01PD092008003290002
01PD092008003290002
Forensics
1
Why CFCA ?
Real Life Cases
ACCUSESD IN RS 400 MILLION SMS SCAM
ARRESTED IN MUMBAI
CITY PRINCIPAL SEEKS POLICE HELP TO
STOP CYBER CRIME
UTI BANK HOOKED UP IN A PISHING
ATTACK
ONLINE CREDIT CARD FRAUD ON E-BAY
Computer Forensics
5
Basic Definition
6
Cont..
7
Language of Computer Crime
Investigation
• Several attempts have been made to develop a standard
language to describe the various aspects of computer
crime investigation.
1. Admissibility-Warrants
• The most common mistake that prevents digital evidence
from being admitted by courts is that it was obtained without
authorization.
• The main exceptions are
• plain view – Rules that allows law enforescement officer to
seize evidence of crime
• consent, -To give permission
• Exigency. - Remand for something
•
10
2. Authenticity and Reliability
• The process of determining whether evidence is worthy is
called authentication.
• Authentication means satisfying the court that
(a) the contents of the record have remained unchanged,
(b) that the information in the record does in fact
originate from its purported(original) source, whether
human or machine, and
(c) that extraneous information such as the apparent date
of the record is accurate.
11
3. Casey's Certainty Scale
12
4. Best Evidence
14
6.Hearsay
18
4. Cyber crime Law: United State
Perspective
• Chapter reviews how law in the United States deals
cybercrime. As the United States is a federal system, there
are two basic levels of cybercrime law: federal cybercrime
law and state cybercrime law.
• U.S. law deals with the major cybercrimes: the crimes that
target computers and computer systems (e.g.,
unauthorized access, malware, and denial of service
attacks) and the crimes in which computers and computer
systems are used as tools to commit traditional crimes
(e.g., fraud, extortion, illegeal contents etc).
• Federal Cybercrime Law
• State Cybercrime Law
• Constitutional Law
• Fourth Amendment
• Fifth Amendment and Encryption
19
1. Federal Cybercrime Law
4.1 Computer Fraud and Abuse Act
• It focuses on the Computer Fraud and Abuse Act such as identity
theft, abuuse contents, and copyright and trademark offenses.
• Congress adopted the Computer Fraud and Abuse Act (1986), but
it has since been amended on several occasions.
• amendments have all been designed to update certain
provisions of the Act in light of advancements in computer
technology
• Section 1030(a) makes it a federal crime to do any of the
following:
1. Knowingly access a computer without authorization or exceed
authorized access and obtain information that is legally protected
against disclosure.
2. Intentionally access a computer without authorization or exceed
authorized access and obtain information from (i) a financial
institution, credit card company, or consumer reporting agency.
3. With the intent to extort money or any thing of value like
(i) threat to damage a computer, (ii) threat to obtain information
from,
20
4.1.1 Section 1030(a)(5) Offense: accounts for the largest
number of prosecutions(legal proceeding against person), perhaps
because it creates three crimes. The first consists of knowingly
transmitting a program, information, code, or command and
thereby intentionally damaging a protected computer. Other two
are hacking, or unauthorized access, to a computer or computer
system.
4.1.2 Section 1030(a)(4) Offense: As noted above, § 1030(a)(4)
makes it a federal crime to access a protected computer without
being authorized to do so, or by exceeding the scope of authorized
access, and obtain “anything of value” and thereby further a
scheme to defraud.
4.1.3 Section 1030(a)(6) Offense : makes it a crime to traffic “in
any password or similar information through which a computer
may be accessed without authorization” if either of two conditions
are met. The first is “affects interstate or foreign commerce”; the
other condition is that the computer is “used by or for the
Government of the United States.”
4.1.4 Section 1030(a)(7) Offense: criminalizes the use of
computer technology to commit extortion.
21
4.2 Identity Theft: The federal criminal code contains two identity
theft provisions: Section 1028(a)(7) of Title 18 of the U.S. Code
defines a basic identity theft offense. makes it a federal crime to
knowingly transfer, possess, or use “a means of identification of
another person” without being authorized.
4.4 Copyright Infringement(against law)(Section 506(a))
Copyright infringement in the form of software piracy is a crime.
For a work to be “original,” it must have “originated” with—have
been created by—the author claiming the copyright; originality
does not require novelty but to be original an item cannot simply
be a copy of another.
4.5 Trademarks and Trade Secrets
The Lanham Act is the primary source of protection for trademarks
(Act of July5, 1946). It defines “trademark” as “any word, name,
symbol, or device, or any combination thereof” that is used by a
person or which a person has a bonafide intention to use in
commerce “to identify and distinguish his or her goods from those
manufactured or sold by others and to indicate the source of the
goods, even if that source is unknown” (15 U.S. Code § 1127).
22
2. State cybercrime law
4.2.1 Access Crimes: Every U.S. state prohibits simple hacking
(gaining unauthorized access to a computer) and aggravated
hacking (gaining unauthorized access to a computer for the
purpose of committing theft, vandalism, or other crimes)
4.2.2 Malware: Computer contaminant” means any set of computer
instructions that are designed to modify, damage, destroy, record,
or transmit information within a computer, computer system, or
computer network without the intent or permission of the owner of
the information.
4.2.3 Denial of Service: DDoS attack as “techniques or actions
involving the use of one (1) or more damaged computers to
damage another computer or a targeted computer system in order
to shut the computer or computer system down and deny the
service of the damaged computer or computer system to
legitimate users”.
4.2.4 Computer Forgery: “Any person who creates, alters, or
deletes any data contained in any computer or computer
network, who, if such person had created, altered, or deleted a
tangible document or instrument would have committed forgery …
shall be guilty of the crime of computer forgery”.
23
4.2.5 Computer Fraud and Theft: Computer theft can encompass
any of several different crimes, including information theft,
software theft, computer hardware theft, and theft of computer
services. It can also encompass the theft of computer hardware .
And it can consist of using a computer to steal other types of
property.
4.2.6 Computer Extortion: One approach they take is to include
computer extortion within the definition of computer fraud.
4.2.7 Crimes Against Children:
3 Constitutional law
• In the United States, constitutional law exists at two levels:
The U.S. Constitution is the constitution that applies throughout the
territorial
Two of the U.S. Constitution’s provisions are particularly relevant to
the conduct of cybercrime investigations.
The Fourth Amendment & Fifth Amendment
24
4. Fourth Amendment
• The Fourth Amendment creates a right to be free from
“unreasonable” searches and seizures(forcefully taking
ownership)
• To be “reasonable,” a search or seizure must be conducted either
a lawfully authorized search or arrest warrant.
• Court has applied the Fourth Amendment to areas in which
technology and privacy intersect.
4.4.1 Wiretapping: Content of Communications
The progress of science is not likely to stop with wire tapping.
Ways may be developed by which the government, without
removing papers from secret drawers, can reproduce them in
court, and expose to a jury the most intimate occurrences of the
home. Can it be that the Constitution affords no protection against
such fraud.
4.4.2 Wiretapping: Traffic Data
• In a subsequent decision, the Supreme Court dealt with the
related issue of whether the transmittal information—the traffic
data—generated by a telephone call is private under the Fourth
Amendme
25
4.4.3 Technology Not in General Public Use
The Supreme Court’s 2001 decision in Kyllo v. United States is its
most recent parsing of the Katz standard. The issue in Kyllo was
whether “the use of a thermal- imaging device aimed at a private
home from a public street to detect relative amounts of heat
within the home constitutes a ‘search’ within the meaning of the
Fourth Amendment”
26
• One area in which the Fifth Amendment can come into
play involves the use of encryption.
• Encryption can be used to protect the contents of
online communications or data files stored in a
computer or on other storage media. If files are
encrypted with an essentially unbreakable encryption
algorithm;
• If the owner of the files committed the key to memory,
then he/she can claim the Fifth Amendment privilege
and refuse that fraud.
27
Conducting Digital Investigation
Digital investigations inevitably vary depending on technical
factors such as the type of computing or communications device,
whether the investigation is in a criminal, civil, commercial,
military, or other context, and case-based factors such as the
specific claims to be investigated.
6.1 Digital Investigation Process Models
• describe how one conducted a digital investigation tended to
focus on practical stepwise approaches to solving particular
investigative challenges, within the context of particular technical
computing environments.
• Proposal of a number of models for describing investigations,
which have come to be known as “process models.”
• motivations
1. models serve as useful points of reference for reflecting on the
state and nature of the field
2. framework for training and directing research,
3. for benchmarking performance against generally accepted
practice.
28
• Process models have defined as linear process.
• For example, in 1999, McKemmish defined forensic computing as:
The process of identifying, preserving, analyzing and presenting digital
evidence in a manner that is legally acceptable.
• This activities are the basis of the process model
• Figure 6.1. The most common steps for conducting a complete and
competent digital investigation are:
1. Preparation: Generating a plan of action to conduct an effective
Digital investigation, and obtaining supporting resources and materials.
2. Survey/Identification: Finding potential sources of digital evidence
(e.g., at a crime scene, within an organization, or on the Internet).
3. Preservation: Preventing changes of in situ digital evidence, including
isolating the system on the network, securing relevant log files, and
collecting volatile data that would be lost when the system is turned
off. This step includes subsequent collection or acquisition.
4. Examination and Analysis: Searching for and interpreting trace
evidence. Some process models use the terms examination and
analysis interchangeably.
5. Presentation: Reporting of findings in a manner which satisfies the
context of the investigation, whether it be legal, corporate, military, or
any other.
29
30
6.1.1 Physical Model
33
34
6.1.3 Evidence Flow Model
• The main goal of this model is to completely describe
the flow of information in a digital investigation, from
the moment digital investigators are alerted until the
investigation reaches its conclusion.
• By concentrating on the flow of information,
appropriate controls can be implemented at each step
of the process to handle evidentiary data, written
reports, or communications relating to the
investigation.
6.1.4 Subphase Model
• Beebe and Clark contend that most investigative
process models are too high level and do not address
the “more concrete principles of the investigation”.
Their solution is to create a multitiered framework,
taking the steps common in other models and adding
subphases with defined objectives to help
investigators implement each step properly.
35
• As a proof of concept, Beebe and Clark use the analysis process,
providing three objectives-based subphases, namely, survey,
extract, and examine with the following objectives for file system
analysis:
39
• 6.4 Investigative Scenario: Security Breach
• An investigative scenario involving a network security breach is
outlined here to demonstrate how the various steps in a digital
investigation tie together.
6.4.1 Preparation and Case Management
IT help desk.
6.4.2 Accusation or Incident Alert
• unusually high numbers of failed logon attempts to a server it
confirms that there has been unauthorized use of the
administrator account on the system
6.4.3 Assessment of Worth
• most valuable intellectual property.
6.4.4 Authorization
• Developing situation and obtains approval to gather evidence and
report back any findings.
6.4.5 Survey
• digital investigators would waste
• substantial time and effort trying to locate sources of digital
evidence, and
• might ultimately find that there was insufficient information to
reach any
• conclusions
40
6.4.6 Preservation
6.4.7 Transportation
6.4.8 Examination
6.4.9 Analysis
6.4.10 Reporting
41
INFORMATION TECHNOLOGY
(AMENDED) ACT, 2008
• New communication systems and digital technology have
made dramatic changes in the way.
• Businessmen are increasingly using computers to create,
transmit and store information in electronic form instead of
traditional paper documents. It is cheaper, easier to
store and retrieve and speedier to communicate.
• Electronic commerce eliminates need for paper based
transactions.
• The Law of Evidence is traditionally based upon paper-
based records and oral witness. Hence, to facilitate e-
commerce, the need for legal changes.
• The legal recognition to electronic records and digital
signatures in turn will facilitate through the electronic
communication like Internet.
• In May 2000 Indian Parliament passed the Information
Technology Bill and came to be known as the Information
Technology Act, 2000. Cyber laws are contained in the IT
Act, 2000. 42
Cont..
• This Act was amended by Information Technology
Amendment Bill 2006, passed in Loksabha on Dec 22nd and
in Rajyasbha on Dec 23rd of 2008.
• Objectives of the IT 2008 Act are:
·Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as "electronic commerce“
· To facilitate electronic filing of documents with
Government departments
· To facilitate electronic storage of data
· To facilitate and give legal sanction to electronic fund
transfers between banks and financial institutions
· To give legal recognition for keeping of books of
accounts by banker’s in electronic form.
· To amend the Indian Penal Code, the Indian Evidence Act,
1872, the Banker’s Book Evidence Act, 1891, and the
Reserve Bank of India Act, 1934.
43
Important section of IT act
• Section 1:
It shall extend to the whole of India and, save as otherwise
provided in this Act, it applies also to any offence committed
outside India by any person.
• Section 2: Definitions
a) "Access"
b) "Addressee"
c) “Affixing Electronic Signature"
d) "Asymmetric Crypto System"
e) "Certifying Authority" means a person who has been granted a
license to issue a Electronic Signature Certificate.
f) "Communication Device"
g) "Computer"
h) “Computer network“
i) "Computer Resources“ means computer, communication device,
computer system, computer network, data, computer database
or software;
44
(j) "Controller" means the Controller of Certifying Authorities
(k) "Data" means a representation of information, knowledge, facts,
concepts or instructions
45
• Section 5: Legal recognition of Electronic
Signature
• Section 6: Use of Electronic Records and
Electronic Signature in Government and its
agencies
Where any law provides for
1. the filing of any form
2. the issue or grant of any license,
3. the receipt or payment of money in a particular
manner,
• Section 7 : Retention of Electronic Records
• Section 8: Publication of rules, regulation, etc,
in Electronic Gazette
• Section 11: Attribution of Electronic Records
An electronic record shall be attributed to the originator
• Section 12: Acknowledgement of Receipt
• Section 14: Secure Electronic Record
46
• Section 16 : Security procedures and Practices (Amended
vide ITAA 2008)
The Central Government may for the purposes of sections 14 and 15
prescribe the security procedures.
It is regard to the commercial circumstances, nature of transactions
and such other related factors as it may consider appropriate.
• Section 17: Appointment of Controller and other officers
• Section 18: The Controller may perform all or any of the
following functions, namely
(a) exercising supervision over the activities of the Certifying
Authorities;
(b) certifying public keys of the Certifying Authorities
(c) laying down the standards to be maintained by the Certifying
Authorities;
(d) specifying the qualifications and experience which employees of
the Certifying Authorities should possess;
(e) specifying the conditions subject to which the Certifying
Authorities shall conduct their business;
47
• Section 21: License to issue electronic signature
certificates
• A license granted under this section shall –
• (a) be valid for such period as may be prescribed by
the Central Government;
• (b) not be transferable
• (c) be subject to such terms and conditions as may be
specified by the regulations.
• Section 23: Renewal of license
• Section 29: Access to computers and data
• Section 37: Suspension of Digital Signature
Certificate
• Section 40: Generating Key Pair
• Section 43: Penalty for damage to computer,
computer system, etc
If any person without permission of the owner or
any other person who is in charge of a computer,
computer system or computer network -
48
(a) accesses or secures access to such computer, computer system
or computer network or computer resource (ITAA2008)
(b) downloads, copies or extracts any data, computer data base or
information from such computer, computer system or computer
network including information or data held or stored in any
removable storage medium;
(c) introduces or causes to be introduced any computer contaminant
or computer virus into any computer, computer system or
computer network;
• Section 52: Salary allowance and other terms and
conditions of service of Chairperson and Member.
The salary and allowances payable to, and the other terms and
conditions of service including pension, gratuity and other
retirement benefits
• Section 53: Filling up of vacancies (Amended vide ITAA
2008)
If, for reason other than temporary absence, any vacancy occurs in
the office of Chairperson or Member as the case may be then the
Central Government shall appoint another person in accordance
with the provisions of this Act
49
• Section 62: Appeal to High court
Any person aggrieved by any decision or order of the Cyber authority
may file an appeal to the High Court within sixty days from the
date of communication of the decision or order of the Cyber
Appellate Tribunal to him on any question of fact or law
• Section 65: Tampering with Computer Source Documents
shall be punishable with imprisonment up to three years, or with fine
which may extend up to two lakh rupees, or with both.
• Section 66: Computer Related Offences (Substituted vide
ITAA 2008)
imprisonment for a term which may extend to two three years or with
fine which may extend to five lakh rupees or with both.
• Section 71 Penalty for misrepresentation
imprisonment for a term which may extend to two years, or with fine
which may extend to one lakh rupees, or with both
• Section 85 Offences by Companies
50
Modus Operandi
• Modus operandi (MO) is a Latin term that means "a method of
operating." It refers to the behaviors that are committed by a
criminal for the purpose of successfully completing an offense.
• A criminal's MO consists of learned behaviors that can evolve and
develop over time.
• It can be refined, as an offender becomes more experienced,
sophisticated, and confident.
• It can also become less competent and less skilful over time,
decompensating by virtue of a deteriorating mental state, or
increased used of mind-altering substances.
• an offender's MO behavior is functional by its nature. It most often
serves (or fails to serve) one or more of three purposes:
protects the offender's identity;
ensures the successful completion of the crime;
facilitates the offender's escape.
51
Motive & Technology
52