Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Help with Q1: a,b,c. Thanks QUESTIONS 1. Explain the background and the process of the investigation of:- a. Blackmailing b. credit card fraud and c.

image text in transcribed

Help with Q1: a,b,c. Thanks

QUESTIONS 1. Explain the background and the process of the investigation of:- a. Blackmailing b. credit card fraud and c. illegal money transfer Example: Case Study: Creating Fake Profile Background: The complainant received an obscene e-mail from an unknown email ID. The complainant also noticed that obscene profiles along with photographs of his daughter had been uploaded on website. Investigation: The investigating officer examined and recorded the statements of the complainant and his daughter. The complainant stated that his daughter was divorced and her husband had developed a grudge against them due to the failure of the marriage. The investigating officer took the original e-mail from the complainant and extracted the IP address of the same. From the IP address he could ascertain the Internet service provider. The IP address was traced to a cable Internet service A search warrant was obtained and the house of the accused was searched. During the search operation, a desktop computer and a webcam were seized from the premises. A forensic IT specialist assisted the investigation officer in recovering e-mails (which were sent to the complainant), using a specialised disk search tool as well as photographs (which had been posted on the Internet) from the computer and the webcam respectively. The seized computer and the webcam were sent to the forensic security laboratory for further analysis. The experts of the forensic security laboratory analysed the material and issued a report stating that the hard disk of the seized computer contained text that was identical to that of the obscene e-mail; the computer had been used to access the matrimonial websites on which the obscene profiles were posted; the computer had been used to access the e-mail account that was used to send the obscene e-mail; the webcam seized from the accused contained images identical to the ones posted on the matrimonial Websites. Based on the report it was clearly established that the accused had created a fictitious e-mail ID, sent the obscene e-mail to the complainant and posted the profiles of the victim along with her photographs on the website

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 31st International Conference Dexa 2020 Bratislava Slovakia September 14 17 2020 Proceedings Part 1 Lncs 12391

Authors: Sven Hartmann ,Josef Kung ,Gabriele Kotsis ,A Min Tjoa ,Ismail Khalil

1st Edition

303059002X, 978-3030590024

More Books

Students also viewed these Databases questions

Question

1. How does Kiwi Experience maintain a continual customer focus?

Answered: 1 week ago