Abstract

Interrogations of suspects of cyber crimes after logs of Intrusion Detection Systems (IDSs) have been analyzed, and suspects have been apprehended are contestable issues over the years. Some studies submit that it is the prerogative and responsibility of governments’ agencies like Criminal Justice, Police, and FBI to interrogate suspects of cyber crimes. However, some experts maintain reservations on these issues for the fact that significant numbers of suspects of cyber crimes may not necessarily be accused in some cases once the issues are professionally investigated. Rather than subjecting innocent suspects to social problems like embarrassment, traumatic stigmatization, interpersonal and relationship problems in the society, this chapter submits those private and corporate organizations that have apprehended suspects of should conduct preliminary investigations of the suspects on their own to ascertain the depth of involvement of the suspects in the allegations against him/her. The chapter uses C++ programs and intrusive logs to pragmatically enumerate a number of arguable issues, including charges against suspects of cyber crimes and the limits of conventional methods of interrogations by the Police. The chapter proposes a model for the questioning and classification of suspects and witnesses of cyber crimes. Finally, the above models provide invaluable guidelines to the students of computer forensics and interrogators in conducting preliminary investigations of suspects of cyber crimes in accordance with best corporate and legal standards.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.