- Tags:
- Show more
- Pages:
- 6
- Words:
- 1650
Investigating Researching and Gathering Evidence Student’s Name Institution’s Name Abstract Pedophiles use the Internet to prey on the innocent young generation. A person whose kid has been a victim to the pedophiles has come into contact on how convicting such people can be challenging if evidence is not properly collected. Some other members of society are victims of the pedophiles too; pedophiles make payments online using stolen credit card information to cover their tracks. Cybercrime is a threat that is only begging to gain shape given the number of gadgets that make the internet of things (IoT). Steps that can be taken to collect, preserve and transport digital evidence have been looked into in this paper. The work of a cybercrime prevention officer will be rendered futile if such officers do not work together with forensic officers specialized in digital data. Not every cybercriminal will get prosecuted for their offenses as they can easily encrypt or destroy incriminating data. So far, the deep web has been a haven for many pedophiles. Key Words: Pedophiles, IoT, Encryption, Decryption, Deep web, Internet protocol, identity theft Internet crimes are multiplying due to the increase in the number of items that make up the internet of things which has made the commission of crimes rampant. Pedophiles use stolen credit card numbers to receive and make online payments online. There is the deep web where criminals have established online stores where selling of compromised credit cards takes place (Bradley, 2004). Some software that is used in the aiding of pedophile activities is obtained from the deep web. Security agencies have set up special units
Leave feedback