Share your valuable feedback, comments or suggestions on Determining Cyber Crime Responsibility
Determining Cyber Crime Responsibility
Showing Ignorance
Investigator's Role
When the computer is a victim or a container, as in most of the cases the investigator looks into the data stored in it, the access log, the log of the data deleted, altered and time of the crime. All are a significant repository of evidence relevant to provide an element of cybercrime. For an investigator, a computer is irrelevant, as it is just one medium. The evidence collected from data stored in it, ownership or control, data and time of processes and fruits of crime are relevant to an investigator.
An investigator follows the structured, verifiable and ethical process to collect digital evidence. Afterward, analyze and examine the same to discover and determine the scope of legal action, the perpetrator involved in it and further prepare it for presentation in court.
Involvement of Experts
The above process is not so natural as the first investigator has to verify its legal rights to access the information which may be private. Then comes the security of the evidence collected as it is easy and quick to edit, alter, manipulate or delete the digital data. Hence, forensic experts use specialized forensic software, so that information collected remains unaltered and verifiable, i.e., reproducible in front of a jury.
The cybercrime fruits are also received and preserved, the nature of attack, motives or intentions of witnesses and all the actors involved.
Defining Jurisdiction
Once cybercrime committed is established, the next decision comes is the jurisdiction. The physical location of perpetrators is immaterial as it can be undertaken from any part of the world, hence treated as shared jurisdiction crime. The administration defined by the area of the crime, the state where it occurred or its effect as felt. Therefore the state describes its punishment.
Sometimes the perpetrators are citizens of other countries then an agreement for an exchange of information and extradition treaty is needed to have held on suspects.

