Page 32 - Cyber Warnings
P. 32







operation could get organized within 24 hours offering enough time to offender to obtain
everything. After collecting the money from one bank the offenders could put those funds to
another bank – avoiding to leave a trace within a cyberspace through e-transactions.

The ways of making this case resolvable to the Police


Reading the previous segment
of this article, someone would
believe that such a case got
heavily resolvable to the
authorities. The fact is – the
criminals working on this action
would think they would commit a
perfect crime. Their idea would
be to physically collect the
money from one bank and put it
into another – making the Police
Department lose the track of
their next move. The easy way
to prevent such a scenario could
be to issue a recommendation to bank’s officers dealing with the cash to kindly report about any
of those attempts. Once the Police get an opportunity to deal with all of these reports and obtain
the information about the time when an incident occurred – it could be so non-difficult to do a
linkage using video surveillance systems as well as cell phone tracking techniques –
consequently breaking into such a network of contacts and continuing the case with more
confidence.

The fact is that the criminals could change their cell phone SIM cards after the successfully
obtained operation, but anyhow the investigation would get enough findings to begin the case
and keep digging for more information and evidence. For, instance the findings obtained
through a forensic analysis of cyber equipment, video records, cell phone route tracking and
listings could offer a sufficient finding in a practice that could lead to an arrest.



About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and. She writes for American and
Asia-Pacific security magazines. She is a volunteer with the American
corner of Subotica as well as a lecturer with the local engineering society.


32 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   27   28   29   30   31   32   33   34   35   36   37