Page 21 - Cyber Warnings
P. 21







The ways of starting the case
The best way to start the case is to get some information from the person being complaining
about some irregular occurrence. Sometimes these guys would just offer the first-hand
information and not appear as willing to participate in the investigation. The Police Force should
find the way to discretely encourage the source of information to update the investigation with
some findings from time to time. Some people being so talented to the policing tasks would
willingly handle their part of the job. In a practice, the witness of crime may get friendly,
unfriendly and neutral. It’s obvious why someone may show some sort of revolt about the
authorities – probably for the reason of the complete dissatisfaction with the situation in the
society. Also, those guys being so skillful in policing roles would willingly share the information
with the Police and they would so commonly feel so proud to themselves because they may
support the authorities. The biggest challenge is working with the neutral witness for the reason
– it’s quite trickery to involve him into the case. Even if the witness got unfriendly – it’s much
easier to obtain the information from him because you can always challenge him to talk and
even if he gets a negative opinion about the Police Force – he would say many of those despite
to the authorities. The neutral informant usually requires the special effort and lots of hard work
making him attracted to tell anything.

How to manage your source of findings?
Here, we would discuss how your sources of findings may deal in a practice and so common
way to manage your source is through cyber technologies. Today, it’s so usual that a defense
community would use computers, internet and mobile devices to collect the information from
their informants. So common way of dealing with the sources is through the Deep Web and in
many cases, the Police or the intelligence community would use the Tor to talk to their
informants. This is quite secure way of the information gathering offering to all the high level of
anonymity as well as a great amount of safety to the source of findings.

The concluding remarks
Finally, we would conclude this effort with the advice that a security should follow the
technological development of the human kind and try to take advantage of our progress to
obtain things being important to its tasks. Some security principles would never change and it’s
only about the new stuffs that would require new skills from the Defense Forces.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and. She writes for American and Asia-
Pacific security magazines. She is a volunteer with the American corner of
Subotica as well as a lecturer with the local engineering society.




21 Cyber Warnings E-Magazine – July 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   16   17   18   19   20   21   22   23   24   25   26