CYBER CRIME INVESTIGATION CAT.docx - JARAMOGI OGINGA ODINGA UNIVERSITY OF SCIENCE AND TECHNOLOGY SCHOOL INFORMATICS AND INNOVATIVE SYSTEM DEPARTMENT

CYBER CRIME INVESTIGATION CAT.docx - JARAMOGI OGINGA ODINGA...

This preview shows page 1 - 3 out of 7 pages.

JARAMOGI OGINGA ODINGA UNIVERSITY OF SCIENCE AND TECHNOLOGY SCHOOL: INFORMATICS AND INNOVATIVE SYSTEM DEPARTMENT: COMPUTER SCIENCE AND SOFTWARE ENGINEERING FACULTY: COMPUTER SECURITY AND FORENSICS COURSE TITLE: CYBER CRIME INVESTIGATION COURSE CODE: IIT3414 GROUP MEMBERS 1. WAMALWA WANYONYI DOMINIC I132/1518/2016 2. SINDANI MIKE MACHANGA I132/1520/2016 3. KIPTOO BWALEY DAVIS I132/1522/2016 4. KORIR BRIAN KIPKOGEI I132/1523/2016 5. ONYANGO CHRIS ODHIAMBO I132/1525/2016 6. ENOSTINE JEPKOSGEI I132/1527/2016 7. KINTALEL DAVID KAMWASI I132/1528/2016 8. KIBIWOTT DENNIS KIPRUTO I132/1529/2016 9. EZRA OKUMU I132/1530/2016 10. FWAMBA BARASA STEPHEN I132/1532/2016 11. MORARA STEPHEN MOMANYI I132/1534/2016 LECTURER: MR MOTENDE Question
Image of page 1
A student at JOOUST has been found with child pornography. Highlight various steps you will follow to gather evidence until he is prosecuted (take to court). A suspect can be caught in the following ways; 1. Peer to peer investigations through file sharing. 2. Child Pornography found subsequent to other computer forensic examinations. 3. Reported by someone who are using their computers. 4. Reported by a third party. 5. Reported by an Internet Service Provider. 6. Computers seized as part of a sex crime investigation. Investigation Process During the investigation stage, the police should require evidence to back up any claims that a student has actually been involved with the possession, making or distribution of child pornography. A police officer or Investigating team will have to seek for search warrant which will help to get the actual name of the user and other pertinent information, such as address and phone number, from the service provider. Whilst executing their search, the police would have the power to seize computers, hard drives, tablets, mobile phones and other devices which they believe may contain evidence of child pornography or extreme pornography. 1. Step 1 Search and Seizure Tools are used to retrieve information on a network. This tools can help in checking whether the suspect either downloaded or has shared the copy with friends online. The Police will have to answer the following questions; What is present? Is there any Pictures Thumbnails , Full size images, movies Is the Child Pornography embedded in the middle or it is all Child Pornography? Are the movies complete or incomplete?
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 7 pages?

  • Fall '18
  • Ogara

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture