Module 019 Investigative Reports, Expert Witness and Cyber Regulations
Module 019 Investigative Reports, Expert Witness and Cyber Regulations
Module 019 Investigative Reports, Expert Witness and Cyber Regulations
19.2 INTRODUCTION
VIDEO LECTURE
One of the most important considerations that a Forensic investigator needs to make while
investigating is how to render and communicate the information gathered to the intended
audience. The investigator needs to have a best approach of rendering or reporting the findings
in a manner that would be categorical, technically sound and yet easily readable and
understandable. A good technical report would facilitate the judicial process. A poor technical
report would hamper the process and at many times induces lots of ambiguities which can lead
to the acquittal of the culprit.
As in [5] Digital forensic reports can be produced for investigative purposes, separately from
reports designed for litigation or electronic discovery. Oftentimes, E-Investigations reports on
facts for internal review and investigation. Who used this laptop and for what purpose? Who
hacked the server? Was the hacker based inside our organization or did the attack come from
outside the network?
An expert witness is a very powerful source of evidence in court. Reports on data electronically
discovered by computer forensics methods are important because they provide strong evidence
in court documents and in overall analysis in an active lawsuit or settlement. An expert witness
is one who allegedly has specialized knowledge relevant to the matter of interest, which
knowledge purportedly helps to either make sense of other evidence, including other testimony,
documentary evidence or physical evidence (e.g., a fingerprint). An expert witness may or may
not also be a percipient witness, as in a doctor or may or may not have treated the victim of an
accident or crime. In a court proceeding, a witness may be called (requested to testify) by either
the prosecution or the defense. The side that calls the witness first asks questions, in what is
called direct examination. The opposing side then may ask their own questions in what is called
cross-examination. In some cases, redirect examination may then be used by the side that called
the witness, but usually only to contradict specific testimony from the cross-examination. An
expert report is a study written by one or more authorities that states findings and offers
opinions.
In law, expert reports are generated by expert witnesses and investigators offering their
opinions on points of controversy in a legal case, and are typically sponsored by one side or
the other in litigation, in order to support that party's claims. The reports state facts, discuss
details, explain reasoning, and justify the experts' conclusions and opinions.
A report offering a conclusion (an opinion) is referred to as an expert report. The investigator
from law enforcement agencies is generally trained to merely state the facts in their reports
rather giving conclusions. Once the case goes under trial a forensic analyst will be called to
provide valuable suggestions. The technical witness or the forensic analyst will provide facts
as found in the forensic investigation. The analyst will and can comment on the methodologies
of the collection of the evidence. The forensic analyst does not offer conclusions, only the facts.
However, an expert witness, (which can be another forensic analyst) can have opinions and
conclusions about what was found as evidence. The opinions and conclusions are based on
experience and the facts found during the forensic investigation and examination of the data
obtained. Forensic analysts are usually requested to give an opinion in court about the
evidences and the conclusions that can be drawn from them. In most cases, the forensic
analyst’s professional opinion about a case is the most useful item in any case.
It is also very important to keep data in a consistent form. i.e the records must be referenced
properly with proper labels assigned to every item. Thus, referring these items using labels will
always help the reader to be consistent in their understanding.
Finally, we need to create MD5 hashes of the collected data/evidences and record the MD5
hashes as metadata for every file so that they can be cited in the forensic report. Creating MD5
hashes ensures the integrity of the collected data and it generates a good deal of confidence
among the readers about the manner in which the investigation is being handled.
a. Executive Summary: Contains mainly the background of the investigation like, who
authorized the forensic investigation, description of why a forensic examination of
computer media was necessary, give a listing of what significant findings were found,
signature block for the examiner(s) who performed the investigation etc. information
of all people involved in the investigation along with important dates of pertinent
communications are also included.
b. Objectives: All the tasks of the investigation are outlined as well as a proper list of
objectives as decided for the investigation needs to be kept here.
c. Computer Evidence Analyzed: All the evidences collected and interpreted are
introduced in this section. Better way is to tabulate the evidences in form of evidence,
date of collection, interpretation, expert opinion etc.
d. Relevant Findings: A summary of the findings of value are included in this section.
This is the conclusions and opinions of the forensic analyst. This section tries to put the
findings on the table for the reader. The reader can get an idea about what are results
drawn from the evidences analyzed. It is advised to keep them in an order of increasing
importance or relevance for the case.
e. Supporting Details: The findings listed in the relevant findings section is supported in
a descriptive and in-depth fashion. The descriptive part suggests and emphasizes on
how we reached to the conclusions in the previous section. Illustrations such as tables
and figures can be very good in this section.
f. Investigative Leads: Many times because of time constraints the investigator could not
proceed for further investigation though he might be having important leads. These
leads can be very importantly kept in this section. The court or the client can also permit
more investigation in a later stage where we can start moving further spontaneously
using the leads mentioned here.
g. Subsections: In cases of computing attacks, the readers may want to know the exact
attack that was performed, for this we might require analyzing a binary. So, a section
“Binary Analysis” may be appropriate to the investigation. Similarly, based on
requirement we can add more sub sections in other sections discussed above.
19.3.4 Writing and Revising a Rough Draft
With a logical template for computer forensic reports, writing the rough draft will be much
easier. However, because many technical materials are included in forensic reports, we will be
having many versions of the report. Hence, we need to keep on writing a rough report and
revising it. Mostly we need many readings and revising the report many times before coming
to final version. Lastly, we need to format the report in nice appearance using available editors.
Figure 1 describes a template for a forensics report.
1
Image courtesy: Computer Forensics Report Template - Privacy Resources, computer-
forensics.privacyresources.org/forensic-template.htm
and specialized knowledge in a particular subject beyond that of the average person, sufficient
that others may officially and legally rely upon the witness's specialized (scientific, technical
or other) opinion about an evidence or fact issue within the scope of his expertise, referred to
as the expert opinion, as an assistance to the fact-finder. Expert witnesses may also deliver
expert evidence about facts from the domain of their expertise. At times, their testimony may
be rebutted with a learned treatise, sometimes to the detriment of their reputations.
Typically, experts are relied on for opinions on severity of injury, degree of sanity, cause of
failure in a machine or other device, loss of earnings, care costs, and the like. In an intellectual
property case and an expert may be shown two music scores, book texts, or circuit boards and
asked to ascertain their degree of similarity. In the majority of cases the expert's personal
relation to the defendant is considered and irrelevant.
The tribunal itself, or the judge, can in some systems and call upon experts to technically
evaluate a certain fact or action, in order to provide the court with a complete knowledge on
the fact/action it is judging. The expertise has the legal value of an acquisition of data. The
results of these experts are then compared to those by the experts of the parties.
The expert will likely be called to testify in court and to explain what he or she did to the
computer and its data. The court will weigh the fact that the expert had a proper training and
experience, Least is the affiliation weightage in the minds of the court. The experience of an
expert should be specifically in computer forensics, as skill with computers does not
necessarily translate to forensic expertise. Proper consulting needs to be done with litigators
who have used the expert before or have seen the expert testifying in the court.
Cyber law or Internet law is a term that encapsulates the legal issues related to use of the
Internet. It is less a distinct field of law than intellectual property or contract law, as it is a
domain covering many areas of law and regulation. Some leading topics include internet access
and usage, privacy, freedom of expression, and jurisdiction.
In various countries, areas of the computing and communication industries are regulated, often
strictly by government bodies.
There are laws on censorship versus freedom of expression, rules on public access to
government information, and individual access to information held on them by private bodies.
There are laws on what data must be retained for law enforcement, and what may not be
gathered or retained, for privacy reasons.
19.5.1 Jurisdiction
Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and
administrative competence. Although jurisdiction is an aspect of sovereignty, it is not
coextensive with it. The laws of a nation may have extraterritorial impact extending the
jurisdiction beyond the sovereign and territorial limits of that nation. This is particularly
problematic as the medium of the Internet does not explicitly recognize sovereignty and
territorial limitations. There is no uniform, international jurisdictional law of universal
application, and such questions are generally a matter of conflict of laws, particularly private
international law. An example would be where the contents of a web site are legal in one
country and illegal in another. In the absence of a uniform jurisdictional code, legal
practitioners are generally left with a conflict of law issue.
Another major problem of cyberlaw lies in whether to treat the Internet as if it were physical
space (and thus subject to a given jurisdiction's laws) or to act as if the Internet is a world unto
itself (and therefore free of such restraints). Those who favor the latter view often feel that
government should leave the Internet community to self-regulate. John Perry Barlow, for
example, has addressed the governments of the world and stated, "Where there are real
conflicts, where there are wrongs, we will identify them and address them by our means. We
are forming our own Social Contract. This governance will arise according to the conditions of
our world, not yours. Our world is different".
With the internationalism of the Internet, jurisdiction is a much more tricky area than before,
and courts in different countries have taken various views on whether they have jurisdiction
over items published on the Internet, or business agreements entered into over the Internet.
This can cover areas from contract law, trading standards and tax, through rules on
unauthorized access, data privacy and spamming to more political areas such as freedom of
speech, censorship, libel or sedition.
In practical terms, a user of the Internet is subject to the laws of the state or nation within which
he or she goes online. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct,
and numerous users of peer-to-peer file-sharing software were subject to civil lawsuits for
copyright infringement. This system runs into conflicts, however, when these suits are
international in nature. Simply put, legal conduct in one nation may be decidedly illegal in
another. In fact, even different standards concerning the burden of proof in a civil case can
cause jurisdictional problems. For example, an American celebrity, claiming to be insulted by
an online American magazine, faces a difficult task of winning a lawsuit against that magazine
for libel. But if the celebrity has ties, economic or otherwise, to England, he or she can sue for
libel in the British court system, where the standard of "libelous speech" is far lower.
Proponents often see net neutrality as an important component of an open Internet, where
policies such as equal treatment of data and open web standards allow those on the Internet to
easily communicate and conduct business without interference from a third party. A closed
Internet refers to the opposite situation, in which established persons, corporations or
governments favor certain uses. A closed Internet may have restricted access to necessary web
standards, artificially degrade some services, or explicitly filter out content.
As of 2015, India had no laws governing net neutrality and there have been violations of net
neutrality principles by some service providers. While the Telecom Regulatory Authority of
India (TRAI) guidelines for the Unified Access Service license promote net neutrality, they do
not enforce it. The Information Technology Act, 2000 does not prohibit companies from
throttling their service in accordance with their business interests. In India, telecom operators
and ISPs offering VoIP services have to pay a part of their revenues to the government.
In March 2015, the TRAI released a formal consultation paper on Regulatory Framework for
Over-the-top (OTT) services, seeking comments from the public. The consultation paper was
criticized for being one sided and having confusing statements. It was condemned by various
politicians and internet users. By 24 April 2015, over a million emails had been sent to TRAI
demanding net neutrality.
India's The Information Technology Act 2000 has tried to assimilate legal principles available
in several such laws (relating to information technology) enacted earlier in several other
countries, as also various guidelines pertaining to information technology law. The Act gives
legal validity to electronic contracts, recognition of electronic signatures. This is a modern
legislation which makes acts like hacking, data theft, spreading of virus, identity theft,
defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a
criminal offence. The Act is supplemented by a number of rules which includes rules for, cyber
cafes, electronic service delivery, data security, blocking of websites. It also has rules for
observance of due diligence by internet intermediaries (ISP's, network service providers, cyber
cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can apply for
compensation from Adjudicator appointed under Section 46 as well as file a criminal
complaint.
The original Act contained 94 sections, divided in 19 chapters and 4 schedules. The laws apply
to the whole of India. Persons of other nationalities can also be indicted under the law, if the
crime involves a computer or network located in India.
The Act provides legal framework for electronic governance by giving recognition to electronic
records and digital signatures. The formation of Controller of Certifying Authorities was
directed by the Act, to regulation issuing of digital signatures. It also defined cybercrimes and
prescribed penalties for them. It also established a Cyber Appellate Tribunal to resolve disputes
arising from this new law.
• Individual
• Organization
• Society at Large
The following are the crimes which can be committed against the following groups.
If a person knowingly or
intentionally conceals, destroys
or alters or intentionally or
knowingly causes another to
conceal, destroy or alter any
Tampering with Imprisonment up to
computer source code used for a
65 computer source three years, or/and with
computer, computer program,
documents fine up to ₹200,000
computer system or computer
network, when the computer
source code is required to be kept
or maintained by law for the time
being in force.
Imprisonment up to
Using password of A person fraudulently uses the
66C three years, or/and with
another person
password, digital signature or fine up to ₹100,000
other unique identification of
another person.
Persons deemed as
intermediatory (such as an ISP) Imprisonment up to
Failure to maintain
67C must maintain required records three years, or/and with
records
for stipulated time. Failure is an fine.
offence.
a) Expert witness
b) Incorrectness
c) 17 October 2000
d) Executive Summary
e) Paper laws ,paperless environment
2. State True or False
a) False.
b) True.
c) True.
d) True.
e) False.