Cyber Forensics PPT - Module 2
Cyber Forensics PPT - Module 2
LECTURES
• Financial crimes
• • Sale of illegal articles
• • Pornography
• • Online gambling
• • Intellectual property crime
• • E-mail spoofing
• • Forgery
• • Cyber defamation
• • Cyber stalking
• • Counterfeiting
COMPUTER AS A TARGET
• • Unauthorized access
• • Theft of information
• • E-mail bombing
• • Data diddling
• • Viruses, Logic bombs, Trojan attacks
• • Internet time thefts
• • Theft and physical damage of
• computer system
• • Denial of Service Attacks/
• DDoS
TYPES OF CYBER CRIMES IN INDIA
• Hacking is basically gaining unauthorized access to your system profit,
protest, information gathering, or to evaluate system weaknesses. The
provisions for hacking are given in IT Act, 2000 under section 43-A and
66 and section 379 & 406 of Indian Penal Code. The punishment for
hacking is 3 years or shall be imposed with fine up to 5 lakhs.
• Denial of Service
• It brings down the server (any server). It is known as the flooding
machine with requests in an attempt to overload systems. It also uses
bots for tasks. The provisions are given under section 43(f) of IT Act with
imprisonment up to 3 years or with fine up to 5 lakh rupees.
• Virus Dissemination
• It involves direct or search unauthorized access to system by introducing malicious
programs known as viruses, worms etc. Virus needs host while worms are standalone.
• Provisions are provided under the IT Act, 2000 under sections 43-C, 66 and section 268 of
the Indian Penal Code.
• Credit Card Fraud
• Card fraud begins either with the theft of the physical card or with the comprise of data
associated with the account. Provisions of such fraud are given under Section 66 C and 66
D of IT ACT, 2000 and section 468 & 471 of Indian Penal Code, 1860.
• Phishing
• A malicious individual or group who scam users. They do so by sending e-mails or creating
web pages that are designed to collect an individual’s online bank credit card, or other login
information. The provisions to prosecute any person for phishing are given under section 66
C, 66 D and 74 of the IT Act with imprisonment up to 3 years or with fine up to 1 lakh
rupees.
• Cyber Stalking
• It can be defined as the use of electronic communications
to harass or frighten someone, for
• example by sending threatening emails. The provisions
are given under IT Act, 2008 under
• section 72 and section 354 C (voyeurism) of the Indian
Penal Code. Also, section 67 provides
• imprisonment up to 3 years with fine.
• Email spoofing: This technique is a forgery of an email header. This means
that the message appears to have received from someone or somewhere
other than the genuine or actual source. These tactics are usually usedin
spam campaigns or in phishing, because people are probably going to open
an electronic mail or an email when they think that the email has been sent by
a legitimate source [8].
• Spamming: Email spam which is otherwise called as junk email. It is
unsought mass message sent through email. The uses of spam have become
popular in the mid 1990s and it is a problem faced by most email users now a
days. Recipient’s email addresses are obtained by spam bots, which are
automated programs that crawls the internet in search of email addresses.
The spammers use spam bots to create email distribution lists. With the
expectation of receiving a few number of respond a spammer typically sends
an email to millions of email addresses.
• Cyber defamation: Cyber defamation means the harm that is brought on the reputation of
an individual in the eyes of other individual through the cyber space [9]. The purpose of
making defamatory statement is to bring down the reputation of the individual.
• IRC Crime (Internet Relay Chat): IRC servers allow the people around the world to come
together under a single platform which is sometime called as rooms and they chat to each
other.
• Cyber Criminals basically uses it for meeting. Hacker uses it for discussing their
techniques. Paedophiles use it to allure small children.
• A few reasons behind IRC Crime:
• Chat to win ones confidence and later starts to harass sexually, and then blackmail people
for ransom, and if the victim denied paying the amount, criminal starts threatening to upload
victim’s nude photographs or video on the internet.
• A few are paedophiles, they harass children for their own benefits.
• A few uses IRC by offering fake jobs and sometime fake lottery and earns money [10].
• Phishing: In this type of crimes or fraud the attackers tries to gain
information such as login information or account’s information by
masquerading as a reputable individual or entity in various
communication channels or in email.
• Some other cyber crimes against individuals includesNet extortion,
Hacking, Indecent exposure, Trafficking, Distribution, Posting, Credit
Card, Malicious code etc.
• The potential harm of such a malefaction to an individual person can
scarcely be bigger.
• b) Cyber Crime against property: These types of crimes includes
vandalism of computers, Intellectual (Copyright, patented,
trademark etc) Property Crimes,Online threatening etc.
Intellectual property crime includes:
• Software piracy: It can be describes as the copying of software
unauthorizedly.
• Copyright infringement: It can be described as the
infringements of an individual or organization's copyright. In
simple term it can also be describes as the using of copyright
materials unauthorizedly such as music, software, text etc.
• Trademark infringement: It can be described as the using of a
service mark or trademark unauthorizedly
• c) Cyber Crime against organization: Cyber Crimes against
organization are as follows:
• Unauthorized changing or deleting of data.
• Reading or copying of confidential information unauthorizedly, but
the data are neither being change nor deleted.
• DOS attack: In this attack, the attacker floods the servers, systems
or networks with traffic in order to overwhelm the victim resources and
make it infeasible or difficult for the users to use them [11].
• Email bombing: It is a type of Net Abuse, where huge numbers of
emails are sent to an email address in order to overflow or flood the
mailbox with mails or to flood the server where the email address is.
• Salami attack: The other name of Salami attack is Salami
slicing. In this attack, the attackers use an online
database in order to seize the customer’s information like
bank details, credit card details etc. Attacker deduces very
little amounts from every account over a period of time. In
this attack, no complaint is file and the hackers remain
free from detection as the clients remain unaware of the
slicing.
• Some other cyber crimes against organization
includesLogical bomb, Torjan horse, Data diddling etc.
• d) Cyber Crime against society: Cyber Crime against society includes:
• Forgery: Forgery means making of false document, signature,
currency, revenue stamp etc.
• Web jacking: The term Web jacking has been derived from hi
jacking. In this offence the attacker creates a fake website and when
the victim opens the link a new page appears with the message and
they need to click another link. If the victim clicks the link that looks
real he will redirected to a fake page. These types of attacks are done
to get entrance or to get access and controls the site of another. The
attacker may also change the information of the victim’s webpage.
•Meaning of Forensic Science
• The term 'forensic' is obtained from the Latin word
'Forensis' which means "court of justice".
• So we can say, forensic science is a branch of science
that deals with the , recognition, identification, and
evaluation of physical evidence by the use of natural
science for criminal justice.
• Forensic science, also known as criminalistics,[1] is the
application of science principles and methods to support legal
decision-making in matters of criminal and civil law.
• During criminal investigation in particular, it is governed by the
legal standards of admissible evidence and criminal
procedure.
• It is a broad field utilizing numerous practices such as the
analysis of DNA, fingerprints, bloodstain patterns, firearms,
ballistics, toxicology, and fire debris [collection of evidence
from fire scene] analysis.
History
• The history of the term forensic originates from Roman times.
• In 44 BCE, Brutus and Cassius led a group of Roman senators [who works in govt.]; they
violently plunged their blades into Julius Caesar[ a Roman general and statesman.].
• Antistius, who was a Roman physician at that time performed an autopsy and found out
that there were 23 wounds that are stab wounds; out of the 23 wounds, none of them
caused death, except the second wound in the breast.
• This was the first record in history where a pathologist gives his opinion as an expert.
• This crime and the autopsy report that took place more than 2000 years ago is still
important and used by many historians, criminologist, and doctors to seek knowledge
about the evolution of forensic science and medical discovery;
• this was the first homicidal investigation that occurred.
• Antistius delivered his opinion in an open court before the forum, which gives rise to the
term “forensic” meaning “before the forum” in Latin .4
• Moreover, the religious rite of mummification marks the birth of
forensic science.
• Even as early as 3000 BC, ancient Egyptians removed,
analyzed, and preserved the internal organs of deceased
leaders for sacred ceremonies.
• This is the first autopsy, which is still an important part of
forensic research today.
• After death, the body reaches a stage called decomposition by a
process called autolysis;
• in this process, the organic substances are broken down into
simpler organic matter.
• In order to prevent a body from decomposing, it is necessary to
deprive the tissues of moisture and oxygen.
• This can be done by the procedures of mummification. This
particular practice had started in ancient Egypt 3500 BCE.
Mummification was a ritual practice done by the ancient Egyptians
believing that there is life after death, and the preserved body is
required to live in their next world. This preserved body is called
mummy
• Those civilizations provided a significant contribution to
the field of forensic under medicine. This can be
considered as an example of autopsy in history or the
procedure that led to the development of autopsy to
determine the cause of death.5
• Ancient Greece, the origin of modern logic, medicine, and pharmacology,
should come as no surprise as the first major actor in forensic science.
The Ancient Greeks were able to establish the cause of a murder in a
basic way by examining toxins and their effects on the body, maybe the
first instance of recognized forensic science.
• Notable Greek autopsists were Erasistratus and Herophilus of
Chalcedon, who lived in 3rd century BC Alexandria, but in general,
autopsies were rare in ancient Greece.6
• The basis of the present judicial system was developed by the Ancient
Romans, who contributed to forensic science.
• Quintilian, a Roman orator, used forensics in court as early as the first
century.
• In an instructional judicial case authored by the Roman jurist
Quintilian or one of his students in the early 2nd century AD,
"The Wall of Handprints," and it features a blind son who is
accused of killing his father in his sleep to obtain his
inheritance. The blind man allegedly grabbed his sword from
his chamber, strolled across the house in the dark of night, into
his father and stepmother's bedroom, and killed his father once,
instantly killing him and not waking up his stepmother, who
discovered her husband dead in bed when she awakened.
From the parents' room to the blind son's room, a trail of bloody
handprints led back.
• Quintilian's
• proposed defense is that the stepmother did it because she was furious
that she would lose out on the father's riches if his blind son got it, so
she framed the blind man with his own father's blood:
• “It was the stepmother, yes, the stepmother who set this up with her
sure sight; it was she, with her right hand, who brought that poor blood
there and made the imprint of [her] hand [on the wall] intermittently!
• The wall bears the imprints of one palm, has them at intervals, with a
certain empty space in the middle, and everywhere the palm-print is
intact; a blind man, on the other hand, would have dragged his hands
[along the wall].”7
• Quintilian goes on to describe how the stepmother's grip on the
sword's hilt prevented her palm from getting blood on it, and how
the handprints along the wall - with an empty space in the middle -
suggest the person who killed the father was also the one who
made the prints. This is an example of a bloodstain pattern
interpretation that could be presented in court today.
• In general, the Romans appear to have been reasonably good in
bloodstain pattern analysis and reconstruction, despite their lack
of modern understanding of the properties and classification of
blood
• For centuries after the fall of the Roman Empire, court
justice was dormant. Forensic science got increasingly
abstract as a result of it.
• Pathology, on the other hand, was employed by the
ancient Chinese to solve crimes, contributing to the
development of forensic science at the time.
• They cleansed and studied the bodies of the deceased,
and they were even able to distinguish between accidents
and murders.
• By the thirteenth century, the first literature to determine cause of death
was written by Song Ci in China, and the literature work was named as
Xi Yuan Li (Asen 2017). This book is widely known as Collected Cases
of Injustice Rectified or Washing Away of Wrongs (Asen 2017).
• This book was written based on the real incidents and experiences that
are linked to his scientific knowledge to avoid injustice in the future.
Most of the topics covered are based on scientific knowledge, and few
of them are post‐mortem examination, emergency treatment, causes of
death, different kinds of death, procedures of receiving the victims after
hanging, etc.
• This book is considered as the handbook of coroners. - [judicial
officers].
Development of Forensic Science
• In general, we can take the 16th-19th centuries as the most developed
period of forensic science. But it is more understandable and
appropriate to touch on specific parts of forensic science to explore this
period.
• Firstly, medical practitioners were the first to collect information on the
cause and manner of death in 16th century Europe.
• Ambroise Paré, a French army surgeon, examined the effects of violent
death on internal organs in great detail.
• In addition, Fortunato Fidelis and Paolo Zacchia, two Italian surgeons,
created the groundwork for contemporary pathology. They were able to
do so by studying the changes in the body's structure as a result of
sickness.
• The relevance of forensic science increased with the advent of the 17th century, owing
to other scientific advancements.
• The achievements in the following specific areas are even more remarkable:
• A. Fingerprit Analysis
• Francis Galton and Edward Henry were the ones who put Herschel's fingerprinting
techniques into practice in criminal investigations.
• Sir Francis Galton pioneered the first fingerprint classification
method.[Fingerprints are classified into five categories: arch, tented arch, left loop, right
loop and whorl. The algorithm extracts singular points (cores and deltas) in a fingerprint
image and performs classification based on the number and locations of the detected
singular points.]
• After that, the direction, flow, pattern, and other characteristics in fingerprints were
employed by Sir Edward Henry, the commissioner of the Metropolitan Police of London,
to build a system.
Herschel's fingerprinting techniques
• The Indians knew for long that the handprints, known as the Tarija, were
inimitable (unique). The use of fingerprints as signatures by illiterate people
in India, introduced centuries ago, was considered by some people as
ceremonial only, till it was scientifically proved that identification from
fingerprints was infallible (Flawless, Perfect).
• Mathieu Orfila (1787 – 1853) considered to be the father of forensic
toxicology
• • Alphonse Bertillion (18953 – 1914) devised first system of personal
identification
• • Francis Galton (1822 – 1911) development of fingerprinting and
classification
• • Leone Lattes (1887 – 1954) discovered blood grouping
• • Calvin Goddard ( 1891 – 1955) ballistics comparisons
• • Albert O. Osborn (1858 – 1946) document examination
• • Walter C. McCrone (1916 – 2002) analytical technology
• • Hans Gross (1847 – 1915) application of scientific disciplines
• • Edmond Locard (1877 - 1966) Locard’s Exchange Principle
Relevance of Forensic Science in Indian Legal System