CYBER CRIME
INVESTIGATION
WHAT IS CYBER CRIME?
The definition of Cyber Crime is expansive, which
includes any type of crime conducted through a
digital device or the internet network. Its most
distinctive nature from the traditional ones are
that they are anonymous and borderless.
TYPES OF CRIME CONDUCTED
TROUGH CYBERNET
Majorly all crimes in present times can and are
conducted using the cyberspace. Examples of
such crimes are: Crime against Government
Banking and credit card frauds
Pornography
Selling of illegal material such as weapons wildlife
Crime against property
and narcotics
Stealing of intellectual property- trademarks trade
secrets, copyright infringement, piracy
Defamation
Crime against persons
Stalking
Terrorism
Forgery
EFFECTS OF CYBER CRIME
Everything is connected to each other through the
intangible means of cyberspace. The collective impact
of cyber attack is staggering. Each year millions and
millions of dollars are being spent to protect and
repair systems affected from cyber attacks.
Cyber attacks have the ability to destroy vital
systems, disrupting and sometimes disabling the work
of hospitals, banks, financial institutions. These
attacks can be so dangerous and a potential threat
that they have an ability to even damage a countries
security system.
WHAT IS AN
INVESTIGATION
An investigation is a process for an effective search
of material and evidences to serve justice to the
victims of crime by bring an offender/criminal to
justice. A complete investigation includes searching,
interviews, interrogations, evidence collection and
their preservation.
In order to solve cyber crime it is crucial during
investigation to capture digital evidence that may be
found on computers, cloud network, servers, GPS
devices and mobile phones.
CORE INVESTIGATIVE
DOCTRINE
The C.I.D provides with a definitive national guidance that
are essential for a criminal investigation. The key
principles highlighted in the document are as follows:
A conceptual framework for all subsequent doctrine
developed for the Police Service
A way of promoting good practice amongst practitioners
A research agenda, by identifying investigative areas
where little or no definitive guidance currently exists
A way of identifying the skills and knowledge required
by practitioners which are reflected in the National
Occupational Standards (NOS) and PIP.
PROCEDURE FOR
INVESTIGATION
TECHNIQUES FOR
COLLECTING INFORMATION
Tracking cyber activities
IP tracking from ISP.
Analysing a web server log.
Tracking an e-mail account.
Recovering deleted evidence.
Cracking password.
Handling hidden data.
ROLE OF SOCIAL MEDIA IN
INVESTIGATION
Platforms such as Facebook, Twitter and blogs can
be used in investigations to gather evidences.
They provide with:
Photographs
location
Information about the people with whom the
suspect interacts
Thought process
Methods to record evidences
available on Social Media
Screenshots of Facebook post and Tweets
Using software such as Screencast to record
what the investigator is viewing in real time
Using tools to collect Metadata that can reveal
time stamps, IP addresses and other sensitive
information.
Hooking onto the APIs on Facebook
Ethics and Legal
Implications
Information available off the web is admissible as
evidence but only to the point of relevance.
Unrelated information can lead to ethical issues
and can be interpreted as violation of privacy.
Countries and states have different cyber
regulations that need to be observed during
investigations.
Methods For Examining The
Data
Interviews
Surveillance
Computer forensics
Undercover
EVALUATION OF EVIDENCE
Decision making
This process is it most important as life of a
person depends on it.
The collected evidence should be analyzed
properly to help make a correct decision.
The final decision should be supported with
enough evidence to provide a solid backing to
the decision.
Factors Affecting Decisions
Experience
Cognitive Biases
Age of the investigator
Individual perception
Escalation of commitment
THANK YOU