SlideShare ist ein Scribd-Unternehmen logo
1 von 88
Investigation of Cyber
                         Crimes & Forensics
                       Biju Pattnaik State Police Academy
                                   Bhubaneswar
                                         By
                                 Dr. Tabrez Ahmad
                                 Professor of Law
                             www.technolexindia.com
1   Dr. Tabrez Ahmad   http://technolexindia.blogspot.com
Agenda

1. The possible reliefs to a cybercrime
     victim and strategy adoption
2.   The preparation for prosecution
3.   Admissibility of digital evidence in
     courts
4.   Defending an accused in a computer
     related crime
5.   The techniques of cyber investigation
     and forensic tools
6.   Future course of action




2     Dr. Tabrez Ahmad
Possible reliefs to a cybercrime
    victim- strategy adoption
     A victim of cybercrime needs to immediately report the matter to
        his local police station and to the nearest cybercrime cell
       Depending on the nature of crime there may be civil and criminal
        remedies.
       In civil remedies , injunction and restraint orders may be
        sought, together with damages, delivery up of infringing matter
        and/or account for profits.
       In criminal remedies, a cybercrime case will be registered by
        police if the offence is cognisable and if the same is non
        cognisable, a complaint should be filed with metropolitan
        magistrate
       For certain offences, both civil and criminal remedies may be
        available to the victim



3   Dr. Tabrez Ahmad
Before lodging a cybercrime case
     Important parameters-
     Gather ample evidence admissible in a court of law
     Fulfill the criteria of the pecuniary ,territorial and
      subject matter jurisdiction of a court.
     Determine jurisdiction – case may be filed where the
      offence is committed or where effect of the offence is
      felt ( S. 177 to 179, CrPc)




4   Dr. Tabrez Ahmad
The criminal prosecution pyramid
                                    Conviction
                                     /acquittal


                                      Trial


                               Contents of charge


                          Issue of process –summons,
                                     warrant


                             Examine the witnesses


                        Examine the complainant on oath


                 Initiation of criminal proceedings-cognizance of
                               offences by magistrates
5   Dr. Tabrez Ahmad
Preparation for prosecution
     Collect all evidence available & saving snapshots of evidence
     Seek a cyberlaw expert‟s immediate assistance for advice on
        preparing for prosecution
        Prepare a background history of facts chronologically as per
        facts
       Pen down names and addresses of suspected accused.
       Form a draft of complaint and remedies a victim seeks
       Cyberlaw expert & police could assist in gathering further
        evidence e.g tracing the IP in case of e-mails, search & seizure
        or arrest as appropriate to the situation
       A cyber forensic study of the hardware/equipment/ network
        server related to the cybercrime is generally essential




6   Dr. Tabrez Ahmad
Government Initiative
    • The Cyber Crime Investigation cell (CCIC) of
       the CBI, notified in September 1999, started
       functioning from 3 March 2000.
    • It is located in New Delhi, Mumbai, Chennai
       and Bangalore.
    • Jurisdiction of the cell is all over India.

    • Any incident of the cyber crime can be
       reported to a police station, irrespective of
       whether it maintains a separate cell or not.
7   Dr. Tabrez Ahmad
The Indian Computer Emergency Response
    Team (CERT-In)
 IT Amendment ACT 2008.
    “70A. (1) The Indian Computer Emergency Response Team (CERT-In)
     shall serve as the national nodal agency in respect of Critical
     Information Infrastructure for coordinating all actions relating to
     information security practices, procedures, guidelines, incident
     prevention, response and report.

     (2) For the purposes of sub-section (1), the Director of the Indian
    Computer Emergency Response Team may call for information
    pertaining to cyber security from the service providers, intermediaries or
    any other person.



8      Dr. Tabrez Ahmad
Cognizability and Bailability
    As per IT Amendment Act 2008

    Offences which have not less than 3 years
    punishment are cognizable and bailable




9      Dr. Tabrez Ahmad
                             9
Power of Police to Investigate
        Section 156 Cr.P.C. : Power to
        investigate cognizable offences.
        Section 155 Cr.P.C. : Power to
        investigate non cognizable offences.
        Section 91 Cr.P.C. : Summon to
        produce documents.
        Section 160 Cr.P.C. : Summon to
        require attendance of witnesses.

10   Dr. Tabrez Ahmad
Power of Police to investigate (contd.)
        Section 165 Cr.P.C. : Search by police
        officer.
        Section 93 Cr.P.C : General provision as to
        search warrants.
        Section 47 Cr.P.C. : Search to arrest the
        accused.
        Section 78 of IT Act, 2000 : Power to
        investigate offences-not below rank of
        Inspector.
        Section 80 of IT Act, 2000 : Power of police
        officer to enter any public place and
        search & arrest.

11   Dr. Tabrez Ahmad
Amendments- Indian Evidence
    Act 1872
 Section 3 of the Evidence Act amended to take care of
  admissibility of ER as evidence along with the paper based records
  as part of the documents which can be produced before the court
  for inspection.

 Section 4 of IT Act confers legal recognition to electronic records




                         Dr. Tabrez Ahmad                      12
Societe Des products Nestle SA case                  2006 (33 ) PTC 469


 By virtue of provision of Section 65A, the contents of electronic records may be
     proved in evidence by parties in accordance with provision of 65B.
    Held- Sub section (1) of section 65B makes admissible as a document, paper
     print out of electronic records stored in optical or magnetic media produced by a
     computer subject to fulfillment of conditions specified in subsection 2 of Section
     65B .
a)   The computer from which the record is generated was regularly used to store or
     process information in respect of activity regularly carried on by person having
     lawful control over the period, and relates to the period over which the computer
     was regularly used.
b)   Information was fed in the computer in the ordinary course of the activities of the
     person having lawful control over the computer.
c)   The computer was operating properly, and if not, was not such as to affect the
     electronic record or its accuracy.
d)   Information reproduced is such as is fed into computer in the ordinary course of
     activity.
 State v Mohd Afzal, 2003 (7) AD (Delhi)1




13       Dr. Tabrez Ahmad
State v Navjot Sandhu
     (2005)11 SCC 600
      Held, while examining Section 65 B Evidence Act, it
        may be that certificate containing details of subsection
        4 of Section 65 is not filed, but that does not mean
        that secondary evidence cannot be given.

      Section 63 & 65 of the Indian Evidence Act enables
        secondary evidence of contents of a document to be
        adduced if original is of such a nature as not to be
        easily movable.




14   Dr. Tabrez Ahmad
Presumptions in law- Section 85 B
     Indian Evidence Act
      The law also presumes that in any proceedings, involving secure
        digital signature, the court shall presume, unless the contrary is
        proved, that the secure digital signature is affixed by the
        subscriber with the intention of signing or approving the
        electronic record

      In any proceedings involving a secure electronic record, the
        court shall presume, unless contrary is proved, that the secure
        electronic record has not been altered since the specific point of
        time, to which the secure status relates




15   Dr. Tabrez Ahmad
Presumption as to electronic messages-
Section 88A of Evidence Act
      The court may treat electronic messages received as
       if they were sent by the originator, with the exception
       that a presumption is not to be made as to the person
       by whom such message was sent.
      It must be proved that the message has been
       forwarded from the electronic mail server to the
       person ( addressee ) to whom such message
       purports to have been addressed
      An electronic message is primary evidence of the fact
       that the same was delivered to the addressee on date
       and time indicated.



16   Dr. Tabrez Ahmad
IT Amendment Act 2008-Section 79A
  Section 79A empowers the Central govt to appoint any
   department, body or agency as examiner of electronic
   evidence for proving expert opinion on electronic form
   evidence before any court or authority.
  Till now, government forensic lab of hyderabad was
   considered of evidentiary value in courts- CFSIL
  Statutory status to an agency as per Section 79A will be of
   vital importance in criminal prosecution of cybercrime
   cases in India




17   Dr. Tabrez Ahmad
Probable activities for defense by an
     accused in a cybercrime case
        Preparation of chain of events table
        Probing where evidence could be traced? E-mail
           inbox/files/folders/ web history
          Has the accused used any erase evidence
           software/tools
          Forensically screening the hardware/data/files /print
           outs / camera/mobile/pendrives of evidentiary value
          Formatting may not be a solution
          Apply for anticipatory bail
          Challenge evidence produced by opposite party and
           look for loopholes
          Filing of a cross complaint if appropriate


18     Dr. Tabrez Ahmad
Sec 69: Decryption of information
      Ingredients
        Controller issues order to Government agency to
         intercept any information transmitted through any
         computer resource.
        Order is issued in the interest of the
            sovereignty or integrity of India,
            the security of the State,
            friendly relations with foreign States,
            public order or
            preventing incitement for commission of a cognizable
             offence
        Person in charge of the computer resource fails to
          extend all facilities and technical assistance to
          decrypt the information-punishment upto 7 years.

19    Dr. Tabrez Ahmad
Sec 70 Protected System
      Ingredients
        Securing unauthorised access or attempting to secure
         unauthorised access
        to „protected system‟
      Acts covered by this section:
        Switching computer on / off
        Using installed software / hardware
        Installing software / hardware
        Port scanning
      Punishment
        Imprisonment up to 10 years and fine
      Cognizable, Non-Bailable, Court of Sessions




20    Dr. Tabrez Ahmad
Computer Forensics and Cyberforensics
Computer forensics is considered to be the use of analytical
and                  investigative    techniques              to
identify, collect, examine, preserve and present evidence or
information which is magnetically stored or encoded
A better definition for law enforcement would be the scientific
method of examining and analyzing data from computer storage
media so that the data can be used as evidence in court.
Media = computers, mobile phones, PDA, digital camera, etc.




21    Dr. Tabrez Ahmad
Handling of Evidences by Cyber Analysts

                          Collect, Obs   Analyze and
     Identify               erve &                           Verify
                                          Organize
                           Preserve


     Four major tasks for working with digital evidence

Identify: Any digital information or artifacts that can be
used as evidence.
Collect, observe and preserve the evidence
Analyze, identify and organize the evidence.
Rebuild the evidence or repeat a situation to verify the
same results every time. Checking the hash value.

22     Dr. Tabrez Ahmad
Incident Response – a precursor to Techniques of
     Cyber investigation & forensic tools
      „Incident response‟ could be defined as a precise set of actions
        to handle any security incident in a responsible ,meaningful and
        timely manner.

      Goals of incident response-
      To confirm whether an incident has occurred
      To promote accumulation of accurate information
      Educate senior management
      Help in detection/prevention of such incidents in the future,
      To provide rapid detection and containment
      Minimize disruption to business and network operations
      To facilitate for criminal action against perpetrators




23   Dr. Tabrez Ahmad
Six steps of Incident response

                                           Detection   of incidents
                Pre incident preparation




                 Resolution                               Initial response




                                           Investigate the incident
                              Reporting




24   Dr. Tabrez Ahmad
Techniques of cyber investigation-
     Cyber forensics
      Computer forensics, also called cyber forensics, is the
        application of computer investigation and analysis techniques to
        gather evidence suitable for presentation in a court of law.

      The goal of computer forensics is to perform a structured
        investigation while maintaining a documented chain of evidence
        to find out exactly what happened on a computer and who was
        responsible for it.




25   Dr. Tabrez Ahmad
6 A‟s of digital forensics
                             Assessment

                             Acquisition

                             Authentication

                             Analysis

                             Articulation




26   Dr. Tabrez Ahmad
Rules of evidence
                             Computer forensic
                              components-

                             Identifying
                             Preserving
                             Analysing
                             Presenting evidence in a
                              legally admissible manner




         Dr. Tabrez Ahmad                         27
FBI handbook of forensic investigation-
techniques for computer forensics
Examine type of content in              Comparison of data files
computer

Transactions-to know time               Data files can be extracted
and sequence when data files            from computer
were created
Deleted data files can be               Data files can be converted
recovered from the computer             from one format to the other

Key word searching                      passwords


Limited source code can be              Storage media with
analysed and compared                   standalone word processors
                                        can be examined
                     Dr. Tabrez Ahmad                        28
Sources of Evidence

         Existing Files
         Deleted Files
         Logs
         Special system files (registry etc.)
         Email archives, printer spools
         Administrative settings
         Internet History
         Chat archives
         Misnamed Files
         Encrypted Files / Password Protected files etc.




29   Dr. Tabrez Ahmad
Cyberforensics in accounting frauds
      Use of CAAT –computer assisted audit techniques-
         spreadsheets, excel, MS access
        Generalized audit software-PC based file interrogation software-
         IDEA,ACL
        Help detect fictitious suppliers, duplicate payments, theft of
         inventory
        Tender manipulation, secret commissions
        False financial reporting
        Expense account misuse
        Insider trading




30   Dr. Tabrez Ahmad
Establishment and maintenance of „Chain of
     Custody

      Tools required:
      - Evidence notebook
      - Tamper evident labels
      - Permanent ink pen
      - Camera
      Document the following:
      - Who reported the incident along with critical date and times
      - Details leading up to formal investigation
      - Names of all people conducting investigation
      - Establish and maintain detailed „activity log‟




31   Dr. Tabrez Ahmad
Maintaining Chain Of Custody
                             Take pictures of the evidence
                             - Document „crime scene‟
                                details
                               Document identifiable markings
                                on evidence
                                Catalog the system contents
                                Document serial
                                numbers, model
                                numbers, asset tags
                               “Bag” it!
                                Maintain Chain Of Custody on
                                tamperproof
                                evidence bag
                               Take a picture!

         Dr. Tabrez Ahmad                            32
E-mail forensics
      E-mail composed of two parts- header and body
      Examine headers
      Request information from ISP
      Trace the IP
      Tools-Encase,FTK,Final email
      Sawmill groupwise
      Audimation for logging
      Cracking the password- brute force attack, smart
       search, dictionary search, date search, customised
       search, guaranteed decryption, plaintext attack
      Passware, ultimate zip cracker,office recovery enterprise,etc




33   Dr. Tabrez Ahmad
Computer forensic analysis within the forensic
tradition.

  Alphonse Bertillon- [freezing the scene]: in 1879
   introduce a methodical way of documenting the scene by
   photographing,                                           for
   example, bodies, items, footprints, bloodstains in situ with
   relative measurements of location, position, and size
   Bertillon is thus the first known forensic photographer.


  Bertillonage : system of identifying individuals over 200
   separate body measurements, was in use till 1910 and was
   only rendered obsolete by the discovery that fingerprints
   were unique.
34   Dr. Tabrez Ahmad
Key Principal of Forensics

  Edmond Locard articulated one of the forensic
     science‟s key rules, known as Locard’s Exchange
     Principle.

  “The principle states that when two items or
     persons come into contact, there will be an
     exchange of physical traces. Something is
     brought, and something is taken away, so that
     suspects can be tied to a crime scene by detecting
     these traces”.
35     Dr. Tabrez Ahmad
Stakeholders:
  National security

  Custom & Excise

  Law enforcement agents
  Businesses                 (embezzlement,           industrial
     espionage, stealing confidential information, and racial or
     sexual harassment).
  Corporate crime [according to report the accountants and
     auditors for Enron not only used e-mail to communicate but also
     subsequently deleted these e-mails]

36     Dr. Tabrez Ahmad
Problems In Indian Context.
  No     Standard       for   Computer   Forensic   is    yet
     developed.

  No      Guidelines for Companies          dealing      with
     electronic data, during disputes.

  No recognition to any of the forensics tool.


  Issues related to anti-forensics are not talked
     about. ………………

37    Dr. Tabrez Ahmad
Over All Scenario
  To date, computer forensics has been primarily driven by
 vendors and applied technologies with very little consideration
 being given to establishing a sound theoretical foundation


  The national and international judiciary has already begun
 to question the ‘‘scientific’’ validity of many of the ad hoc
 procedures and methodologies and is demanding proof of
 some sort of theoretical foundation and scientific rigor.




38      Dr. Tabrez Ahmad
CONTD..

  Commercial software tools are also a problem
 because software developers need to protect their
 code to prevent competitors from stealing their
 product.

 However, since most of the code is not made
 public, it is very difficult for the developers to verify
 error rates of the software, and so reliability of
 performance is still questionable .




39   Dr. Tabrez Ahmad
CONTD..
 The specialized tools used by a computer forensic
 expert are viewed as intolerably expensive by many
 corporations, and as a result many corporations
 simply choose not to invest any meaningful money
 into computer forensics. This trend amplifies cyber
 crime rates

 Open source software‟s were also not been tested
 or verified for the effectiveness to serve the above
 purposes (Open for research)

40   Dr. Tabrez Ahmad
Legal Aspects
      The growing demand for security and certainty in
        cyber space leads to more stringent laws.

      The violation and maintaining of these laws (cyber
        laws) must be distinguished from classical criminal
        activities and criminal law enforcement.

      The dynamics between these different forms of law
        violation and law enforcement is important and shall
        be addressed.


41   Dr. Tabrez Ahmad
Computer Forensic Tools
           Forensic Tool Kit:

     FTK is developed by
     Access Data Corporation
     (USA); it enables law
     enforcement          and
     corporate        security
     professionals to perform
     complete and in-depth
     computer         forensic
     analysis.
42   Dr. Tabrez Ahmad            Main Window of FTK
TYPICAL TOOLS
      EMAIL TRACER
      TRUEBACK
      CYBERCHECK
      MANUAL




43   Dr. Tabrez Ahmad
Current and Emerging Cyber Forensic Tools of Law Enforcement




44   Dr. Tabrez Ahmad
ENCASE FORENSIC:

     Encase Forensic developed by Guidance
     Software USA is the industry standard in
     computer forensic investigation technology.
     With an intuitive Graphical User Interface
     (GUI),    superior   analytics,     enhanced
     email/Internet support and a powerful
     scripting    engine,   EnCase        provides
     investigators   with   a     single    robust
     tool, capable of conducting large-scale and
     very complex investigations from beginning
     to end.



45       Dr. Tabrez Ahmad                            Main Window of
                                                     Encase
 Encase Forensic is very useful forensic solution
      but it lacks following important feature:

      In  Encase forensic there is no password
      cracking/recovery facility. So if during investigation
      process the examiner detected any password
      protected files then he had to rely on third party
      tools.


46      Dr. Tabrez Ahmad
EMAIL TRACER FORENSIC TOOL




47   Dr. Tabrez Ahmad
FEATURES OF EMAIL TRACER

 •Display of Actual Mail Content for Outlook Express, Eudora, MS Outlook
 and mail clients with MBOX mailbox.
 •Display the Mail Content (HTML / Text)
 •Display the Mail Attributes for Outlook Express.
 •Display of extracted E-mail header information
 •Save Mail Content as .EML file.
 •Display of all Email attachments and Extraction.
 •Display of E-mail route.
 •IP trace to the sender’s system.
 •Domain name look up.
 •Display of geographical location of the sender’s gateway on a world map.
 •Mail server log analysis for evidence collection.
 •Access to Database of Country code list along with IP address information.


48    Dr. Tabrez Ahmad
EMAIL TRACING OVER WEB

                        AS A PRE-EMPTIVE TOOL




49   Dr. Tabrez Ahmad
EMAIL TRACING SERVICE
      Users can submit their tracing task to Email
       Tracer through web.
      Tracing IP Address upto city level (non-spoofed)
      Detection of spoofed mail
      Detailed report




50   Dr. Tabrez Ahmad
51   Dr. Tabrez Ahmad
52   Dr. Tabrez Ahmad
53   Dr. Tabrez Ahmad
SEIZURE & ACQUISITION TOOL

                        TRUEBACK




54   Dr. Tabrez Ahmad
FEATURES OF TRUE BACK
         DOS application with event based
            Windowing System.
           Self-integrity check.
           Minimum system configuration check.
           Extraction of system information
           Three modes of operation:
                 - Seize
                 - Acquire
                 - Seize and Acquire



55   Dr. Tabrez Ahmad
Disk imaging through Parallel port.
 Disk imaging using Network Interface Card.
  Block by Block acquisition with data integrity
   check on each block.
  IDE/SCSI, USB, CD and Floppy acquisition.
  Acquisition of floppies and CDs in Batch mode.
  Write protection on all storage media except
   destination media.
  Checking for sterile destination media.
  Progress Bar display on all modes of operation.
  Report generation on all modes of operation.
   BIOS and ATA mode acquisition
56   Dr. Tabrez Ahmad
ANALYSIS TOOL

                          CYBER CHECK




57   Dr. Tabrez Ahmad
Cyber Check Suites:

      The IT Act 2000 is India's first attempt to
     combat cyber crime. To assist in the
     enforcement of the IT Act, the
     Department          of          Information
     Technology, Ministry of Communications
     and Information Technology, has setup a
     Technical Resource Centre for Cyber
     Forensics               at               C-
     DAC, Thiruvananthapuram.

     Cyber Check is a forensic analysis tool
     developed          by          C-DAC
     Thiruvanathapuram,

58       Dr. Tabrez Ahmad                           Probe Window of Cyber Check
                                                    Suite
CyberCheck - Features
     Standard Windows application.
     Self-integrity check.
     Minimum system configuration check.
     Analyses evidence file containing FAT12, FAT16,
           FAT32, NTFS and EXT2FS file system.
     Analyses evidence files created by the following disk
     imaging tools:
                        TrueBack
                        LinkMasster
                        Encase
              User login facilities.
59   Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)
 Creates log of each analysis session and Analyzing officer‟s
 details.
 Block by block data integrity verification while loading
 evidence file.
 Explorer type view of contents of the whole evidence file.
 Display of folders and files with all attributes.
 Show/Hide system files.
 Sorting of files based on file attributes.
 Text/Hex view of the content of a file.
 Picture view of an image file.
 GalleryTabrez Ahmadimages.
60    Dr. view of
CyberCheck– Features (Contd …)
 Graphical representation of the following views of an
 evidence file:
                  Disk View.
                  Cluster View.
                  Block view.
 Timeline view of:
                  All files
                  Deleted files.
                  Time anomaly files.
                  Signature mismatched files.
                  Files created within a time frame.
61   Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)
 Display of cluster chain of a file.
 Single and Multiple Keyword search.
 Extraction of Disk, Partition, File and MBR slacks.
 Exclusive search in slack space.
 Extraction of unused unallocated clusters and exclusion from search
 space.
 Exclusive search in used unallocated clusters .
 Extraction of lost clusters.
 Exclusive search in data extracted from lost clusters.
 Extraction of Swap files.
 Exclusive search in data extracted from Swap files.

62    Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)
     File search based on file extension.
     File search based on hash value.
     Exclusion of system files from search space.
     Data recovery from deleted files, slack space, used unallocated clusters
     and lost clusters.
     Recovery of formatted partitions.
     Recovery of deleted partitions.
     Exporting files, folders and slack content.
     Exporting folder structure including file names into a file.
     Exporting files on to external viewer.


63       Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)
 Local preview of storage media.
 Network preview of storage media using cross-over cable.
 Book marking of folders, files and data.
 Adding book marked items into report.
 Restoration of storage media.
 Creating raw image.
 Raw image analysis.
 Facility for viewing Mailbox files of Microsoft Outlook
 Express, Microsoft Outlook, Eudora and Linux Mail clients.


64   Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)
          Registry viewer.
          Hash set of system files.
          Identification of encrypted & password protected files.
          Identification of steganographed image files.
          Generation of analysis report with the following features.
          Complete information of the evidence file system.
          Complete information of the partitions and drive geometry.
          Hash verification details.
          User login and logout information.




65   Dr. Tabrez Ahmad
CyberCheck– Features (Contd …)

             Exported content of text file and slack information.
             Includes picture file as image.
     Saving report, search hits and book marked items for later
     use.
             Password protection of report. Print report.




66     Dr. Tabrez Ahmad
PASSWORD CRACKING



                GRID Enabled Password Cracker




67    Dr. Tabrez Ahmad
PASSWORD CRACKING OF ZIP FILES USING GRID




      CYBER FORENSICS LAB




                                          INTERNET
                         GRID
                 GRID   SERVER




                                          FSL                        CBI


                                                 POLICE CRIME CELL




68   Dr. Tabrez Ahmad
PASSWORD CRACKING OF ZIP FILES USING GRID



                                          4. GRID SERVER SENDS
       3. CLIENTS COMPUTES AND
                                          RESULTS OVER INTERNET
       SEND RESULTS TO SERVER




                                                  INTERNET
                         GRID
                 GRID   SERVER

                                 1.ZIPPED FILE SUBMISSION

                                                 FSL                       CBI
                         2. SERVER
                         RECEIVES AND
                         DISTRIBUTES TO                POLICE CRIME CELL
                         GRID CLIENTS


69   Dr. Tabrez Ahmad
WHO’S AT THE KEYBOARD?
      BIOMETRICS
      A software driver associated with the keyboard
       records the user’s rhythm in typing.
      These rhythms are then used to generate a
       profile of the authentic user.




70   Dr. Tabrez Ahmad
WHO’S AT THE KEYBOARD?
      FORENSIC STYLISTICS
      A qualitative approach to authorship assesses
       errors and “idiosyncrasies” based on the
       examiner’s experience.
      This approach could be quantified through
       Databasing.




71   Dr. Tabrez Ahmad
WHO’S AT THE KEYBOARD?
      STYLOMETRY
      It is quantitative and computational
        method, focusing on readily computable and
        countable language features, e.g. word
        length, phrase length, sentence
        length, vocabulary frequency, distribution of
        words of different lengths.




72   Dr. Tabrez Ahmad
Comparison between Encase Version 6.0, FTK, and Cyber
 Check Suite.




73   Dr. Tabrez Ahmad
MULTI DIMENSIONAL CHALLENGES




74   Dr. Tabrez Ahmad
TECHNICAL
      Ubiquity Of Computers
         Crimes Occur In All Jurisdictions
      Training Law Enforcement Agencies Becomes a
        Challenge
      Technology Revolution Leads To Newer
        Systems, Devices Etc..




75   Dr. Tabrez Ahmad
OPERATIONAL
      ALL DATA MUST BE GATHERED AND
        EXAMINED FOR EVIDENCE
            GIGABYTES OF DATA
            PROBLEMS OF
                  o STORAGE
                  o ANALYSIS
                  o PRESENTATION..


      NO STANDARD SOLUTION AS YET




76   Dr. Tabrez Ahmad
SOCIAL
      IT RESULTS IN
         UNCERTAINITIES ABOUT EFFECTIVENESS OF
          CURRENT INVESTIGATION TECHNIQUES
         SUB OPTIMAL USE OF RESOURCES
      PRIVACY CONCERNS




77   Dr. Tabrez Ahmad
LEGAL
      USES & BOUNDARIES OF DIGITAL EVIDENCE
       IN LEGAL PROCEDURES STILL UNCLEAR
      CURRENT TOOLS & TECHNIQUES NOT
       RIGOROUSLY USED / CONTESTED IN COURT




78   Dr. Tabrez Ahmad
Challenges faced by Law Enforcement

Awareness: Technology is changing very rapidly. So does the increase in
Cyber crimes, No proper awareness shared with regard to crime and latest
tools. People are so ignorant that makes it effortless for cyber criminals to
attack. People fear to report crimes and some crimes are not properly
recorded. The reason behind this is that the victim is either scared of police
harassment or wrong media publicity. For minority and marginalised groups
who already bear the brunt of media bias, reporting online harassment to
the police may simply draw further unwanted attention. The public is not
aware of the resources and services that law enforcement could provide
them if being a victim of crime or witness.




79    Dr. Tabrez Ahmad
 Technical Issues: Large amount of storage space
      required for storing the imaged evidences and also for
      storing retrieved evidence after analysis. Retrieved
      evidence might contain documents, pictures, videos and
      audio files which takes up a lot of space. Technical issues
      can further be categorised into software and hardware
      issues.




80      Dr. Tabrez Ahmad
Software and Hardware Issues: The growth of Cyber crime
 as given rise to numerous Forensic software vendors. The
 challenge being to choose among them and no single forensic
 tool solves the entire case, there are loads of third party tools
 available. So is the case with Hardware tools, Most common
 and liable h/w tool is the FRED. But when it comes to Mobile
 forensics it is a challenge to decide the compatibility of
 different phones and which h/w to rely on..




81   Dr. Tabrez Ahmad
Recently China has been manufacturing mobile
      phones that have cloned IME numbers which is a
      current challenge faced in Mobile forensics.


      Information sharing: Information sharing is a best
        practice and can be accomplished by a variety of
        means      such   as     interacting with   industry
        groups, attending briefings, meetings, seminars and
        conferences, and working actively with forensic
        bodies like CDAC..


82   Dr. Tabrez Ahmad
Inadequate Training and Funds:

 Due to the growing of cyber forensic tools law enforcement
 does not get adequate training and awareness on innovative
 tools. Training bodies are limited and are pricey. Insufficient
 funding in order to send officers for training and investing on
 future enhancements. Transfers and recruiting officers adds to
 the loss of experienced staff and spending for training the
 newcomers. Cases become pending in such circumstances.




83   Dr. Tabrez Ahmad
 Global Issues: Most of the IP addresses retrieved during
        investigation leads to servers or computers located abroad which
        have no identity, hence further investigations are blocked and
        closed.     Correspondence         with   bodies     such     as
        Google, Yahoo, Hotmail is quite time consuming and prolong the
        investigations.

      Wireless or Wi-Fi, Bluetooth, Infrared Issues: Latest wireless
        technologies which provide internet connections causes
        exploitation especially when it is not secured. This is the present
        technology terrorists and radical activists exploit. This is another
        vulnerability that law enforcement faces.



84   Dr. Tabrez Ahmad
References
  Computer forensics by Michael Sheetz published by John
     Wiley and Sons

  Cyber crime Impact in the new millennium by R.C Mishra.


  Roadmap for digital forensic Research [Report From the
     First Digital Forensic   Research Workshop]

  Forensic Corpora: A Challenge for Forensic Research
     Simson L. Garfinkel April 10, 2007

  Computer and Intrusion Forensics by Mohay,Anderson
     Collie,Devel Published by Artech House.
85     Dr. Tabrez Ahmad
Future Course of Action
 Mumbai Cyber lab is a joint initiative of Mumbai police and
     NASSCOM –more exchange and coordination of this kind
    More Public awareness campaigns
    Training of police officers to effectively combat cyber crimes
    More Cyber crime police cells set up across the country
    Effective E-surveillance
    Websites aid in creating awareness and encouraging
     reporting of cyber crime cases.
    Specialised Training of forensic investigators and experts
    Active coordination between police and other law
     enforcement agencies and authorities is required.


86      Dr. Tabrez Ahmad
Do you have any question?




87   Dr. Tabrez Ahmad
88   Dr. Tabrez Ahmad

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 

Was ist angesagt? (20)

Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

Andere mochten auch

Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 

Andere mochten auch (10)

Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Ch08
Ch08Ch08
Ch08
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Smart card
Smart cardSmart card
Smart card
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 

Ähnlich wie Cybercrime investigation

Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxadiljamalullaily
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnceArjun Randhir
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptAdityaRanjan789094
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesAnamZunaira
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsBenjamin Ang
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 

Ähnlich wie Cybercrime investigation (20)

Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptx
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnce
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidence
 
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 

Mehr von Prof. (Dr.) Tabrez Ahmad

Trademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USATrademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USAProf. (Dr.) Tabrez Ahmad
 
Future of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or FoesFuture of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or FoesProf. (Dr.) Tabrez Ahmad
 
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...Prof. (Dr.) Tabrez Ahmad
 
Part 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sectorPart 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sectorProf. (Dr.) Tabrez Ahmad
 
Part 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sectorPart 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sectorProf. (Dr.) Tabrez Ahmad
 
Part 1 lecture- environmental regulation in energy sector
Part  1 lecture- environmental regulation in energy sectorPart  1 lecture- environmental regulation in energy sector
Part 1 lecture- environmental regulation in energy sectorProf. (Dr.) Tabrez Ahmad
 
Law of technology transfer and interlinking issues
Law of technology transfer and interlinking issuesLaw of technology transfer and interlinking issues
Law of technology transfer and interlinking issuesProf. (Dr.) Tabrez Ahmad
 

Mehr von Prof. (Dr.) Tabrez Ahmad (20)

Plagiarism & internet
Plagiarism & internetPlagiarism & internet
Plagiarism & internet
 
Tabrez agro supply chain conf 7 oct 2016
Tabrez agro supply chain conf 7 oct 2016Tabrez agro supply chain conf 7 oct 2016
Tabrez agro supply chain conf 7 oct 2016
 
Trademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USATrademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USA
 
Future of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or FoesFuture of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or Foes
 
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
 
Mining law
Mining lawMining law
Mining law
 
Nuclear energy law
Nuclear energy lawNuclear energy law
Nuclear energy law
 
Law & justice in globalised world
Law & justice in globalised worldLaw & justice in globalised world
Law & justice in globalised world
 
Part 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sectorPart 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sector
 
Part 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sectorPart 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sector
 
Part 1 lecture- environmental regulation in energy sector
Part  1 lecture- environmental regulation in energy sectorPart  1 lecture- environmental regulation in energy sector
Part 1 lecture- environmental regulation in energy sector
 
Law of technology transfer and interlinking issues
Law of technology transfer and interlinking issuesLaw of technology transfer and interlinking issues
Law of technology transfer and interlinking issues
 
Law of export processing zones
Law of export processing zonesLaw of export processing zones
Law of export processing zones
 
Law of Export Oriented Units
Law of Export Oriented UnitsLaw of Export Oriented Units
Law of Export Oriented Units
 
Foreign Exchange Management Law
Foreign Exchange Management LawForeign Exchange Management Law
Foreign Exchange Management Law
 
Foreign trade regulation
Foreign trade regulationForeign trade regulation
Foreign trade regulation
 
Sexual Harassment of Women at Work Place
Sexual Harassment of Women at Work PlaceSexual Harassment of Women at Work Place
Sexual Harassment of Women at Work Place
 
Negotiable instruments
Negotiable instrumentsNegotiable instruments
Negotiable instruments
 
Consumer protection law
Consumer protection lawConsumer protection law
Consumer protection law
 
Sale of Goods
Sale of GoodsSale of Goods
Sale of Goods
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cybercrime investigation

  • 1. Investigation of Cyber Crimes & Forensics Biju Pattnaik State Police Academy Bhubaneswar By Dr. Tabrez Ahmad Professor of Law www.technolexindia.com 1 Dr. Tabrez Ahmad http://technolexindia.blogspot.com
  • 2. Agenda 1. The possible reliefs to a cybercrime victim and strategy adoption 2. The preparation for prosecution 3. Admissibility of digital evidence in courts 4. Defending an accused in a computer related crime 5. The techniques of cyber investigation and forensic tools 6. Future course of action  2 Dr. Tabrez Ahmad
  • 3. Possible reliefs to a cybercrime victim- strategy adoption  A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell  Depending on the nature of crime there may be civil and criminal remedies.  In civil remedies , injunction and restraint orders may be sought, together with damages, delivery up of infringing matter and/or account for profits.  In criminal remedies, a cybercrime case will be registered by police if the offence is cognisable and if the same is non cognisable, a complaint should be filed with metropolitan magistrate  For certain offences, both civil and criminal remedies may be available to the victim 3 Dr. Tabrez Ahmad
  • 4. Before lodging a cybercrime case  Important parameters-  Gather ample evidence admissible in a court of law  Fulfill the criteria of the pecuniary ,territorial and subject matter jurisdiction of a court.  Determine jurisdiction – case may be filed where the offence is committed or where effect of the offence is felt ( S. 177 to 179, CrPc) 4 Dr. Tabrez Ahmad
  • 5. The criminal prosecution pyramid Conviction /acquittal Trial Contents of charge Issue of process –summons, warrant Examine the witnesses Examine the complainant on oath Initiation of criminal proceedings-cognizance of offences by magistrates 5 Dr. Tabrez Ahmad
  • 6. Preparation for prosecution  Collect all evidence available & saving snapshots of evidence  Seek a cyberlaw expert‟s immediate assistance for advice on preparing for prosecution  Prepare a background history of facts chronologically as per facts  Pen down names and addresses of suspected accused.  Form a draft of complaint and remedies a victim seeks  Cyberlaw expert & police could assist in gathering further evidence e.g tracing the IP in case of e-mails, search & seizure or arrest as appropriate to the situation  A cyber forensic study of the hardware/equipment/ network server related to the cybercrime is generally essential 6 Dr. Tabrez Ahmad
  • 7. Government Initiative • The Cyber Crime Investigation cell (CCIC) of the CBI, notified in September 1999, started functioning from 3 March 2000. • It is located in New Delhi, Mumbai, Chennai and Bangalore. • Jurisdiction of the cell is all over India. • Any incident of the cyber crime can be reported to a police station, irrespective of whether it maintains a separate cell or not. 7 Dr. Tabrez Ahmad
  • 8. The Indian Computer Emergency Response Team (CERT-In)  IT Amendment ACT 2008. “70A. (1) The Indian Computer Emergency Response Team (CERT-In) shall serve as the national nodal agency in respect of Critical Information Infrastructure for coordinating all actions relating to information security practices, procedures, guidelines, incident prevention, response and report. (2) For the purposes of sub-section (1), the Director of the Indian Computer Emergency Response Team may call for information pertaining to cyber security from the service providers, intermediaries or any other person. 8 Dr. Tabrez Ahmad
  • 9. Cognizability and Bailability As per IT Amendment Act 2008 Offences which have not less than 3 years punishment are cognizable and bailable 9 Dr. Tabrez Ahmad 9
  • 10. Power of Police to Investigate Section 156 Cr.P.C. : Power to investigate cognizable offences. Section 155 Cr.P.C. : Power to investigate non cognizable offences. Section 91 Cr.P.C. : Summon to produce documents. Section 160 Cr.P.C. : Summon to require attendance of witnesses. 10 Dr. Tabrez Ahmad
  • 11. Power of Police to investigate (contd.) Section 165 Cr.P.C. : Search by police officer. Section 93 Cr.P.C : General provision as to search warrants. Section 47 Cr.P.C. : Search to arrest the accused. Section 78 of IT Act, 2000 : Power to investigate offences-not below rank of Inspector. Section 80 of IT Act, 2000 : Power of police officer to enter any public place and search & arrest. 11 Dr. Tabrez Ahmad
  • 12. Amendments- Indian Evidence Act 1872  Section 3 of the Evidence Act amended to take care of admissibility of ER as evidence along with the paper based records as part of the documents which can be produced before the court for inspection.  Section 4 of IT Act confers legal recognition to electronic records Dr. Tabrez Ahmad 12
  • 13. Societe Des products Nestle SA case 2006 (33 ) PTC 469  By virtue of provision of Section 65A, the contents of electronic records may be proved in evidence by parties in accordance with provision of 65B.  Held- Sub section (1) of section 65B makes admissible as a document, paper print out of electronic records stored in optical or magnetic media produced by a computer subject to fulfillment of conditions specified in subsection 2 of Section 65B . a) The computer from which the record is generated was regularly used to store or process information in respect of activity regularly carried on by person having lawful control over the period, and relates to the period over which the computer was regularly used. b) Information was fed in the computer in the ordinary course of the activities of the person having lawful control over the computer. c) The computer was operating properly, and if not, was not such as to affect the electronic record or its accuracy. d) Information reproduced is such as is fed into computer in the ordinary course of activity.  State v Mohd Afzal, 2003 (7) AD (Delhi)1 13 Dr. Tabrez Ahmad
  • 14. State v Navjot Sandhu (2005)11 SCC 600  Held, while examining Section 65 B Evidence Act, it may be that certificate containing details of subsection 4 of Section 65 is not filed, but that does not mean that secondary evidence cannot be given.  Section 63 & 65 of the Indian Evidence Act enables secondary evidence of contents of a document to be adduced if original is of such a nature as not to be easily movable. 14 Dr. Tabrez Ahmad
  • 15. Presumptions in law- Section 85 B Indian Evidence Act  The law also presumes that in any proceedings, involving secure digital signature, the court shall presume, unless the contrary is proved, that the secure digital signature is affixed by the subscriber with the intention of signing or approving the electronic record  In any proceedings involving a secure electronic record, the court shall presume, unless contrary is proved, that the secure electronic record has not been altered since the specific point of time, to which the secure status relates 15 Dr. Tabrez Ahmad
  • 16. Presumption as to electronic messages- Section 88A of Evidence Act  The court may treat electronic messages received as if they were sent by the originator, with the exception that a presumption is not to be made as to the person by whom such message was sent.  It must be proved that the message has been forwarded from the electronic mail server to the person ( addressee ) to whom such message purports to have been addressed  An electronic message is primary evidence of the fact that the same was delivered to the addressee on date and time indicated. 16 Dr. Tabrez Ahmad
  • 17. IT Amendment Act 2008-Section 79A  Section 79A empowers the Central govt to appoint any department, body or agency as examiner of electronic evidence for proving expert opinion on electronic form evidence before any court or authority.  Till now, government forensic lab of hyderabad was considered of evidentiary value in courts- CFSIL  Statutory status to an agency as per Section 79A will be of vital importance in criminal prosecution of cybercrime cases in India 17 Dr. Tabrez Ahmad
  • 18. Probable activities for defense by an accused in a cybercrime case  Preparation of chain of events table  Probing where evidence could be traced? E-mail inbox/files/folders/ web history  Has the accused used any erase evidence software/tools  Forensically screening the hardware/data/files /print outs / camera/mobile/pendrives of evidentiary value  Formatting may not be a solution  Apply for anticipatory bail  Challenge evidence produced by opposite party and look for loopholes  Filing of a cross complaint if appropriate 18 Dr. Tabrez Ahmad
  • 19. Sec 69: Decryption of information  Ingredients  Controller issues order to Government agency to intercept any information transmitted through any computer resource.  Order is issued in the interest of the  sovereignty or integrity of India,  the security of the State,  friendly relations with foreign States,  public order or  preventing incitement for commission of a cognizable offence  Person in charge of the computer resource fails to extend all facilities and technical assistance to decrypt the information-punishment upto 7 years. 19 Dr. Tabrez Ahmad
  • 20. Sec 70 Protected System  Ingredients  Securing unauthorised access or attempting to secure unauthorised access  to „protected system‟  Acts covered by this section:  Switching computer on / off  Using installed software / hardware  Installing software / hardware  Port scanning  Punishment  Imprisonment up to 10 years and fine  Cognizable, Non-Bailable, Court of Sessions 20 Dr. Tabrez Ahmad
  • 21. Computer Forensics and Cyberforensics Computer forensics is considered to be the use of analytical and investigative techniques to identify, collect, examine, preserve and present evidence or information which is magnetically stored or encoded A better definition for law enforcement would be the scientific method of examining and analyzing data from computer storage media so that the data can be used as evidence in court. Media = computers, mobile phones, PDA, digital camera, etc. 21 Dr. Tabrez Ahmad
  • 22. Handling of Evidences by Cyber Analysts Collect, Obs Analyze and Identify erve & Verify Organize Preserve Four major tasks for working with digital evidence Identify: Any digital information or artifacts that can be used as evidence. Collect, observe and preserve the evidence Analyze, identify and organize the evidence. Rebuild the evidence or repeat a situation to verify the same results every time. Checking the hash value. 22 Dr. Tabrez Ahmad
  • 23. Incident Response – a precursor to Techniques of Cyber investigation & forensic tools  „Incident response‟ could be defined as a precise set of actions to handle any security incident in a responsible ,meaningful and timely manner.  Goals of incident response-  To confirm whether an incident has occurred  To promote accumulation of accurate information  Educate senior management  Help in detection/prevention of such incidents in the future,  To provide rapid detection and containment  Minimize disruption to business and network operations  To facilitate for criminal action against perpetrators 23 Dr. Tabrez Ahmad
  • 24. Six steps of Incident response Detection of incidents Pre incident preparation Resolution Initial response Investigate the incident Reporting 24 Dr. Tabrez Ahmad
  • 25. Techniques of cyber investigation- Cyber forensics  Computer forensics, also called cyber forensics, is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.  The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. 25 Dr. Tabrez Ahmad
  • 26. 6 A‟s of digital forensics Assessment Acquisition Authentication Analysis Articulation 26 Dr. Tabrez Ahmad
  • 27. Rules of evidence  Computer forensic components-  Identifying  Preserving  Analysing  Presenting evidence in a legally admissible manner Dr. Tabrez Ahmad 27
  • 28. FBI handbook of forensic investigation- techniques for computer forensics Examine type of content in Comparison of data files computer Transactions-to know time Data files can be extracted and sequence when data files from computer were created Deleted data files can be Data files can be converted recovered from the computer from one format to the other Key word searching passwords Limited source code can be Storage media with analysed and compared standalone word processors can be examined Dr. Tabrez Ahmad 28
  • 29. Sources of Evidence  Existing Files  Deleted Files  Logs  Special system files (registry etc.)  Email archives, printer spools  Administrative settings  Internet History  Chat archives  Misnamed Files  Encrypted Files / Password Protected files etc. 29 Dr. Tabrez Ahmad
  • 30. Cyberforensics in accounting frauds  Use of CAAT –computer assisted audit techniques- spreadsheets, excel, MS access  Generalized audit software-PC based file interrogation software- IDEA,ACL  Help detect fictitious suppliers, duplicate payments, theft of inventory  Tender manipulation, secret commissions  False financial reporting  Expense account misuse  Insider trading 30 Dr. Tabrez Ahmad
  • 31. Establishment and maintenance of „Chain of Custody  Tools required:  - Evidence notebook  - Tamper evident labels  - Permanent ink pen  - Camera  Document the following:  - Who reported the incident along with critical date and times  - Details leading up to formal investigation  - Names of all people conducting investigation  - Establish and maintain detailed „activity log‟ 31 Dr. Tabrez Ahmad
  • 32. Maintaining Chain Of Custody  Take pictures of the evidence  - Document „crime scene‟ details  Document identifiable markings on evidence  Catalog the system contents  Document serial numbers, model numbers, asset tags  “Bag” it!  Maintain Chain Of Custody on tamperproof  evidence bag  Take a picture! Dr. Tabrez Ahmad 32
  • 33. E-mail forensics  E-mail composed of two parts- header and body  Examine headers  Request information from ISP  Trace the IP  Tools-Encase,FTK,Final email  Sawmill groupwise  Audimation for logging  Cracking the password- brute force attack, smart search, dictionary search, date search, customised search, guaranteed decryption, plaintext attack  Passware, ultimate zip cracker,office recovery enterprise,etc 33 Dr. Tabrez Ahmad
  • 34. Computer forensic analysis within the forensic tradition.  Alphonse Bertillon- [freezing the scene]: in 1879 introduce a methodical way of documenting the scene by photographing, for example, bodies, items, footprints, bloodstains in situ with relative measurements of location, position, and size Bertillon is thus the first known forensic photographer.  Bertillonage : system of identifying individuals over 200 separate body measurements, was in use till 1910 and was only rendered obsolete by the discovery that fingerprints were unique. 34 Dr. Tabrez Ahmad
  • 35. Key Principal of Forensics  Edmond Locard articulated one of the forensic science‟s key rules, known as Locard’s Exchange Principle.  “The principle states that when two items or persons come into contact, there will be an exchange of physical traces. Something is brought, and something is taken away, so that suspects can be tied to a crime scene by detecting these traces”. 35 Dr. Tabrez Ahmad
  • 36. Stakeholders:  National security  Custom & Excise  Law enforcement agents  Businesses (embezzlement, industrial espionage, stealing confidential information, and racial or sexual harassment).  Corporate crime [according to report the accountants and auditors for Enron not only used e-mail to communicate but also subsequently deleted these e-mails] 36 Dr. Tabrez Ahmad
  • 37. Problems In Indian Context.  No Standard for Computer Forensic is yet developed.  No Guidelines for Companies dealing with electronic data, during disputes.  No recognition to any of the forensics tool.  Issues related to anti-forensics are not talked about. ……………… 37 Dr. Tabrez Ahmad
  • 38. Over All Scenario  To date, computer forensics has been primarily driven by vendors and applied technologies with very little consideration being given to establishing a sound theoretical foundation  The national and international judiciary has already begun to question the ‘‘scientific’’ validity of many of the ad hoc procedures and methodologies and is demanding proof of some sort of theoretical foundation and scientific rigor. 38 Dr. Tabrez Ahmad
  • 39. CONTD..  Commercial software tools are also a problem because software developers need to protect their code to prevent competitors from stealing their product. However, since most of the code is not made public, it is very difficult for the developers to verify error rates of the software, and so reliability of performance is still questionable . 39 Dr. Tabrez Ahmad
  • 40. CONTD.. The specialized tools used by a computer forensic expert are viewed as intolerably expensive by many corporations, and as a result many corporations simply choose not to invest any meaningful money into computer forensics. This trend amplifies cyber crime rates Open source software‟s were also not been tested or verified for the effectiveness to serve the above purposes (Open for research) 40 Dr. Tabrez Ahmad
  • 41. Legal Aspects  The growing demand for security and certainty in cyber space leads to more stringent laws.  The violation and maintaining of these laws (cyber laws) must be distinguished from classical criminal activities and criminal law enforcement.  The dynamics between these different forms of law violation and law enforcement is important and shall be addressed. 41 Dr. Tabrez Ahmad
  • 42. Computer Forensic Tools Forensic Tool Kit: FTK is developed by Access Data Corporation (USA); it enables law enforcement and corporate security professionals to perform complete and in-depth computer forensic analysis. 42 Dr. Tabrez Ahmad Main Window of FTK
  • 43. TYPICAL TOOLS  EMAIL TRACER  TRUEBACK  CYBERCHECK  MANUAL 43 Dr. Tabrez Ahmad
  • 44. Current and Emerging Cyber Forensic Tools of Law Enforcement 44 Dr. Tabrez Ahmad
  • 45. ENCASE FORENSIC: Encase Forensic developed by Guidance Software USA is the industry standard in computer forensic investigation technology. With an intuitive Graphical User Interface (GUI), superior analytics, enhanced email/Internet support and a powerful scripting engine, EnCase provides investigators with a single robust tool, capable of conducting large-scale and very complex investigations from beginning to end. 45 Dr. Tabrez Ahmad Main Window of Encase
  • 46.  Encase Forensic is very useful forensic solution but it lacks following important feature:  In Encase forensic there is no password cracking/recovery facility. So if during investigation process the examiner detected any password protected files then he had to rely on third party tools. 46 Dr. Tabrez Ahmad
  • 47. EMAIL TRACER FORENSIC TOOL 47 Dr. Tabrez Ahmad
  • 48. FEATURES OF EMAIL TRACER •Display of Actual Mail Content for Outlook Express, Eudora, MS Outlook and mail clients with MBOX mailbox. •Display the Mail Content (HTML / Text) •Display the Mail Attributes for Outlook Express. •Display of extracted E-mail header information •Save Mail Content as .EML file. •Display of all Email attachments and Extraction. •Display of E-mail route. •IP trace to the sender’s system. •Domain name look up. •Display of geographical location of the sender’s gateway on a world map. •Mail server log analysis for evidence collection. •Access to Database of Country code list along with IP address information. 48 Dr. Tabrez Ahmad
  • 49. EMAIL TRACING OVER WEB AS A PRE-EMPTIVE TOOL 49 Dr. Tabrez Ahmad
  • 50. EMAIL TRACING SERVICE  Users can submit their tracing task to Email Tracer through web.  Tracing IP Address upto city level (non-spoofed)  Detection of spoofed mail  Detailed report 50 Dr. Tabrez Ahmad
  • 51. 51 Dr. Tabrez Ahmad
  • 52. 52 Dr. Tabrez Ahmad
  • 53. 53 Dr. Tabrez Ahmad
  • 54. SEIZURE & ACQUISITION TOOL TRUEBACK 54 Dr. Tabrez Ahmad
  • 55. FEATURES OF TRUE BACK  DOS application with event based Windowing System.  Self-integrity check.  Minimum system configuration check.  Extraction of system information  Three modes of operation: - Seize - Acquire - Seize and Acquire 55 Dr. Tabrez Ahmad
  • 56. Disk imaging through Parallel port. Disk imaging using Network Interface Card.  Block by Block acquisition with data integrity check on each block.  IDE/SCSI, USB, CD and Floppy acquisition.  Acquisition of floppies and CDs in Batch mode.  Write protection on all storage media except destination media.  Checking for sterile destination media.  Progress Bar display on all modes of operation.  Report generation on all modes of operation. BIOS and ATA mode acquisition 56 Dr. Tabrez Ahmad
  • 57. ANALYSIS TOOL CYBER CHECK 57 Dr. Tabrez Ahmad
  • 58. Cyber Check Suites: The IT Act 2000 is India's first attempt to combat cyber crime. To assist in the enforcement of the IT Act, the Department of Information Technology, Ministry of Communications and Information Technology, has setup a Technical Resource Centre for Cyber Forensics at C- DAC, Thiruvananthapuram. Cyber Check is a forensic analysis tool developed by C-DAC Thiruvanathapuram, 58 Dr. Tabrez Ahmad Probe Window of Cyber Check Suite
  • 59. CyberCheck - Features Standard Windows application. Self-integrity check. Minimum system configuration check. Analyses evidence file containing FAT12, FAT16, FAT32, NTFS and EXT2FS file system. Analyses evidence files created by the following disk imaging tools: TrueBack LinkMasster Encase User login facilities. 59 Dr. Tabrez Ahmad
  • 60. CyberCheck– Features (Contd …) Creates log of each analysis session and Analyzing officer‟s details. Block by block data integrity verification while loading evidence file. Explorer type view of contents of the whole evidence file. Display of folders and files with all attributes. Show/Hide system files. Sorting of files based on file attributes. Text/Hex view of the content of a file. Picture view of an image file. GalleryTabrez Ahmadimages. 60 Dr. view of
  • 61. CyberCheck– Features (Contd …) Graphical representation of the following views of an evidence file: Disk View. Cluster View. Block view. Timeline view of: All files Deleted files. Time anomaly files. Signature mismatched files. Files created within a time frame. 61 Dr. Tabrez Ahmad
  • 62. CyberCheck– Features (Contd …) Display of cluster chain of a file. Single and Multiple Keyword search. Extraction of Disk, Partition, File and MBR slacks. Exclusive search in slack space. Extraction of unused unallocated clusters and exclusion from search space. Exclusive search in used unallocated clusters . Extraction of lost clusters. Exclusive search in data extracted from lost clusters. Extraction of Swap files. Exclusive search in data extracted from Swap files. 62 Dr. Tabrez Ahmad
  • 63. CyberCheck– Features (Contd …) File search based on file extension. File search based on hash value. Exclusion of system files from search space. Data recovery from deleted files, slack space, used unallocated clusters and lost clusters. Recovery of formatted partitions. Recovery of deleted partitions. Exporting files, folders and slack content. Exporting folder structure including file names into a file. Exporting files on to external viewer. 63 Dr. Tabrez Ahmad
  • 64. CyberCheck– Features (Contd …) Local preview of storage media. Network preview of storage media using cross-over cable. Book marking of folders, files and data. Adding book marked items into report. Restoration of storage media. Creating raw image. Raw image analysis. Facility for viewing Mailbox files of Microsoft Outlook Express, Microsoft Outlook, Eudora and Linux Mail clients. 64 Dr. Tabrez Ahmad
  • 65. CyberCheck– Features (Contd …) Registry viewer. Hash set of system files. Identification of encrypted & password protected files. Identification of steganographed image files. Generation of analysis report with the following features. Complete information of the evidence file system. Complete information of the partitions and drive geometry. Hash verification details. User login and logout information. 65 Dr. Tabrez Ahmad
  • 66. CyberCheck– Features (Contd …) Exported content of text file and slack information. Includes picture file as image. Saving report, search hits and book marked items for later use. Password protection of report. Print report. 66 Dr. Tabrez Ahmad
  • 67. PASSWORD CRACKING GRID Enabled Password Cracker 67 Dr. Tabrez Ahmad
  • 68. PASSWORD CRACKING OF ZIP FILES USING GRID CYBER FORENSICS LAB INTERNET GRID GRID SERVER FSL CBI POLICE CRIME CELL 68 Dr. Tabrez Ahmad
  • 69. PASSWORD CRACKING OF ZIP FILES USING GRID 4. GRID SERVER SENDS 3. CLIENTS COMPUTES AND RESULTS OVER INTERNET SEND RESULTS TO SERVER INTERNET GRID GRID SERVER 1.ZIPPED FILE SUBMISSION FSL CBI 2. SERVER RECEIVES AND DISTRIBUTES TO POLICE CRIME CELL GRID CLIENTS 69 Dr. Tabrez Ahmad
  • 70. WHO’S AT THE KEYBOARD?  BIOMETRICS  A software driver associated with the keyboard records the user’s rhythm in typing.  These rhythms are then used to generate a profile of the authentic user. 70 Dr. Tabrez Ahmad
  • 71. WHO’S AT THE KEYBOARD?  FORENSIC STYLISTICS  A qualitative approach to authorship assesses errors and “idiosyncrasies” based on the examiner’s experience.  This approach could be quantified through Databasing. 71 Dr. Tabrez Ahmad
  • 72. WHO’S AT THE KEYBOARD?  STYLOMETRY  It is quantitative and computational method, focusing on readily computable and countable language features, e.g. word length, phrase length, sentence length, vocabulary frequency, distribution of words of different lengths. 72 Dr. Tabrez Ahmad
  • 73. Comparison between Encase Version 6.0, FTK, and Cyber Check Suite. 73 Dr. Tabrez Ahmad
  • 75. TECHNICAL  Ubiquity Of Computers  Crimes Occur In All Jurisdictions  Training Law Enforcement Agencies Becomes a Challenge  Technology Revolution Leads To Newer Systems, Devices Etc.. 75 Dr. Tabrez Ahmad
  • 76. OPERATIONAL  ALL DATA MUST BE GATHERED AND EXAMINED FOR EVIDENCE  GIGABYTES OF DATA  PROBLEMS OF o STORAGE o ANALYSIS o PRESENTATION..  NO STANDARD SOLUTION AS YET 76 Dr. Tabrez Ahmad
  • 77. SOCIAL  IT RESULTS IN  UNCERTAINITIES ABOUT EFFECTIVENESS OF CURRENT INVESTIGATION TECHNIQUES  SUB OPTIMAL USE OF RESOURCES  PRIVACY CONCERNS 77 Dr. Tabrez Ahmad
  • 78. LEGAL  USES & BOUNDARIES OF DIGITAL EVIDENCE IN LEGAL PROCEDURES STILL UNCLEAR  CURRENT TOOLS & TECHNIQUES NOT RIGOROUSLY USED / CONTESTED IN COURT 78 Dr. Tabrez Ahmad
  • 79. Challenges faced by Law Enforcement Awareness: Technology is changing very rapidly. So does the increase in Cyber crimes, No proper awareness shared with regard to crime and latest tools. People are so ignorant that makes it effortless for cyber criminals to attack. People fear to report crimes and some crimes are not properly recorded. The reason behind this is that the victim is either scared of police harassment or wrong media publicity. For minority and marginalised groups who already bear the brunt of media bias, reporting online harassment to the police may simply draw further unwanted attention. The public is not aware of the resources and services that law enforcement could provide them if being a victim of crime or witness. 79 Dr. Tabrez Ahmad
  • 80.  Technical Issues: Large amount of storage space required for storing the imaged evidences and also for storing retrieved evidence after analysis. Retrieved evidence might contain documents, pictures, videos and audio files which takes up a lot of space. Technical issues can further be categorised into software and hardware issues. 80 Dr. Tabrez Ahmad
  • 81. Software and Hardware Issues: The growth of Cyber crime as given rise to numerous Forensic software vendors. The challenge being to choose among them and no single forensic tool solves the entire case, there are loads of third party tools available. So is the case with Hardware tools, Most common and liable h/w tool is the FRED. But when it comes to Mobile forensics it is a challenge to decide the compatibility of different phones and which h/w to rely on.. 81 Dr. Tabrez Ahmad
  • 82. Recently China has been manufacturing mobile phones that have cloned IME numbers which is a current challenge faced in Mobile forensics.  Information sharing: Information sharing is a best practice and can be accomplished by a variety of means such as interacting with industry groups, attending briefings, meetings, seminars and conferences, and working actively with forensic bodies like CDAC.. 82 Dr. Tabrez Ahmad
  • 83. Inadequate Training and Funds: Due to the growing of cyber forensic tools law enforcement does not get adequate training and awareness on innovative tools. Training bodies are limited and are pricey. Insufficient funding in order to send officers for training and investing on future enhancements. Transfers and recruiting officers adds to the loss of experienced staff and spending for training the newcomers. Cases become pending in such circumstances. 83 Dr. Tabrez Ahmad
  • 84.  Global Issues: Most of the IP addresses retrieved during investigation leads to servers or computers located abroad which have no identity, hence further investigations are blocked and closed. Correspondence with bodies such as Google, Yahoo, Hotmail is quite time consuming and prolong the investigations.  Wireless or Wi-Fi, Bluetooth, Infrared Issues: Latest wireless technologies which provide internet connections causes exploitation especially when it is not secured. This is the present technology terrorists and radical activists exploit. This is another vulnerability that law enforcement faces. 84 Dr. Tabrez Ahmad
  • 85. References  Computer forensics by Michael Sheetz published by John Wiley and Sons  Cyber crime Impact in the new millennium by R.C Mishra.  Roadmap for digital forensic Research [Report From the First Digital Forensic Research Workshop]  Forensic Corpora: A Challenge for Forensic Research Simson L. Garfinkel April 10, 2007  Computer and Intrusion Forensics by Mohay,Anderson Collie,Devel Published by Artech House. 85 Dr. Tabrez Ahmad
  • 86. Future Course of Action  Mumbai Cyber lab is a joint initiative of Mumbai police and NASSCOM –more exchange and coordination of this kind  More Public awareness campaigns  Training of police officers to effectively combat cyber crimes  More Cyber crime police cells set up across the country  Effective E-surveillance  Websites aid in creating awareness and encouraging reporting of cyber crime cases.  Specialised Training of forensic investigators and experts  Active coordination between police and other law enforcement agencies and authorities is required. 86 Dr. Tabrez Ahmad
  • 87. Do you have any question? 87 Dr. Tabrez Ahmad
  • 88. 88 Dr. Tabrez Ahmad