DF 1
DF 1
As a rule of thumb, “Forensic is the scientific tests or techniques used in connection with the
detection of crime.” - Wikipedia.
Case Scenario
Suppose Mr X is the computer forensics investigator in Odisha and he has been appointed to
inspect data-stealing case in an MNC in Bhubaneswar. The general manager of the
organization has confidence in that some of his employees are involved in the case including
the network crack and the transfer of the confidential data. Mr X has started his investigation,
Analyze, Evaluate the case and collected the evidence and then he submitted his final report to
the Authority. According to the report, four employees were found accountable for data theft/
data-stealing. Based on this report, a case has been lodged against them.
In the situation mentioned above, the organization was the client, Mr X was the service
provider and the service that was being provided is called computer forensics & digital
investigation services.
1.3 Definition of Computer Forensics
Computer Forensics is the process of using scientific techniques during the identification,
collection, examination and reporting the evidence to the court. So what computer forensics is
all about?
According to Dr H.B. Wolfe, computer forensics is, “A methodical series of techniques and
procedures for gathering evidence, from computing equipment and various storage devices and
digital media that can be presented in a court of law in a coherent and meaningful format.”
If we further define computer forensics then, it is the practice of collecting, analysing and
reporting on digital data in a way that is legally admissible. It can be used in the detection and
prevention of crime and in any dispute where evidence is stored digitally.
Computer forensics requires specialized expertise that goes beyond normal data collection and
preservation techniques available to end-users or system support personnel.
Page 2
The scope of computer forensics is not limited to investigating a crime only. Apart from this,
computer forensics can be used for:
➢ Data recovery
➢ Log monitoring
➢ Data acquisition (from the retired or damaged devices)
➢ Fulfil the compliance needs
1.4 Cybercrime
Computer crime, or cybercrime, is any crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target. Dr.
Debarati Halder and Dr K. Jaishankar define Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails,
notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a
nation’s security and financial health. Issues surrounding these types of crimes have become
high-profile, particularly those surrounding hacking, copyright infringement, child
pornography, and child grooming. There are also problems of privacy when confidential
information is intercepted or disclosed, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including
espionage, financial theft, and other cross-border crimes. Activity crossing international
borders and involving the interests of at least one nation-state is sometimes referred to as
cyberwarfare.
Digital forensics is traditionally associated with criminal investigations and, as you would
expect, most types of investigation centre on some form of computer crime. This sort of crime
can take two forms; computer-based crime and computer-facilitated crime.
1.4.1 Computer-based crime
This is criminal activity that is conducted purely on computers, for example, cyber-bullying or
spam. As well as crimes newly defined by the computing age it also includes traditional crime
conducted purely on computers (for example, child pornography).
1.4.2 Computer facilitated crime
Crime conducted in the "real world" but facilitated by the use of computers. A classic example
of this sort of crime is a fraud: computers are commonly used to communicate with other
fraudsters, to record/plan activities or to create fraudulent documents.
Not all digital forensics investigations focus on criminal behavior; sometimes the techniques
are used to incorporate (or private) settings to recover lost information or to rebuild the
activities of employees.