12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Indian <strong>Police</strong> Journalevidence, makes investigation inadequate if a generalized approachis sought. There is a growing need for a formalized approach ininvestigation <strong>of</strong> Cyber Crime. A process, that takes its information frominitial assessment. Offences are covered in the Information TechnologyAct (2000, 2008). Indian Penal Code have also been amended tocover various <strong>of</strong>fences. Legal considerations that ensure Forensic datarecovery, lawful evidence-gathering techniques that is rigorous <strong>and</strong>all-inclusive is the need <strong>of</strong> the hour. Jurisdictional issues must also beconsidered. All these can be achieved only <strong>by</strong> way <strong>of</strong> investigatingthe Cyber Crime through a formal approach <strong>and</strong> it should be able toidentify the basic requirements during stages <strong>of</strong> investigation. Formalapproach can be mapped into the following investigative strategiesthrough Cyber Forensics.Cyber ForensicsCyber Forensics, Computer Forensics, electronic discovery <strong>and</strong> digitaldiscovery is a process <strong>of</strong> methodical examination <strong>of</strong> computer storageMedia for evidence <strong>of</strong> criminality. A thorough analysis <strong>by</strong> a skilledexaminer can result in the reconstruction <strong>of</strong> the activities <strong>of</strong> a computeruser. In other words, Cyber Forensics/Computer Forensics is thecollection, preservation, analysis <strong>and</strong> presentation <strong>of</strong> computer-relatedevidence. Computer evidence can be useful in criminal cases, civildisputes, <strong>and</strong> human resources/employment proceedings. Examination<strong>of</strong> systems <strong>and</strong> networks can be <strong>of</strong> two types: one being post-incidentanalysis <strong>and</strong> the other is proactive analysis. Once an <strong>of</strong>fence iscommitted, the storage media are sent to Forensic lab for analysis. Inthe case <strong>of</strong> Proactive Forensics, the computers <strong>and</strong> networks used inbusiness, banking <strong>and</strong> industries, necessitates a proactive examination,involving remote monitoring <strong>of</strong> target computers, creating a trackableelectronic documents, recovery <strong>of</strong> theft <strong>of</strong> data <strong>and</strong> the like. BasicForensic tools <strong>and</strong> techniques <strong>and</strong> Forensic services infrastructurebecomes m<strong>and</strong>atory.The pursuit <strong>of</strong> Cyber Crime detection using Cyber Forensics has twomain objectives:• Detection <strong>and</strong> documenting Cyber Crimes through a disciplinedmethodology to assists the Law Enforcement Agencies toeffectively present their case to the Judiciary <strong>and</strong> punish thecriminals.January - March, 2013101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!