Digital Evidence Prospects

Slides:



Advertisements
Similar presentations
Audit and Assurance services
Advertisements

DUE PROCESS DEVELOPMENTS IN TERMINATION AND GRIEVANCES.
DIGITAL EVIDENCE María del Pilar Jácome August 2012.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
COEN 252 Computer Forensics
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
INSURANCE CLAIMS IN MEXICO INSURANCE CONTRACT 1.Insurer shall be a company duly authorized to carry out business as an Insurer in accordance to Federal.
Evidence and Argument Evidence – The asserted facts that the arbitrator will consider in making a decision – Information – What is presented at the hearing.
Cyber Law & Islamic Ethics
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
1. The applicant, as an alternative to submitting applications in the usual manner in the concerned office, can submit the application to a CHO i CE Agent.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Computer Forensics Principles and Practices
Advanced Civil Litigation Class 11Slide 1 Production of Documents Scope Scope Includes documents of all types, including pictures, graphs, drawings, videos.
The law on Intermediary Liability in India
THE TRIAL IN CANADIAN COURTS – Part 3 RULES AND TYPES OF EVIDENCE LAW 12 MUNDY
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Legal aspects of forensics. Civil Law private law ◦ Regulates noncriminal relationships between individuals, businesses, agency of government, and other.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
The Development of Computer Forensic Legal System in Mainland China Yonghao Mai Digital Forensics key Laboratory, Hubei University of Police, China.
Fool me twice… Shame on Me Metro Toronto Convention Centre February 2, 2010.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
Forensic Training 101 Kiyosha N. Malcolm C. Kevin M. Imani W.
The Bankers` Books Evidence Act. Banks keep their accounting and its details in various ledgers, registers. When any claim of the bank is required to established.
Some aspects the everyone should know. Legal recognition of electronic records- exceptions (Schedule)  Negotiable instruments (other than cheque)  Power.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Publisher Orientation October  State Board of Education Adoption Process  Open-Source Textbooks ◦ University Developed ◦ State Developed  Commissioner’s.
FORMATION OF COMPANY. Steps for formation of a company  Electronic filing of form  Incorporation of company  Certificate of incorporation  Promoter.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
QCTO’s Occupational Certificates. Who is the QCTO? The Quality Council for Trades and Occupations (QCTO) is a Quality Council established in 2010 in terms.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
Workshop on conformity assessment procedures and certification of medical devices INT MARKT Kyiv, November 2011 Conformity assessment of medical.
 Planning an audit of cost statements, records and other related documents is considered necessary to ensure achievement of audit objectives with available.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Protection of Trade Secret in Future Japanese Patent Litigation
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Indiana Access to Public Records Act (APRA) Training
The Demand for Audit and Other Assurance Services
Auditing & Investigations I
Tender Evaluation and Award Process
Administration of a FIDIC Contract - Project Control
Computer Forensics 1 1.
Criminal Evidence Prepared by Dr. Charles L. Feer Department of Criminal Justice Bakersfield College.
Courtroom Participants
Independent Police Investigative Directorate (IPID)
AFFIDAVIT.
Law of Evidence OPINION EVIDENCE 2/12/2014 Chapter 8.
Digital Signature.
BVI Business Companies Act Workshop
Quality system in forensics
METHOD VALIDATION: AN ESSENTIAL COMPONENT OF THE MEASUREMENT PROCESS
Facts which need not be proved by evidence
Workshop on “Cyber Crime”
Opinion Testimony, In General
Trial before court of session
Evidence in an Electronic Age – What is admissible?
Computer Security CIS326 Dr Rachel Shipsey.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
THE TRIAL IN CANADIAN COURTS – Part 3
Law 12 Criminal Trial Process.
Simplification of Lighting and Light-Signalling Regulations
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

Digital Evidence Prospects Investigation issues and the Indian Evidence Act summarized in a nut-shell. shivam387@yahoo.com

The Organized Crime Industry White Collar Crimes. Criminals are the well educated ones. Knowledgeable of the crime scene and the act. Increasing rapidly (refer CERT/NCRB website) Financially motivated/disgruntled feeling. Intentional attempts and not in the heat of the moment. shivam387@yahoo.com

Conspriated Ones Some of the most challenging case studies are these conspirated onesas they are thoroughly organised. Competing and rival companies opt for data theft. Eaves dropping and data surveillance. Espionage and sabotage attempts through identified intruders Cyber scouting for others. Data fiddle (3rd party attempts). Economic blows and grinds (usually in capital markets) shivam387@yahoo.com

Major Investigative Hurdles Ground Zero (People) Tech-savvy criminals Victims are innocent Court Scene Convince/ explain the Court Law and Order regime Forensic process Technology, and expertise Hardware and victim devices shivam387@yahoo.com

Ground Zero (Field Investigation) Usually literate people are Cyber criminals. Well planned attempts. Coordination with ISP and Intermediaries is late indeed. Pre established channels are certainly beneficial. Investigating workforce may lack expertised skill. Late incident response tends to a voidable investigation. Victims don’t know of their victimized status. Most Computers have pirated softwares, infected applications, etc etc shivam387@yahoo.com

Court Scene and Law Enforcement. Thousands of cases listed everyday A few hundred awaiting a Bail. Few waiting hearing. Time consuming process of understanding the technicalities of Cyber crime and allied aspects. Courts/Prosecutors and Law enforcement agencies find it difficult to catch tech specific attempts. Prosecution and the Police find it challenging to explain in details/educate. Benefit of doubt may slip away. shivam387@yahoo.com

Allied Forensics Little knowledge of the Digital evidence procedures. Digital Evidence is almost volatile. Forensic equipments are not available. Authorised personnel are not available 24*7. Most Computers have pirated softwares, infected applications, etc Not all gadgets are compatible or examinable. Evidence and IT Act Laws are too flexed, not all examiners know it all. SOP on Forensic examination is still awaited. shivam387@yahoo.com

Hilarious hurdles ! What is the meaning of a Hotmail ? “Mouse mane eedur” (i.e.Rat) The Soft disk examination report has not been submitted. I don’t know what is Internet. Explain what is IP Address and where is it found. …BE PREPARED FOR THIS… shivam387@yahoo.com

The Indian Evidence Act Governs the relevancy of digital evidence. Lays the procedure for identifying evidence. Demarcates a relevant evidence Deals with admissibility issues. Describes the validity of a proper evidence. Has merged the meaning assigned to all “documents” with the word “electronic”, hence virtual data is also admissible. shivam387@yahoo.com

Important sections Section 22A : Oral admissions as to the contents of an electronic record are not relevant unless its genuineness is in question. Section 39 : When an evidence to be produced is a part or segment of a larger part of conversation, book, mails or a series of transactions etc….the Court has its discretionary power to tender what is necessary and in the interest of justice. shivam387@yahoo.com

Section 65 B : Admissibility issues. Section 47 A : The opinion regarding the Digital Signature of a person can be determined from its Certifying authority, and the same tantamounts to a relevant fact. Section 65 A : The contents of electronic record MAY be proved in accordance with section 65 B. Section 65 B : Admissibility issues. (1) All e-records if printed, copied or stored in an optical medium SHALL be deemed to be a document and shall be admissible if the conditions of section 65 B (2) are met with. shivam387@yahoo.com

(2) (a) The computer output was produced by the person who regularly used it and under lawful occupancy,(even multiple computers shall bear a singular construction) (b) The said use was continuous for the data in relevance, (c) The computer should have been working properly or atleast to the extent as not to hamper the authenticity of the data in question. (d) The said data in question was fed into the computer in the ordinary course of the use. (3) As enunciated in Sub sec 2 (a) regarding the use of a computer, where there are more than one computers in use…then such multiple computers shall bear a singular meaning for the purpose of interpretation within this provision. (4) For the purpose of this section, If a statement is required to be given, a certificate is required to be provided with specific particulars and the nature of the deposition by the appropriate person in charge of the said device/computer. shivam387@yahoo.com

Section 73 A : The Court has powers to direct the purported owner of a Digital signature, or the Controller or the Certifying Authority to produce the DSC or instruct such other person to use the public key to verify the details. Section 85 A : The Court shall presume such records purporting to be an agreement where digital signatures are affixed, were so affixed by the parties to make the agreement conclusive. Section 85 B : The Court shall presume unless otherwise proved that (1) a secure electronic record has been unaltered, since the time of its secure status relates to. (2) that the subscriber has affixed the digital signature himself with the intent of approving the contents. (3) For the purpose of this section, authenticity shall never be a presumption except for secure electronic record and secure digital signature. shivam387@yahoo.com

Section 88 A : The Court may presume that a given piece of electronic message was transmitted from a computer “X” to Computer “Y” and that the message corresponds the same, but there shall be no presumption as to the person who used the computer “X”. Section 90 A : Where the electronic record is more than 5 years old, the Court may presume that the purported digital signature was affixed by the said subscriber in due course at that time. Section 131 : No person shall be compelled to produce a record which another person would be entitled to refused if the said would have been in custody of the same. shivam387@yahoo.com

What does law say about FRED ? Nothing … All digital evidence examiners are merely appointed under the sec 79A of the IT Act 2000. There are no prescriptions by the Law to adopt a specific forensic process. shivam387@yahoo.com

However… The opinion tendered by any cyber forensic expert is a mere opinion which is to be duly examined by the Court. It is not a final or binding evidence. No other person can tender an experts opinion under sec 45 of the Evidence Act, but the authenticity of the evidence opined can be always rebutted…that is for ends of Justice. shivam387@yahoo.com

The given subject is not Nuclear physics ! If you think you can… You can… The given subject is not Nuclear physics ! shivam387@yahoo.com

Thank You Shankey Gupta 91 94339 22172 91 91635 22172 shivam387@yahoo.com shivam387@gmail.com shivam387@yahoo.com