12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Indian <strong>Police</strong> Journal process documentation method would facilitate a solid evidence.Analysis phase involves a trustworthy effort to thoroughly analyze are used to perform the analysis, detailed method <strong>of</strong> analysis bedocumented, date <strong>and</strong> time issues must be correlated <strong>and</strong> theresults <strong>of</strong> analysis must be properly interpreted. A detailed Plan <strong>of</strong>Action during analysis will help to prevent committing mistakes,which otherwise could lead to evidence being inadmissible.Event reconstruction is the next phase, wherein past events arereconstructed with as little distortion or bias as possible. Finally,for either a trial in the court or internal investigation, as the casemay be.Conclusion critical infrastructure. Home users, social networks, business/corporatenetwork are the operation <strong>of</strong> communication through the use <strong>of</strong>Internet. A major concern <strong>of</strong> the criminality in the Internet is globaleconomy. The technical complexity has made Cyber Forensics a majorchallenge, both for the Law Enforcement <strong>and</strong> Forensics personnel aswell who are reacting to this growing threat. More formalized <strong>and</strong>structured approach facilitated <strong>by</strong> a way <strong>of</strong> best practices, policies <strong>and</strong>procedures is the need <strong>of</strong> the hour.•References1. 10 th UN Congress on Prevention <strong>of</strong> Crime <strong>and</strong> Treatment <strong>of</strong> Offendersavailable online.2. FBI Homepage, visited on July 2010.3. iC3 Annual Report, www.iC3.gov, 2010.4. CERT-in Annual Report, 2010.5. http://articles.economictimes.indiatimes.com/2011-12-03/news/30471838_1_cyber-attacks-hackers-symantec-india, 2012.6. A rigorous approach to formalizing the technical investigation stages <strong>of</strong>Cyber Crime, Criminality within a UK law enforcement environment,Digital Investigation (2011); 7(3-4):105-113.January - March, 2013103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!