Bivas
Uniform Resource Locator | URL | CYBER CRIME INVESTIGATION(FAKE ACCOUNT)
Bivas Chatterjee 26 Aug 2019

Uniform Resource Locator | URL | CYBER CRIME INVESTIGATION(FAKE ACCOUNT)

The common people as well as investigating officers as well as all the various stake holders of the judicial system need to know what is Uniform Resource Locator or URL and how URL will going to help in CYBER CRIME INVESTIGATION of a FAKE virtual account allegations. The very purpose of an URL

is to refer a computer resource in the virtual world or on the Internet. It is an identifier of a page on the virtual world


ONE URL HAS FOLLOWING PARTS: 

I) PROTOCOL INDETIFIER

II)NAME OF COMPUTER RESOURCE which includes the followings: 

         a) domain name

         b) path


SIGNIFICANCE OF URL

(FOR COMMON MAN)


One has to preserve the text url of his case 

when filing complain against any allegation arising out of computer resources, one has to mention the url in the said complain to help start investigation for his/her reliefs


SIGNIFICANCE OF URL

(FOR INVESTIGATING OFFICERS)


The starting point of investigation is collecting and inspecting the url 

collected url-text for documentation 


IP ADDRESS

(COMMUNICATION BETWEE SERVER AND NETWORKS)


Whenever you are connected in to internet, your service provider(internet service provider or ISP) will allocate one IP address to you which may be dynamic or static. You can identify your IP by using whatismyip tool (type what is my ip in browser)


LOCARD EXCHANGE PRINCIPLE


“EVERY CONTACT LEAVES A TRACE”

       BY DR. EDMOND LOCARD

The above principle is equally applicable in today’s cyber crime investigation and fact-finding….


CYBER CRIME INVESTIGATION

CASE: Let us imagine that a person complains that in his/her name a fake facebook account has been created and at a given point of time some lascivious photo has been posted by offender.


STEP BY STEP INVESTIGATION:  

(collection of url text)


Investigation officer has to seize  electronic documents from complainant or otherwise which will have url mentioned.

e.g officer may make seizure of screenshots of fake account carrying the url of the page alongwith statement u/s 65b of Indian Evidence act duly issued by the concerned person. 


SENDING REQUISITION FOR IP ADDRESS: 

Investigation officer then has to study the url mentioned and send requisition to concerned domain named intermediary for followings:

1)fake account creation details(creation ip)

2) log-in details with respect to the time and date of posting the said lascivious picture alleged by complainant(log-in ip)



IDENTIFYING THE ISP: 

After obtaining ip address/addresses from the intermediaries the investigating officer may put the the IP Address in the box given in any page after searching with ip-look- up tools. 

investigation. 


ASKING ISP FOR IPLOG: 

Now the time is to ask ISP that whom it has allocated that IP or those ISP at that date and at that point of time.

The investigating officer will ask for IPLog/IPDR/IP Allocation details with respect to the IP address, date, time already obtained. 

investigation 


ANALYSING THE IP LOG: 

After obtaining IP log/IPDR/IP allocation details it is time to analysing the same.

on analysis the i.o. will get lot of vital informations with respect to the offender(e.g connection number, IMEI no.,cell id to decode the location etc) if he is actually committing crime with help of those resources.. 


DISCLAIMER

THE STEPS MAY NOT BE SO SIMPLE OR SAME IN ALL CASES AND THERE ARE ISSUES ON DATA PROVIDED BY INTERMEDIARIES WHICH MAY COMPLICATE THE INVESTIGATION OF A PARTICULAR CASE.


For details please watch my videos both in English and Hindi at the following link:

https://www.youtube.com/watch?v=Zz4-qXDhv0k

https://www.youtube.com/watch?v=llbhepjetzU&t=23s

Uniform Resource Locator(URL)Cyber Crime Investigation Hindi (साइबर अपराध की जांच)Bivas Chatterjee


Did you find this write up useful? YES 0 NO 0
JOSEP   12 Aug 2023 1:54am
I’m very excited to speak about Century Wizard Bitcoin Recovery, this cyber security company was able to assist me in recovering my stolen digital funds read more
Reply
  20 Jun 2023 4:23pm
ARE YOU A VICTIM OF INVESTMENT OR NFT SCAM? SCHEDULE A MEETING WITH AN ETHICAL HACKER ASAP FOR COMPLETE RECOVERY. ASOREHACKCORP is a financial regulator, read more
Reply
George Taylor   29 Apr 2023 8:41am
Hello Everyone, Am George Taylor a professional blank ATM card hacker and a bitcoin trader, Have you been trying to get a blank ATM card or you want to read more
Reply
Esther Miram   21 Mar 2023 3:32am
Am sharing this testimony because I promise Morgan hacks that I will tell the world about his good work. Thanks once again Morgan hacks. I have been depressed read more
Reply
  20 Mar 2023 10:07pm
I'm so happy that I finally won $13.3 million Mega Millions lottery jackpot, I took an advice from someone who talked about this great spell caster called read more
Reply
Desmond   16 Mar 2023 11:53pm
I was having Herpes Simplex Virus then i came across a review of people saying that they got treated from Herpes Simplex Virus by Robinson buckler., So read more
Reply
Daniel Roots   12 Oct 2021 2:37pm
In recent time, I begin to wonder why most broken relationships occur due to cheating. It’s hard to find someone who will love you wholeheartedly like read more
Reply
Ouss   17 Aug 2020 3:41pm
Https://whatismyiptool.com vérifiée ton ip
Reply
×

C2RMTo Know More

Something Awesome Is In The Work

0

DAYS

0

HOURS

0

MINUTES

0

SECONDS

Sign-up and we will notify you of our launch.
We’ll also give some discount for your effort :)

* We won’t use your email for spam, just to notify you of our launch.
×

SAARTHTo Know More

Launching Soon : SAARTH, your complete client, case, practise & document management SAAS application with direct client chat feature.

If you want to know more give us a Call at :+91 98109 29455 or Mail info@soolegal.com