Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Help with Q1: a,b,c. Thanks QUESTIONS 1. Explain the background and the process of the investigation of:- a. Blackmailing b. credit card fraud and c.
Help with Q1: a,b,c. Thanks
QUESTIONS 1. Explain the background and the process of the investigation of:- a. Blackmailing b. credit card fraud and c. illegal money transfer Example: Case Study: Creating Fake Profile Background: The complainant received an obscene e-mail from an unknown email ID. The complainant also noticed that obscene profiles along with photographs of his daughter had been uploaded on website. Investigation: The investigating officer examined and recorded the statements of the complainant and his daughter. The complainant stated that his daughter was divorced and her husband had developed a grudge against them due to the failure of the marriage. The investigating officer took the original e-mail from the complainant and extracted the IP address of the same. From the IP address he could ascertain the Internet service provider. The IP address was traced to a cable Internet service A search warrant was obtained and the house of the accused was searched. During the search operation, a desktop computer and a webcam were seized from the premises. A forensic IT specialist assisted the investigation officer in recovering e-mails (which were sent to the complainant), using a specialised disk search tool as well as photographs (which had been posted on the Internet) from the computer and the webcam respectively. The seized computer and the webcam were sent to the forensic security laboratory for further analysis. The experts of the forensic security laboratory analysed the material and issued a report stating that the hard disk of the seized computer contained text that was identical to that of the obscene e-mail; the computer had been used to access the matrimonial websites on which the obscene profiles were posted; the computer had been used to access the e-mail account that was used to send the obscene e-mail; the webcam seized from the accused contained images identical to the ones posted on the matrimonial Websites. Based on the report it was clearly established that the accused had created a fictitious e-mail ID, sent the obscene e-mail to the complainant and posted the profiles of the victim along with her photographs on the websiteStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started