Essay about CCSI460BeckyDavislab5

959 Words Apr 9th, 2015 4 Pages
CCSI460 Final Forensic Lab Report

Investigator’s Name: Becky Davis

Date of Investigation: April 9, 2015

Lab Number and Title: Lab Week 5: Bid ridding and Cyber-Stalking

Summary of Findings: On April 9, 2015, the following investigation to place at the forensic lab located in Madison Wisconsin, where I was given a Bid rigging and Cyber-Stalking case to investigate pertaining to two companies (Denver Construction Inc.) that is operated in Colorado and (Dells Construction) that operates in Wisconsin. I was also given instruction to research a real-world bid rigging current event. After analyzing the information that was presented to me about both companies, I first attempted to analyze the case of bid rigging which is a scheme in
…show more content…
This type of bid is known to act as competition.

Bid Rotation: Bid rotation is done when all the co-conspirators will submit bids. They do this by agreement and then take turns to be the low bidder on a series of contracts.

After analyzing the information pertaining to Cyber-Stalking on the basis where the wife stated that her ex-husband was Cyber-Stalking her and trying to ruin her company and career. Without additional information such as emails and details of anything related to the claim, I will not be able to carry out on investigation on the basis that the wife is saying her ex-husband is Cyber-Stalking her because there is no evidence proving that he did such thing.

Because of the nature of this case, where the wife is accusing the ex-husband of cyber-stalking it is important that we as investigators have all details of the claims because cyber-stalking is also closely related to:

Cyberharassment. Cyberharassment differs from cyberstalking in that it may generally be defined as not involving a credible threat. Cyberharassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual. Some states approach cyberharrassment by including language addressing electronic communications in general harassment statutes, while others have created stand-alone cyberharassment statutes.

Researched a current bid rigging event

More about Essay about CCSI460BeckyDavislab5

Open Document