...Theft of intellectual property at Trig Enterprises, Inc. Librium Author Note This paper is being submitted on November 19, 2015, for Kevin Harris’s ISSC351-Computer Forensics course. Trig Enterprises, Inc. is an international supplement dietary company and it is located in St. Louis. In 2006, a newly designed and ready to manufacture product was comprised. One of the Trig’s competitors released the very similar product on the market before Trig did. A short time later, it’s found that the competitor’s website was very similar to the Trig’s website. This raised a flag about the company’s 22-year old graphics designer, Kevin K. The CEO of the company, contacted the IT department to monitor his computer/laptop and email accounts, his VOIP phone and wireless devices if there was any suspicious activity. IT department scanned his emails for the last a couple of years. No questionable information found. IT department continue to monitor his devices and emails for about three months. While he was under surveillance, another similar event happened. This time a product on the manufacturing process was compromised. This caused the company millions of dollars. CEO did not a choice but the contact the local police. After contacting the local police, the police’s compu In 2006, 22-year old graphics designer, Kevin K., suspected to leak the extremely important corporate data to its competitors. The owner of the company tries to solve the issue with...
Words: 466 - Pages: 2
...ISSC351 - Week 1 Your Name: Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search. Computer Crime Criminals have always tried to take advantage or exploit the advances in technology. It's extremely profitable to do so and rarely can get to prosecution if caught and if caught will be given the option to work with the intelligence agencies. Computer crime is prosecution is relatively new in this New Age, and the court system is catching up with how to handle computer crimes and that is why computer forensics is coming to the forefront of many criminal cases that has to do with the computer-related crime. A profitable computer crime is credit card fraud, and the criminals know that computer crimes rarely prosecuted because companies and corporations do not want to admit there may be faults in their security practices. One of the main reasons why the Payment Card Industry created the Payment Card Industry Data Security Standards is to secure cardholder data from Cyber criminals. Additionally, the computer can be used to enhance and protect criminals conducting crime worldwide “ a computer may have been utilized by a drugs trafficker to record details of shipments and corresponding payments and, although incidental to the offenses, the computer may therefore still have evident significant value” (Bell, 2002). Plus, computers can be used as low-key tools...
Words: 477 - Pages: 2