All the funny and exclusive Videos

Uniform Resource Locator(URL) Cyber Crime Investigation Bangla (সাইবার অপরাধ তদন্ত)Bivas Chatterjee

#সাইবারঅপরাধতদন্ত #URL #UniformResourceLocator #CyberCrimeInvestigationInBangla
This video deals with Uniform Resource Locator or URL and how URL will going to help in CYBER CRIME INVESTIGATION of a FAKE ACCOUNT allegations in Bangla.

The common people as well as investigating officers as well as all the various stake holders of the judicial system need to know what is Uniform Resource Locator or URL and how URL will going to help in CYBER CRIME INVESTIGATION of a FAKE virtual account allegations. The very purpose of an URL
is to refer a computer resource in the virtual world or on the Internet. It is an identifier of a page on the virtual world

ONE URL HAS FOLLOWING PARTS:
I) PROTOCOL INDETIFIER
II)NAME OF COMPUTER RESOURCE which includes the followings:
a) domain name
b) path

SIGNIFICANCE OF URL
(FOR COMMON MAN)

One has to preserve the text url of his case
when filing complain against any allegation arising out of computer resources, one has to mention the url in the said complain to help start investigation for his/her reliefs

SIGNIFICANCE OF URL
(FOR INVESTIGATING OFFICERS)

The starting point of investigation is collecting and inspecting the url
collected url-text for documentation

IP ADDRESS
(COMMUNICATION BETWEE SERVER AND NETWORKS)

Whenever you are connected in to internet, your service provider(internet service provider or ISP) will allocate one IP address to you which may be dynamic or static. You can identify your IP by using whatismyip tool (type what is my ip in browser)

LOCARD EXCHANGE PRINCIPLE

“EVERY CONTACT LEAVES A TRACE”
BY DR. EDMOND LOCARD
The above principle is equally applicable in today’s cyber crime investigation and fact-finding….

CYBER CRIME INVESTIGATION
CASE: Let us imagine that a person complains that in his/her name a fake facebook account has been created and at a given point of time some lascivious photo has been posted by offender.

STEP BY STEP INVESTIGATION:
(collection of url text)

Investigation officer has to seize electronic documents from complainant or otherwise which will have url mentioned.
e.g officer may make seizure of screenshots of fake account carrying the url of the page alongwith statement u/s 65b of Indian Evidence act duly issued by the concerned person.

SENDING REQUISITION FOR IP ADDRESS:
Investigation officer then has to study the url mentioned and send requisition to concerned domain named intermediary for followings:
1)fake account creation details(creation ip)
2) log-in details with respect to the time and date of posting the said lascivious picture alleged by complainant(log-in ip)

IDENTIFYING THE ISP:
After obtaining ip address/addresses from the intermediaries the investigating officer may put the the IP Address in the box given in any page after searching with ip-look- up tools.
investigation.

ASKING ISP FOR IPLOG:
Now the time is to ask ISP that whom it has allocated that IP or those ISP at that date and at that point of time.
The investigating officer will ask for IPLog/IPDR/IP Allocation details with respect to the IP address, date, time already obtained.
investigation

ANALYSING THE IP LOG:
After obtaining IP log/IPDR/IP allocation details it is time to analysing the same.
on analysis the i.o. will get lot of vital informations with respect to the offender(e.g connection number, IMEI no.,cell id to decode the location etc) if he is actually committing crime with help of those resources..

DISCLAIMER
THE STEPS MAY NOT BE SO SIMPLE OR SAME IN ALL CASES AND THERE ARE ISSUES ON DATA PROVIDED BY INTERMEDIARIES WHICH MAY COMPLICATE THE INVESTIGATION OF A PARTICULAR CASE.
লোকার্ড এক্সচেঞ্জ তত্ত্ব

No comments yet.

Leave a Reply