In what ways can the Internet be used by investigators? Explain this question in details.
The internet has been of great importance to the users as well as other parties such as the investigators. As much as the internet has been of concern to people for posting and sharing their thoughts, it has also become a place for crimes. Investigators can gain much information from the internet when they are conducting an Internet-related crime. Nowadays, controlling the population that accesses the internet for either good or bad intentions has become hard (IACP, 2015). This is because anyone can easily access the internet without restriction regardless of age, gender, or intentions.
Delegate your assignment to our experts and they will do the rest.
The investigators can significantly gain from the internet primarily if the crime is directly related to the internet. If it is indeed connected to the internet, then the first thing or step they should take is to find the internet protocol (IP) addresses. This address contains a series of numbers and letters that are put intact with any data that is moving around the internet. The step of retrieving this information requires a permit from the court to conduct the investigation. The IP address for that matter will be of great use to the investigators since the information contains detailed information about the users (IACP, 2015). This information includes the owner of the network address, domain name, email address as well as the local provider identifier.
All this information can easily be accessed from the ISPs or the Internet Service Providers whose subscriptions are based to the company. This means that the companies have got a record of everything their subscribers are doing on the internet (Ciardhuáin, 2004 p10). However, the investigation related to internet crime must move on a quick mode since the information is not held for an extended period (Moore, 2014). But on the bright side for the investigator, they are given a chance to request the company to hold the required piece of information a bit longer for the investigation to proceed.
References
International Association of Chiefs of Police, (IACP). (2015). Cyber Crime Investigations. Law Enforcement Cyber Center . Retrieved on 17 May 2019, from http://www.iacpcybercenter.org/investigators/cyber-crime-investigations/
Moore, R. (2014). Cybercrime: Investigating high-technology computer crime . Routledge.
Ciardhuáin, S. Ó. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence , 3 (1), 1-22.