SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
SC
                   Cyber Solutions




Investigative Abuses


     Null, Pune
What is an investigation?                            SC
                                                              Cyber Solutions



• Application of physical science to law in the search for
  truth in civil, criminal and social behavioural matters to
  the end that injustice shall not be done to any member of
  society.

• A systematic examination especially in order to extract,
  process and interpret evidence with the ultimate aim of
  discovering the ‘truth’.

• An investigation is often looked at as a solution, when it is
  a tool used to identify what went wrong and how.

  21/1/2012                                   shweta@sccybersolutions.com
Where, when and why is an                             SC
        investigation carried out?                      Cyber Solutions




• When someone requests an investigation
• Into the area of request
• When a crime has been committed, imminent or
  threatened

 An investigation HAS to be requested and authorised by
 the proper authority.



 21/1/2012                              shweta@sccybersolutions.com
How is an investigation carried out?                            SC
                                                           Cyber Solutions



• Understand and analyse the situation before beginning the
  investigation
• Follow correct procedures to
   – Assess
   – Collect
   – Analyze
   – Preserve
   – Report
• Maintain ‘Chain-of-Custody’ throughout the process
• Approach each case as initially isolated

  21/1/2012                                shweta@sccybersolutions.com
What can go wrong in an                          SC
                  investigation?                          Cyber Solutions




• Flawed readings
• Excess reference to other cases that look similar on the
  surface
• Incorrect findings
• False positives
• Improper procedures
• Incomplete chain-of-custody
• Leaks
• Manipulations of information

  21/1/2012                               shweta@sccybersolutions.com
What are the factors that contribute to                          SC
       flawed investigations?                               Cyber Solutions



                         INTERNAL
 (Factors that can be at work within the investigating team)
• Lack of knowledge
• Carelessness
• Laziness
• Haste
• Ego
• Ideology


  21/1/2012                                  shweta@sccybersolutions.com
What are the factors that contribute to                          SC
       flawed investigations?                               Cyber Solutions



                         EXTERNAL
 (Factors that can be at work on the investigation and/or the
                       investigating team)
• Money
• Threat / coercion
• Hacks
• Lack of security
• Blackmail


  21/1/2012                                  shweta@sccybersolutions.com
Why would investigations be misused?                        SC
                                                       Cyber Solutions




•   Monetary benefits
•   Ideological benefits
•   Coercion
•   Ego




    21/1/2012                          shweta@sccybersolutions.com
For want of a nail…                             SC
                                                           Cyber Solutions



                         LEGAL LEVELS

    The existing frameworks within which an investigation is
    carried out -
•   Indian Penal Code
•   Criminal Procedure Code
•   Evidence Act
•   Information Technology Act


    21/1/2012                               shweta@sccybersolutions.com
For want of a horse…                              SC
                                                             Cyber Solutions



                      OPERATIONAL LEVELS

    Procedures that maintain the confidentiality, integrity and
    authenticity of an investigation -
•   Investigative procedures
•   Chain of custody
•   Documentation
•   Contracts


    21/1/2012                                 shweta@sccybersolutions.com
… the Kingdom was lost?                               SC
                                                             Cyber Solutions



                      OPTIMUM LEVELS

    Measures that could strengthen the investigations -
•   Compartmentalization
•   Stricter laws and punishment
•   Financial penalization
•   Legal blacklisting
•   Stricter guidelines and standards
•   Accountability

    21/1/2012                                 shweta@sccybersolutions.com
SC
                                          Cyber Solutions




                     Thank You




Mob: +919823080864               www.sccybersolutions.com

Weitere ähnliche Inhalte

Andere mochten auch (10)

Jyoti ppt
Jyoti pptJyoti ppt
Jyoti ppt
 
Sound of colors - Gerstein
Sound of colors - GersteinSound of colors - Gerstein
Sound of colors - Gerstein
 
As múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticasAs múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticas
 
Livros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digitalLivros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digital
 
Dados educacionais de Feira Nova
Dados educacionais de Feira NovaDados educacionais de Feira Nova
Dados educacionais de Feira Nova
 
nullcon 2011 - Fuzzing with Complexities
nullcon 2011 - Fuzzing with Complexitiesnullcon 2011 - Fuzzing with Complexities
nullcon 2011 - Fuzzing with Complexities
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
 
Indicadores itabaiana
Indicadores itabaianaIndicadores itabaiana
Indicadores itabaiana
 
A Different Kind Of College
A Different Kind Of CollegeA Different Kind Of College
A Different Kind Of College
 

Ähnlich wie Investigative abuses

Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
NCC Group
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of Ethics
John Lovett
 

Ähnlich wie Investigative abuses (20)

Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – Ethics
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Internet based assessment
Internet based assessmentInternet based assessment
Internet based assessment
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
Creating a data-driven culture in Government
Creating a data-driven culture in GovernmentCreating a data-driven culture in Government
Creating a data-driven culture in Government
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of Ethics
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and Authorization
 
Market Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data ManagementMarket Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data Management
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
 
A trust aggregation portal
A trust aggregation portalA trust aggregation portal
A trust aggregation portal
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessments
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Investigative abuses

  • 1. SC Cyber Solutions Investigative Abuses Null, Pune
  • 2. What is an investigation? SC Cyber Solutions • Application of physical science to law in the search for truth in civil, criminal and social behavioural matters to the end that injustice shall not be done to any member of society. • A systematic examination especially in order to extract, process and interpret evidence with the ultimate aim of discovering the ‘truth’. • An investigation is often looked at as a solution, when it is a tool used to identify what went wrong and how. 21/1/2012 shweta@sccybersolutions.com
  • 3. Where, when and why is an SC investigation carried out? Cyber Solutions • When someone requests an investigation • Into the area of request • When a crime has been committed, imminent or threatened An investigation HAS to be requested and authorised by the proper authority. 21/1/2012 shweta@sccybersolutions.com
  • 4. How is an investigation carried out? SC Cyber Solutions • Understand and analyse the situation before beginning the investigation • Follow correct procedures to – Assess – Collect – Analyze – Preserve – Report • Maintain ‘Chain-of-Custody’ throughout the process • Approach each case as initially isolated 21/1/2012 shweta@sccybersolutions.com
  • 5. What can go wrong in an SC investigation? Cyber Solutions • Flawed readings • Excess reference to other cases that look similar on the surface • Incorrect findings • False positives • Improper procedures • Incomplete chain-of-custody • Leaks • Manipulations of information 21/1/2012 shweta@sccybersolutions.com
  • 6. What are the factors that contribute to SC flawed investigations? Cyber Solutions INTERNAL (Factors that can be at work within the investigating team) • Lack of knowledge • Carelessness • Laziness • Haste • Ego • Ideology 21/1/2012 shweta@sccybersolutions.com
  • 7. What are the factors that contribute to SC flawed investigations? Cyber Solutions EXTERNAL (Factors that can be at work on the investigation and/or the investigating team) • Money • Threat / coercion • Hacks • Lack of security • Blackmail 21/1/2012 shweta@sccybersolutions.com
  • 8. Why would investigations be misused? SC Cyber Solutions • Monetary benefits • Ideological benefits • Coercion • Ego 21/1/2012 shweta@sccybersolutions.com
  • 9. For want of a nail… SC Cyber Solutions LEGAL LEVELS The existing frameworks within which an investigation is carried out - • Indian Penal Code • Criminal Procedure Code • Evidence Act • Information Technology Act 21/1/2012 shweta@sccybersolutions.com
  • 10. For want of a horse… SC Cyber Solutions OPERATIONAL LEVELS Procedures that maintain the confidentiality, integrity and authenticity of an investigation - • Investigative procedures • Chain of custody • Documentation • Contracts 21/1/2012 shweta@sccybersolutions.com
  • 11. … the Kingdom was lost? SC Cyber Solutions OPTIMUM LEVELS Measures that could strengthen the investigations - • Compartmentalization • Stricter laws and punishment • Financial penalization • Legal blacklisting • Stricter guidelines and standards • Accountability 21/1/2012 shweta@sccybersolutions.com
  • 12. SC Cyber Solutions Thank You Mob: +919823080864 www.sccybersolutions.com