Abstract
Interrogations of suspects of cyber crimes after logs of Intrusion Detection Systems (IDSs) have been analyzed, and suspects have been apprehended are contestable issues over the years. Some studies submit that it is the prerogative and responsibility of governments’ agencies like Criminal Justice, Police, and FBI to interrogate suspects of cyber crimes. However, some experts maintain reservations on these issues for the fact that significant numbers of suspects of cyber crimes may not necessarily be accused in some cases once the issues are professionally investigated. Rather than subjecting innocent suspects to social problems like embarrassment, traumatic stigmatization, interpersonal and relationship problems in the society, this chapter submits those private and corporate organizations that have apprehended suspects of should conduct preliminary investigations of the suspects on their own to ascertain the depth of involvement of the suspects in the allegations against him/her. The chapter uses C++ programs and intrusive logs to pragmatically enumerate a number of arguable issues, including charges against suspects of cyber crimes and the limits of conventional methods of interrogations by the Police. The chapter proposes a model for the questioning and classification of suspects and witnesses of cyber crimes. Finally, the above models provide invaluable guidelines to the students of computer forensics and interrogators in conducting preliminary investigations of suspects of cyber crimes in accordance with best corporate and legal standards.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have