and computer crimes

Essay's Score: C

Grammar mistakes

F (56%)


A (100%)

Redundant words

C (70%)




F (50%)

Table of Content

They then would hack into the company’s network from outside, cracking the security code and accessing company computers and information. In other cases, they would physically break into the company and install “mallard” on a computer designed to “sniff out” passwords and security codes and relay that information back to the thieves. They then WOUld strike quickly by accessing company accounts with Other businesses like Amazon. Com or eBay and charging expensive items, or in some cases actually getting into a company’s payroll.

In more than one instance, they would divert automatic payroll deposits to newly created bank accounts, load it onto debit cards and buy items like Roles watches or engines for their cars. U. S. Attorney Jenny Durban said the men hacked or burglarized more than 50 local businesses, resulting in losses of more than $3 million. The crime spree went on for nearly three years before it was cracked by Seattle police. Griffin was sentenced to 95 months in prison by U. S. District Judge Richard A. Jones. Lowe received a 78-month sentence. A third defendant, Joshua Allen Witt, pleaded guilty last month and is set for sentencing in June.

This essay could be plagiarized. Get your custom essay
“Dirty Pretty Things” Acts of Desperation: The State of Being Desperate
128 writers

ready to help you now

Get original paper

Without paying upfront

It took nearly three years, but Seattle police detectives say they eve unraveled a theft ring that operated both in cyberspace and through old-fashioned burglaries with a genealogical twist -? breaking into a company with the sole purpose of installing malicious software to enTABLE future thefts. Federal prosecutors have indicted three men -? Joshua Allen Witt, 34; Brad Eugene Lowe, 36; and John Earl Griffin, 36 -? on charges of conspiracy and eight other counts including accessing a protected computer to further fraud, access device fraud and aggravated identity theft.

The 20-page indictment lays out a scheme that U. S. Attorney Jenny Durban on Wednesday said was “both sophisticated and rudimentary,” and combined high technology with broken glass and jimmied locks. The trio is accused of targeting at least 53 companies, with losses expected to mount into the hundreds of thousands of dollars. “In some cases, the victims were both burgled and cyber-burgled,” Durban said at a news conference. The indictment accused the men of “hardwiring’ -? cruising in a vehicle outfitted with a powerful Wi-If receiver to detect business wireless networks.

They then would hack into the company’s network from outside, cracking the security code and accessing company computers and would strike quickly by accessing company accounts with other businesses actually getting into a company’s payroll. In more than one instance, they “They were sophisticated in technology and living’ large,” Durban said. Durban said the victims ranged from high-tech firms to storefront retailers. Assistant U. S. Attorney Kathy Warm said it was extremely difficult to pinpoint who was behind the intrusions.

The first crimes occurred in 2008, she said, and while detectives pretty quickly figured out a single group was responsible, the suspects were only recently identified. In the meantime, some innocent employees of the victim companies were suspected and questioned by police, Durban said. The arrests came after a string of regularities in King County, in which all three men were charged in a lengthy state complaint filed in January that outlines the investigation and says that authorities have recovered stolen items during a series of searches of homes, cars and storage facilities in King County. Everything that makes it easy for us to do our business online makes it easy for them to commit crimes online,” Durban said. At Wednesday’s news conference, representatives from three of the victim businesses explained how they believed their networks were secure and how quickly the thefts occurred. All agreed to be named, but seed that their businesses not be identified. Jeff Ebb, the financial officer at a retail company, said two burglaries in 2008 seemed relatively routine enough and were reported to police.

The only things taken, he said, were a couple of old laptops. About a month later, he said, his company network suffered an intrusion that he learned about only when he came into work to find an unscheduled payroll printout on his printer. Suspicious, he reviewed the document to find that someone was attempting to add two new employees and divert their pay to bank accounts in North Dakota. The payroll was automatically printed as the program was being used.

Cite this page

Essays on digital evidence and computer crimes. (2018, Feb 06). Retrieved from

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront