Cyber Crime Investigations

Cyber crime investigations should reciprocate the penalties imposed on the victims. The local authorities should provide clear evidences of victim’s involvement in the activities to avoid persecuting innocent users. Any individual found guilty of such crimes should be subjected to a life imprisonment of not less than 3 years. Reports from the National Communication Authority show that Boko Zdravko and Aarron MacGregor have been involved in cyber threats. However, the current investigation has lacked enough information for his persecution thus demanding more reliable investigation techniques (Thompson,  2007, 1). The available information is unreliable as it lacks adequate evidence. They have been obtaining information from computer networks of the United Kingdom border force, HMRC and port authorities among others. They have also been engaging in distinct fraud offences and human trafficking activities in UK.Their connection with the Benninfton Family has raised alarm about their transport connections around South Essex Area. According to the crimetoppers investigators, both suspects are computer literate who have been acquiring the confidential data from the United Kingdom authorities. They have been enhancing their fraud activities such as alcohol and tobacco distribution and sales. They have also been able to facilitate human trafficking into UK. Their penalties should be done in accordance to the criminal act representing the cyber stalking activities and that of human act against human trafficking (Barbara, 1996, 17).

Cyber security influences the existence of terrorism activities. The people involved in cyber security may refer to the authority’s activities to persecute their intended missions. Suspects found guilty of involving in cyber security should thereby be persecuted and fined heavily. Law enforcement should impose heavy fines and persecution to limit the existence of such occasions. Suspects should also provide their information concerning their whereabouts and their communication devices. Through human rights acts, the local authorities should provide detailed information concerning the penalties of any involvement in cyber offences (Barbara, 1996, 6). The authorities should use appropriate techniques to avoid instances of persecuting innocent cyber users. Among the ways of obtaining the evidence for the two suspects include monitoring their communications via the mobile and the landline telephone numbers. This may assist the investigations on tracking other individuals who have been engaging in the same businesses. However, monitoring their mobile and land line telephone will assist in providing the relevant information that they have been communicating. Aarron MacGregor has in several instances been seen purchasing mobile sim cards. Visiting national mobile operators may help in obtaining the evidence. The records of the communications may be used to persecute the two suspects. Computer data evidence can be obtained from the suspect’s computers which they have been using since the fraud activities began. Monitoring the association of the two suspects may include the places that the two have been. Developing a link on their work may also help to show how the two have been transacting businesses.

Among the strategies to prevent the cyber offence include, proper computer maintenance among the targeted users. This involves putting up passwords and changing them often. Hiding the personal information such as gender, names and other descriptive information may limit the cases of cyber offences (Hoffman, 2013, 13). Also monitoring the computer activities such as authentication, internet providers chat programs among others may help reduce the cases of cyber security. Computer users should also learn to put off their computers in case they are not in use (Pettinari, nd, 1). The investigative techniques should not go against human rights. The investigation team should up hold the legal considerations from the surveillance commissioners and maintain the rules of evidence.




Barbara, J. 1996 Report on Cyberstalking:  A New Challenge For Law Enforcement and Industry

Hoffman, C.D. 2013 Investigative Interviewing: Strategies and Techniques. International foundation for protection officers.

Pettinari, D. n.d Cyberstalking investigation and prevention

Thompson, J. 2007. How to Conduct an Effective Investigation

Tripwire guest authors 2014. Preventing and Recovering from Cybercrime. The state of security



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: