Week6Project.docx - Tracking the Cybercrime Trail Renatta...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Criminology Tracking the Cybercrime Trail Renatta Simpson
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Bryan Sartin is the director of technology for Ubizen, a company that conducts cybercrime investigations. In Sartin's article 'Tracking the Cybercrime Trail' he goes over the details surrounding a potential credit card fraud investigation. In addition he wrote about the process of gathering evidence and about how law enforcement agents were contacted. He also showed us how his company helped identify, capture, and prosecute the criminal. After the crime was 'solved', Sartin also talked about what his company did to help prevent a reoccurrence and help protect the credit card company in the future. Ubizen's investigation began when a few credit card associations and major credit card issuers noticed an increase in the number of fraud reports over a three or fourth month period. These associations then reviewed the patterns and believed they found a primary company responsible. However they did not have any hard evidence, which is why they contacted Ubizen. After they contacted Ubizen they contacted 'Company A', asking them to allow them to do an investigation over a possible security breach. Company A responded that they were not aware of a breach, but would work with the investigators. The company in question was a software company that provided electronic payment software to a lot of different retail outlets. Their business included restaurants, retail stores, and even internet companies. Its primary responsibly was to process credit card and check transactions through its payment server gateway. After Company A responded with their compliance the investigators worked in stages, each one focused on different goals. The first change was to discover the origin of the fraud and what it fully covered. The investigators would compile any evidence of crime and assist law-enforcement if needed. Their first stage lead to a discovery that data have been stolen from the company's computer system. The investigators in-depth analysis of the different fraud patterns showed that they were duplicated credit cards. These duplicate
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern