StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criminal Investigation Plan for Cyber Crime - Assignment Example

Cite this document
Summary
The paper "Criminal Investigation Plan for Cyber Crime" discusses that because of limited information on the internet, the officers may also consider spying on his movements after the breakthrough they made in finding photographs of Zdravko’s remote farm…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Criminal Investigation Plan for Cyber Crime
Read Text Preview

Extract of sample "Criminal Investigation Plan for Cyber Crime"

Criminal Investigation Plan for Cyber Crime Word Count 1063 Criminal Investigation Plan for Cyber Crime This practice direction (PD) outlines a framework for responding to offences committed in some of the crime-prone regions of South East England. For instance, the Bennington Family is an Organized Crime Family operating in the South East of England. The family is the subject of a long-term investigation by the National Crime Agency Operation Priory. The research outlines a plan developed to implement an investigative strategy aimed at preventing or detecting offences committed by the family. It formulates a plan for conducting investigations to arrest and obtain evidence for a successful prosecution of the criminals involved. Investigations conducted indicate that the approximate average age of the victims of activities conducted by Boko Zdravko is 81 years. The research suggests that they traverse the nation selecting places with a high population of old people or mixed communities that have easy access to roads1. At the same time, offenders move on after a concentrated period of attacks 2. Movements cause hindrances to detection and prevention. That calls for the investigative process as provides the Police Act of 1997. Initial Response As indicated in the introduction, the levels of under-reporting of crimes in such a manner are high. That makes the actions at the incidences of reporting to have a detailed and professional approach. The responses should take an account of the needs of the victims of the cases. It is necessary to consider that the responses minimize chances of repeated victimization of one victim and chance that crimes may make some of them prisoners within their homes. The actions taken from the outset will have effects on the results. There is necessity that the response considers a wide range of options3. Additionally, there is noteworthy that whilst some of the identified issues are identifiable as crimes, some of them are not. Therefore, the responses made to such issues should be thorough and consider all the issues4. The Ongoing Investigation There is a need to consider the best approaches to capturing evidence from the suspects. For this case, the intelligence units should use all the available pieces of evidence to prosecute the offenders. How to Obtain Evidence of Data Usage and Content for Any Telephones Identified and the Evidence of Macgregor and Zdravko’s Hands On the Keyboards The team will have to look at the matter from two perspectives. The first will entail recording the activities of the devices used by use of key loggers and record imagery for the persons involved. Such a move is possible using inbuilt camera such as webcams found on a new computer of an iPad. Another alternative is to record activities of the suspects as if in the room5. The devices, therefore, will be looking over the shoulders of the suspects without their knowledge. There is necessity to consider that either situation require intelligence units to access the rooms. Therefore, there is a need that they have the permission of part 3 of the policy act of 19976. The team will also require intrusive surveillance to enter residential premises, which is a higher level of authority7. All the approval that they officers will get will help them to have an easy access to the premises and ensure that they get all the information required. The officers will also demand access to family, friends and other third parties of the suspects in this case. For such a case, there is a need to obtain the permission for a collateral intrusion. There is evidence gathered, which may suggest that Macgregor is responsible for computer handling from his sister’s Facebook page. There is chance that the suspect has stayed behind so that he can ensure that completes some planned criminal activity. How to Obtain Any Evidence of Association between Macgregor and Zdravko The investigative units mentioned in this work find the connections between the members of the criminal circuit. They should spy all the movements involved to and from London by the suspects8. The team will study the movements of the gang and prepare information on gang intelligence, which they will distribute to the local agencies of law enforcement. The unit will also use internet-generated data to gain information on the contacts made between the two families, which will provide relevant information on their activities. Another alternative will be interrogating the friends that the suspects have regarding their whereabouts. The fact that Macgregor’s family is in Spain for a holiday without him could suggest that the suspect remained in England so that he can accomplish a plan between himself and his counterpart. Therefore, the police and other personnel in charge can spy on their movements considering that they have the location of the small remote farm belonging to Zdravko and his family. Plan to Arrest the Suspects The law requires three things before an officer has the permission of arresting a suspect. The officers need to have observed the crime themselves; they should also have probable cause that will make them believe that the suspect has committed a crime. Lastly, they must produce an arrest warrant. Therefore, the officers undertaking the process should ensure that they fulfill the legal requirements and use minimum force as demanded by the law9. The officers concerned with the operations may consider the fact that they can wait for Zdravko at the hospital where he regularly visits his elderly and hospitalized father. Because of limited information on the internet, the officers may also consider spying on his movements after the breakthrough they made in finding photographs of Zdravko’s remote farm. Bibliography Bennett Wayne and Kären Hess. Criminal investigation. Cengage Learning, 2006. Berindan Ion. "Not another ‘grand strategy’: what prospects for the future European security strategy?" European Security 22, no. 3 (2013): 395-412. Khemlani Sangeet and Philip Johnson-Laird. "Hidden conflicts: Explanations make inconsistencies harder to detect." Acta psychologica 139, no. 3 (2012): 486-491. National Crime Agency. National Cyber Crime Unit. 2015. accessed 25 April 2015. Osterburg James and Ward Richard, Criminal Investigation: A Method for Reconstructing the Past. Routledge, 2013. Reinstein Alan and Mohamed Bayou. "A comprehensive structure to help analyze, detect and prevent fraud." Detect and Prevent Fraud (June 28, 1999) (1999). Segell Glen M. "Reform and transformation: the UKs serious organized crime agency." International Journal of Intelligence and Counterintelligence 20, no. 2 (2007): 217-239. Wahidin Azrini and Maureen Elizabeth Cain (Eds). Ageing, crime and society. Taylor & Francis, 2006. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Of policing of a Cyber Crime investigation-scenario of The Bennington Essay”, n.d.)
Of policing of a Cyber Crime investigation-scenario of The Bennington Essay. Retrieved from https://studentshare.org/information-technology/1690189-of-policing-of-a-cyber-crime-investigation-scenario-of-the-bennington-family-are-an-organised-crime-family-operating-in-the-south-east-of-england-they-are-the-subject-of-a-long-term-investigation-by-the-national-crime-agency-operation-priory
(Of Policing of a Cyber Crime Investigation-Scenario of The Bennington Essay)
Of Policing of a Cyber Crime Investigation-Scenario of The Bennington Essay. https://studentshare.org/information-technology/1690189-of-policing-of-a-cyber-crime-investigation-scenario-of-the-bennington-family-are-an-organised-crime-family-operating-in-the-south-east-of-england-they-are-the-subject-of-a-long-term-investigation-by-the-national-crime-agency-operation-priory.
“Of Policing of a Cyber Crime Investigation-Scenario of The Bennington Essay”, n.d. https://studentshare.org/information-technology/1690189-of-policing-of-a-cyber-crime-investigation-scenario-of-the-bennington-family-are-an-organised-crime-family-operating-in-the-south-east-of-england-they-are-the-subject-of-a-long-term-investigation-by-the-national-crime-agency-operation-priory.
  • Cited: 0 times

CHECK THESE SAMPLES OF Criminal Investigation Plan for Cyber Crime

Investigation of the crime or unlawful activity

Besides, investigative agencies may hire specialized professionals such as forensic experts in case of the criminal investigation, CPA or other qualified management experts in case of the financial scam, depending upon the services required.... Investigation of any crime or unlawful activity is a precursor to bring the guilty to the rule of law and delivering justice; therefore, investigators play a crucial role in detecting and deterring crimes and other unlawful activities in the society....
5 Pages (1250 words) Essay

Cyber Crime as an Unlawful Act

This paper ''cyber crime as an Unlawful Act '' discusses that Cyber Crimes include; email spoofing, sending intimidating emails, Cyber defamation etc.... cyber crime is a crime that has its origin in the developing reliance on computers, in the modern life.... These anti- piracy tools are, however, not perfectly foolproof since the cyber criminals develop advanced ways of meandering with them.... In our project, the five mentioned cyber crimes will be our concern....
8 Pages (2000 words) Term Paper

Fast-Evolving Nature of Technology

he unit will be fully equipped with a cyber-forensics laboratory which will specialize in digital evidence recovery, and which will also the facilitation of computer investigative training and development of forensic skills.... Steps towards the creation of a cyber-investigative unit would be to assess the needs of the department and make a decision, to establish a legal basis in the establishment, appoint a manager for the cyber investigation unit, to staff the unit, to provide for the equipment and other resources required in the unit, to facilitate a training program for this unit and to have an action plan in developing the cyber investigative unit....
9 Pages (2250 words) Term Paper

Digital Evidence: Understanding The Process and Challenges

Computer crimes can be defined as crimes that are committed using the computer as a tool or target of the crime.... In a computer-assisted crime, the evidence is stored in computers or digital media.... This paper deals with the processes and challenges involved in identifying, recovering, securing, examining, analyzing and preparing digital evidence from a crime scene.... omputer Forensics is a comparatively new branch of the crime investigational system and involves collecting digital evidence from the crime scene by the analysis of the computers systems, networks, and servers in addition to numerous other digital devices (Sahu, 2008, p....
13 Pages (3250 words) Assignment

Military's Criminal Investigative Agencies in the USA

ven though the US Army criminal investigation Command (CID) was formally established as a command in the Army in 1971, its roots can be traced to events much earlier.... This office was sufficient until the First World War when, in 1917, the Military Police Corps was established, with an additional criminal investigation responsibility assigned later in 1918 by General Pershing.... The prime role of this criminal investigation Division was to investigate and prevent crimes in the large American Expeditionary Forces in France and elsewhere....
6 Pages (1500 words) Term Paper

Cyber Crime: Investigating Cyber Terrorism

"cyber crime: Investigating Cyber Terrorism" paper looks at Cyber Terrorism in detail.... nbsp; cyber crime refers to any crime that involves computer systems and computer networks.... According to this definition, therefore, a wide spectrum of criminal acts are subsumed under the umbrella term of cyber crime.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities.... nbsp;… Besides the international challenges of investigating and prosecuting cyber terrorists, social media also has posed a real challenge in the investigation and prosecution of cyber terrorists....
10 Pages (2500 words) Coursework

Principles of Cyber Forensic

nbsp;      Principles for cyber forensicDigital forensics deals with digital evidence investigation, evaluation, preservation as well as presentation.... hellip; This paper discusses cyber forensics which is a process of investigating the cyber or digital crime, collecting the data, as well as analyzing them to come up with enough tangible digital or physical evidence that can be presented into a court of law to and ensure that the suspect is justifiably judged....
14 Pages (3500 words) Literature review

Cybercrime - Investigating High-Technology Computer Crime

The author of this paper "Cybercrime - Investigating High-Technology Computer crime" will make an earnest attempt to discuss the growing significance of analysis, validation, and presentation of cyber forensic data with a shallow analysis of the types of cybercrime (Moore, 2011).... The advent of computer and internet technology has led to sophistication in the manner through which crime is perpetrated.... Cybercrime, as it is famously known takes the form of any act of crime that involves a computer and or a network in its perpetration....
17 Pages (4250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us