As a cyber investigator, you are investigating a group known as BLGRUS (Bootleggers R Us) that is allegedly posting your company’s music files without your permissions. What would be your plan to infiltrate their group (keep in mind their motivations to commit the offense), identify the users, send any legal documentation and preserve evidence.
First of all, for every cyber security investigator. Findings of full proof evidence is a must. Now, for the music related copyright infringement does occur when one's copyrighted music is been used without their consent.
Let's understand music licensing first. If one has created his own music and do proper copyright rights on the music. He can do Music licensing. Basically it is all about one's compensation for his work. Now suppose, if someone uses someone else's original copyrighted music. First thing is for them to do proper licensing with the original creator's consent. Reverse of that can assure big penalty charges on the violater.
Investigation:
As a cyber security investigator. First thing is to find all the possible information for the attacker's footprints (logs), their ip address and their geolocation (of public ip). with the public IP, the investigator can contact the ISP (Internet Service Provider) and can find the details of the attacker like the address, name, location and phone number.
Legalities and penalties:
For a proper legal action. The investigator prepares a report stating all the cyber laws which attacker or violator commits.Basically illegal use of original music comes under copyright infringement which assures penalty of 200$ - 150,000$ (depends on the music licensing). Infringer pays for all attorneys fees and court costs. He also can go to jail.
Get Answers For Free
Most questions answered within 1 hours.