Download Foundations of digital Forensics

Document related concepts

Contaminated evidence wikipedia , lookup

Digital forensics wikipedia , lookup

Transcript
Foundations of digital Forensics
1
Computer Forensics
• Computer forensics is the scientific
examination and analysis of data held
on, or retrieved from, computer storage
media in such a way that the
information can be used as evidence in
a court of law.
2
Computer Forensic Activities
• Computer forensics activities commonly include:
– the secure collection of computer data
– the identification of suspect data
– the examination of suspect data to determine
details such as origin and content
– the presentation of computer-based information
to courts of law
– the application of a country's laws to computer
practice.
3
The 3 As
• The basic methodology consists of the
3 As:
– Acquire the evidence without altering or
damaging the original
– Authenticate the image
– Analyze the data without modifying it
4
Basic Definition
Cyber: According to the Oxford Dictionary cyber means relating to or
characteristic virtual reality. Law means the System of rules which a
particular country or community recognizes as regulating the actions of its
members and which it may enforce by the imposition of penalties.
Cyber Law & Cyber Law consists of?
Cyber Law is the law governing cyber space. The Information Technology
(Amendment) Act, 2008 deals with cases relating to cyber space. Cyber space
includes computers, networks, software, internet, websites, e-mails, data
storage devices like hard disks, USB disks, PDA’s, phones and ATM machines
and so on. Cyber Law consists of cyber crime, electronic and digital
signatures, intellectual property and data protection and privacy.
5
Cont..
• Computer crime: computer crime is a situations where a computer or
network was not directly involved in a crime but still contains digital
evidence related to the crime.
• Computer-related: computer-related is used to refer to any crime that
involves computers and networks, including crimes that do not rely
heavily on computers.
• some organizations such as the US Department of Justice and the Council
of Europe use the term cybercrime to refer to a wide range of crimes
that involve computers and networks.
6
Fundamental of Digital forensics
7
Language of Computer Crime Investigation
• Several attempts have been made to develop a standard language to
describe the various aspects of computer crime investigation.
• Computer crime mainly refers to a limited set of offenses that are
specifically defined in laws such US Computer Fraud and Abuse Act and
the UK Computer Abuse Act are computer crime acts which is defined
by US.
• These crimes include theft of computer services, unauthorized access
to protected computers, software piracy and the alteration or theft of
electronically stored information, extortion committed with the
assistance of computers, obtaining unauthorized access to records from
banks, credit card issuers, or customer reporting agencies, traffic in
stolen passwords and transmission of destructive viruses or commands.
8
Cont..
• One of the main difficulties in defining computer crime is that
situations arise where a computer or network was not directly
involved in a crime but still contains digital evidence related to the
crime.
• To accommodate this type of situation, the more general term
computer-related is used to refer to any crime that involves
computers and networks, including crimes that do not rely heavily
on computers.
• Notably some organizations such as the US Department of Justice
and the Council of Europe use the term cybercrime to refer to a
wide range of crimes that involve computers and networks.
9
Cont..
• Computer forensics : Computer forensics usually refers to the forensic
examination of computer components and their contents such as hard
drives, compact disks, and printers.
• Forensic entomology : forensic entomology as "bug forensics "only to
computers limits the scope of the term, neglecting important aspects of
the field such as communication systems, embedded systems, and digital
image, audio, and video analysis.
• Digital forensic science : to describe the field as a whole
• Digital evidence examination: . This term is specific enough to be clear in
the context of digital forensic science, computer forensics, incident
response, or any other situation that involves the examination of digital
evidence.
10
Digital Evidence in the Courtroom
• Individuals processing evidence must realize that, in addition to being
pertinent(relevant), evidence must meet certain standards to be
admitted.
• The US Federal Rules of Evidence, the UK Police and Criminal Evidence
Act (PACE) and Civil Evidence Act, and similar rules of evidence in other
countries were established to help evaluate evidence.
1. Admissibility-Warrants
• The most common mistake that prevents digital evidence from being
admitted by courts is that it was obtained without authorization.
• Generally, a warrant is required to search and seize(capture) evidence.
• The main exceptions are plain view, consent, and exigency.
• By obtaining consent to search, investigators can perform a search
without a warrant but some care must be employed when obtaining
consent to reduce the chance of the search being successfully
challenged in court.
11
2. Authenticity and Reliability
• The process of determining whether evidence is worthy is called
authentication.
• Authentication means satisfying the court that
(a) the contents of the record have remained unchanged,
(b) that the information in the record does in fact originate from its
purported(original) source, whether human or machine, and
(c) that extraneous information such as the apparent date of the record
is accurate.
•
Authentication is actually a two-step process, with an initial
examination of the evidence to determine that it is what its proponent
claims and, later, a closer analysis to determine.
•
In the initial stage, it may be sufficient for an individual who is familiar
with the digital evidence to testify to its authenticity. i.e. its probative
value.
•
Alternately, a system administrator can testify that log files presented in
12
court originated from her/his system.
3. Casey's Certainty Scale
•
•
•
•
•
•
•
Computers can introduce errors and uncertainty in various ways, making it
difficult to assess the trustworthiness of digital evidence meaningfully.
Although courts are warned to consider the computer systems involved carefully,
little guidance is provided.
Computer machinery may make error because of malfunctioning of hardware, the
computer's mechanical apparatus.
Computers may also make errors that arise out of defects in the software, the input
procedures, the database, and the processing program.
In view of the complex nature of the operation of computers, courts have been
cautioned to take special care to be certain that the foundation is sufficient to
warrant a finding of trustworthiness and that the opposing party has full
opportunity to Inquire(ask) into the process by which information is fed into the
computer.
The certainly values (C-values) provide a method for a digital evidence examiner to
denote the level of certainty he/she has in a given piece of evidence in a given
context.
The primary purpose of this Certainty Scale is to help others understand how
13 a
much weight an examiner has given pieces of digital evidence when making
Cont..
• One major advantage of this Certainty Scale is that it is flexible
enough to assess the evidential weight of both the process that
generated a piece of digital evidence and its contents, which may
be documents or statements.
• Another major advantage of this Certainty Scale is that it is nontechnical and therefore easily understood by non-technical people
such as those found in most juries.
14
4. Best Evidence
• When dealing with the contents of a writing, recording, or photograph
courts sometimes require the original evidence.
• This was originally intended to prevent a witness from misrepresenting
such materials by simply accepting their testimony(witness statement)
regarding the contents.
• With the advent of photocopiers, scanners, computers, and other
technology that can create effectively identical duplicates, copies
became acceptable in place of the original, unless "a genuine question is
raised as to the authenticity of the original or the accuracy of the copy
or under the circumstances it would be unfair to admit the copy of the
original"
• Because an exact duplicate of most forms of digital evidence can be
made, a copy is generally acceptable. In fact, presenting a copy of digital
evidence is usually more desirable because it eliminates the risk that
the original will be accidentally altered.
15
5. Direct versus Circumstantial Evidence
• Direct evidence establishes a fact. Circumstantial evidence may suggest
one. It is a common misconception that digital evidence cannot be direct
evidence because of its separation from the events.
•
However, digital evidence can be used to prove facts. For example, if the
reliability of a computer system is at issue, showing the proper
functioning of that specific system is direct evidence of its reliability,
whereas showing the proper functioning of an identical system is
circumstantial.
• Although digital evidence is generally only suggestive of human activities,
circumstantial evidence may be as weighty as direct evidence and digital
evidence can be used to firmly establish facts.
16
Cont..
• For example, a computer logon record is direct evidence that a
given account was used to log into a system at a given time but is
• circumstantial evidence that the individual who owns the account
was responsible. Someone else may have used the individual's
account and other evidence would be required to prove that he
actually logged into the system. It may be sufficient to demonstrate
that nobody else had access to the individual's computer or
password.
•
Alternately, other sources of digital evidence such as building
security logs may indicate that the account owner was the only
person in the vicinity of the computer at the time of the logon.
17
6.Hearsay
•
Digital evidence might not be admitted if it contains hearsay because
the speaker or author of the evidence is not present in court to verify
its truthfulness.
•
Evidence is hearsay where a statement in court repeats a statement
made out of court in order to prove the truth of the content of the out
of court statement. Similarly, evidence contained in a document is
hearsay if the document is produced to prove that statements made in
court are true.
•
The evidence is excluded because the crucial aspect of the evidence,
the truth of the out of court statement (oral or documentary), cannot
be tested by cross-examination.
18
Cont..
• There are several exceptions to the hearsay rule to accommodate evidence
that portrays( pictures ) events quite accurately and that is easier to verify than
other forms of hearsay.
• Although some courts evaluate all computer-generated data as business
records under the hearsay rule, this approach may be inappropriate when a
person was not involved.
•
In fact, computer-generated data may not considered hearsay at all because
they do not contain human statements or they do not assert a fact but simply
document an act.
19
7.Scientific Evidence
• In addition to challenging the admissibility of digital evidence directly, tools and
techniques used to process digital evidence have been challenged by evaluating
them as scientific evidence. Because of the power of science to persuade,
courts are careful to assess the validity of a scientific process before accepting
its results.
• If scientific process is found to be questionable, this may influence the
admissibility or weight of the evidence, depending on the situation.
• In the United States, scientific evidence is evaluated using four criteria
developed in 1993. These criteria are:
a) whether the theory or technique can be (and has been) tested;
b) whether there is a high known or potential rate of error, and the existence and
maintenance of standards controlling the technique's operation;
c)whether the theory or technique has been subjected to peer review and
publication;
d) Whether the theory or technique enjoys "general acceptance" within the
relevant scientific community.
20
8. Presenting Digital Evidence
• Preparation is one of the most important aspects of testifying in court (National
Center for Forensic Science 2003).
• Conclusions should be stated early in testimony rather than as a punch line at
the end because there is a risk that the opportunity will not arise later.
• During cross-examination, attorneys (lawyer) often attempt to point out flaws
and details that were overlooked by the digital investigator. The most effective
response to this type of questioning is to be prepared with clear explanations
and supporting evidence.
• In addition to presenting findings, it is necessary to explain how the evidence
was handled and analyzed to demonstrate chain of custody and thoroughness
of methods. Also, expect to be asked about underlying technical aspects in a
relatively non-technical way, such as how files are deleted and recovered and
how tools acquire and preserve digital evidence. Simple diagrams depicting
these processes are strongly recommended.
21
• Cyber crime Law: United State Perspective,
Indian Perspective, Conductive Digital
Investigation, Handling a Digital Crime Scene:
Principles, Preservation,
22
4. Cyber crime Law: United State Perspective
• Chapter reviews how law in the United States deals
cybercrime. As the United States is a federal system, there are
two basic levels of cybercrime law: federal cybercrime law
and state cybercrime law.
• U.S. law deals with the major cybercrimes: the crimes that
target computers and computer systems (e.g., unauthorized
access, malware, and denial of service attacks) and the crimes
in which computers and computer systems are used as tools
to commit traditional crimes (e.g., fraud, extortion, and child
pornography).
• Federal Cybercrime Law
• State Cybercrime Law
• Constitutional Law
• Fourth Amendment
• Fifth Amendment and Encryption
23
1. Federal Cybercrime Law
4.1 Computer Fraud and Abuse Act
• It focuses on the Computer Fraud and Abuse Act such as identity
theft, child pornography, and copyright and trademark offenses.
• Congress adopted the Computer Fraud and Abuse Act (1986), but it
has since been amended on several occasions.
• amendments have all been designed to update certain provisions
of the Act in light of advancements in computer technology
• Section 1030(a) makes it a federal crime to do any of the following:
1. Knowingly access a computer without authorization or exceed
authorized access and obtain information that is legally protected
against disclosure.
2. Intentionally access a computer without authorization or exceed
authorized access and obtain information from (i) a financial
institution, credit card company, or consumer reporting agency.
3. With the intent to extort money or any thing of value like
(i) threat to damage a computer, (ii) threat to obtain information from,
24
4.1.1 Section 1030(a)(5) Offense: accounts for the largest number of
prosecutions(legal proceeding against person), perhaps because it
creates three crimes. The first consists of knowingly transmitting a
program, information, code, or command and thereby intentionally
damaging a protected computer. Other two are hacking, or
unauthorized access, to a computer or computer system.
4.1.2 Section 1030(a)(4) Offense: As noted above, § 1030(a)(4) makes
it a federal crime to access a protected computer without being
authorized to do so, or by exceeding the scope of authorized
access, and obtain “anything of value” and thereby further a
scheme to defraud.
4.1.3 Section 1030(a)(6) Offense : makes it a crime to traffic “in any
password or similar information through which a computer may be
accessed without authorization” if either of two conditions are met.
The first is “affects interstate or foreign commerce”; the other
condition is that the computer is “used by or for the Government of
the United States.”
4.1.4 Section 1030(a)(7) Offense: criminalizes the use of computer
25
technology to commit extortion.
4.2 Identity Theft: The federal criminal code contains two identity
theft provisions: Section 1028(a)(7) of Title 18 of the U.S. Code
defines a basic identity theft offense. makes it a federal crime to
knowingly transfer, possess, or use “a means of identification of
another person” without being authorized.
4.4 Copyright Infringement(against law)(Section 506(a))
Copyright infringement in the form of software piracy is a crime. For
a work to be “original,” it must have “originated” with—have been
created by—the author claiming the copyright; originality does not
require novelty but to be original an item cannot simply be a copy
of another.
4.5 Trademarks and Trade Secrets
The Lanham Act is the primary source of protection for trademarks
(Act of July5, 1946). It defines “trademark” as “any word, name,
symbol, or device, or any combination thereof” that is used by a
person or which a person has a bonafide intention to use in
commerce “to identify and distinguish his or her goods from those
manufactured or sold by others and to indicate the source of the
goods, even if that source is unknown” (15 U.S. Code § 1127).
26
2. State cybercrime law
4.2.1 Access Crimes: Every U.S. state prohibits simple hacking (gaining
unauthorized access to a computer) and aggravated hacking (gaining
unauthorized access to a computer for the purpose of committing
theft, vandalism, or other crimes)
4.2.2 Malware: Computer contaminant” means any set of computer
instructions that are designed to modify, damage, destroy, record, or
transmit information within a computer, computer system, or
computer network without the intent or permission of the owner of
the information.
4.2.3 Denial of Service: DDoS attack as “techniques or actions involving
the use of one (1) or more damaged computers to damage another
computer or a targeted computer system in order to shut the
computer or computer system down and deny the service of the
damaged computer or computer system to legitimate users”.
4.2.4 Computer Forgery: “Any person who creates, alters, or deletes any
data contained in any computer or computer network, who, if such
person had created, altered, or deleted a tangible document or
instrument would have committed forgery … shall be guilty of the
27
crime of computer forgery”.
4.2.5 Computer Fraud and Theft: Computer theft can encompass any
of several different crimes, including information theft, software
theft, computer hardware theft, and theft of computer services. It
can also encompass the theft of computer hardware . And it can
consist of using a computer to steal other types of property.
4.2.6 Computer Extortion: One approach they take is to include
computer extortion within the definition of computer fraud.
4.2.7 Crimes Against Children:
3 Constitutional law
• In the United States, constitutional law exists at two levels:
The U.S. Constitution is the constitution that applies throughout the
territorial
Two of the U.S. Constitution’s provisions are particularly relevant to
the conduct of cybercrime investigations.
The Fourth Amendment & Fifth Amendment
28
4. Fourth Amendment
• The Fourth Amendment creates a right to be free from
“unreasonable” searches and seizures(forcefully taking ownership)
• To be “reasonable,” a search or seizure must be conducted either
a lawfully authorized search or arrest warrant.
• Court has applied the Fourth Amendment to areas in which
technology and privacy intersect.
4.4.1 Wiretapping: Content of Communications
The progress of science is not likely to stop with wire tapping. Ways
may be developed by which the government, without removing
papers from secret drawers, can reproduce them in court, and
expose to a jury the most intimate occurrences of the home. Can it
be that the Constitution affords no protection against such fraud.
4.4.2 Wiretapping: Traffic Data
• In a subsequent decision, the Supreme Court dealt with the related
issue of whether the transmittal information—the traffic data—
generated by a telephone call is private under the Fourth Amendme29
4.4.3 Technology Not in General Public Use
The Supreme Court’s 2001 decision in Kyllo v. United States is its
most recent parsing of the Katz standard. The issue in Kyllo was
whether “the use of a thermal- imaging device aimed at a private
home from a public street to detect relative amounts of heat within
the home constitutes a ‘search’ within the meaning of the Fourth
Amendment”
5 Fifth Amendment and encryption
• The Fifth Amendment states that no one can be “forcefully to be a
witness against himself”
• The Fifth Amendment privilege only comes into play when following
element is present. The first is compulsion(power to force a person
to act); the Fifth Amendment does not protect communications
that are made voluntarily;
• The compulsion must seek to extort “testimony”—oral or written
communications—from an individual because the Fifth Amendment
privilege does not encompass physical evidence
30
• One area in which the Fifth Amendment can come into play
involves the use of encryption.
• Encryption can be used to protect the contents of online
communications or data files stored in a computer or on other
storage media. If files are encrypted with an essentially unbreakable
encryption algorithm;
• If the owner of the files committed the key to memory, then he/she
can claim the Fifth Amendment privilege and refuse that fraud.
31
Conducting Digital Investigation
Digital investigations inevitably vary depending on technical factors
such as the type of computing or communications device, whether the
investigation is in a criminal, civil, commercial, military, or other
context, and case-based factors such as the specific claims to be
investigated.
6.1 Digital Investigation Process Models
• describe how one conducted a digital investigation tended to focus
on practical stepwise approaches to solving particular investigative
challenges, within the context of particular technical computing
environments.
• Proposal of a number of models for describing investigations, which
have come to be known as “process models.”
• motivations
1. models serve as useful points of reference for reflecting on the state
and nature of the field
2. framework for training and directing research,
3. for benchmarking performance against generally accepted practice.32
• Process models have defined as linear process.
• For example, in 1999, McKemmish defined forensic computing as:
The process of identifying, preserving, analyzing and presenting digital
evidence in a manner that is legally acceptable.
• This activities are the basis of the process model
• Figure 6.1. The most common steps for conducting a complete and competent
digital investigation are:
1. Preparation: Generating a plan of action to conduct an effective
Digital investigation, and obtaining supporting resources and materials.
2. Survey/Identification: Finding potential sources of digital evidence (e.g., at a
crime scene, within an organization, or on the Internet).
3. Preservation: Preventing changes of in situ digital evidence, including isolating
the system on the network, securing relevant log files, and collecting volatile
data that would be lost when the system is turned off. This step includes
subsequent collection or acquisition.
4. Examination and Analysis: Searching for and interpreting trace evidence. Some
process models use the terms examination and analysis interchangeably.
5. Presentation: Reporting of findings in a manner which satisfies the context of
the investigation, whether it be legal, corporate, military, or any other.
33
34
6.1.1 Physical Model
• The overall process model has 17 phases organized into five groups:
Readiness, Deployment, Physical Crime Scene Investigation, Digital
Crime Scene Investigation, and Presentation, summarized in Table
6.1 for both physical and digital investigations.
• (Carrier & Spafford, 2004) said that
• A computer being investigated can be considered a digital crime
scene and investigations as a subset of the physical crime scene
where it is located. Physical evidence may exist around a server that
was attached by an employee and usage evidence may exist around
a home computer that contains contraband. Furthermore, the end
goal of most digital investigation is to identify a person who is
responsible and therefore the digital investigation needs to be tied
to a physical investigation.
35
36
• 6.1.2 Staircase Model
• sequence of ascending stairs in Figure 6.2, provides a practical and
methodical approach to conducting an effective digital investigation
(Casey & Palmer, 2004).
• Steps are defined from bottom to top in a systematic, determined
manner in an effort to present a compelling story after reaching the
final step of persuasion/testimony.
• The categories in Figure 6.2 are intended to be as generic as possible.
The unique methods and tools employed in each category tie the
investigative process to a particular forensic domain. The terms located
on the riser of each step are those more closely associated with the law
enforcement perspective.
• the steps in this process often proceed simultaneously and it may be
necessary to take certain steps more than once at different stages of an
investigation.
• Finally, as with most processes, there is a relationship between
successive steps. That relationship can often be described by the input
37
and output expected at each stage,
38
6.1.3 Evidence Flow Model
• The main goal of this model is to completely describe the flow of
information in a digital investigation, from the moment digital
investigators are alerted until the investigation reaches its
conclusion.
• By concentrating on the flow of information, appropriate controls
can be implemented at each step of the process to handle
evidentiary data, written reports, or communications relating to the
investigation.
6.1.4 Subphase Model
• Beebe and Clark contend that most investigative process models
are too high level and do not address the “more concrete principles
of the investigation”. Their solution is to create a multitiered
framework, taking the steps common in other models and adding
subphases with defined objectives to help investigators implement
each step properly.
39
• As a proof of concept, Beebe and Clark use the analysis process, providing
three objectives-based subphases, namely, survey, extract, and examine
with the following objectives for file system analysis:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
1. Reduce the amount of data to analyze
2. Assess the skill level of the suspect(s)
3. Recover deleted files
4. Find relevant hidden data
5. Determine chronology of file activity
6. Recover relevant ASCII data
7. Recover relevant non-ASCII data
8. Ascertain Internet (non-e-mail) activity history
9. Recover relevant e-mail and attachments
10. Recover relevant “personal organizer” data (e.g., calendar, address
books, etc.)
11. Recover printed documents
12. Identify relevant software applications and configurations
13. Find evidence of unauthorized system modification (e.g., Trojan
applications)
14. Reconstruct network-based events
40
6.1.5 Roles and Responsibilities Model
• The FORZA model ascends to an even higher level of abstraction by
providing a framework of roles and responsibilities in digital
investigations. The goal of this framework is to address not just the
technical aspects of a digital investigation but also the legal and
managerial issues.
6.2 Scaffolding for Digital Investigations
• Although such occurrences and activities are not central to digital
investigations, they provide necessary scaffolding to help build a
solid case. This scaffolding also includes accusation/alert,
threshold considerations, and case management.
• In addition, digital investigators will generally have to make some
form of threshold assessment to decide what level of attention to
give a certain case relative to all of the other cases they are
handling.
41
6.2.1 Incident Alert
Every process has a starting point—a place, event, or for lack of a better
term, a “shot from a starting gun” that signals that the race has begun.
6.2.2 Authorization
Before approaching digital evidence, it is important to be certain that the
search is not going to violate any laws
6.2.3 Threshold Considerations
digital investigators must establish thresholds in order to prioritize cases
and make decisions about how to allocate resources.
6.2.4 Transportation
Moving evidence from the crime or incident scene back to the forensic
laboratory effects of which range from loss of confidentiality to
destruction of evidence.
6.2.5 Verification
• Assessing the completeness and accuracy of acquired data and
documenting its integrity are important
6.2.6 Case Management
• Helps to binding together all of the activities and outcomes.
42
6.3 Applying the Scientific Method in Digital evidence
• Although process models that define each step of an investigation
can be useful for certain purposes, such as developing procedures,
they are too complex and rigid to be followed in every investigation.
• All steps of the investigative process are often intertwined and a
digital investigator may find the need to revisit steps in light of a
more refined understanding of the case.
6.3.1 Formation and Evaluation of Hypotheses
6.3.2 Preparation
6.3.3 Survey
6.3.4 Preservation
6.3.5 Examination
6.3.6 Analysis
6.3.7 Reporting and Testimony
43
•
•
6.4 Investigative Scenario: Security Breach
An investigative scenario involving a network security breach is outlined here
to demonstrate how the various steps in a digital investigation tie together.
6.4.1 Preparation and Case Management
IT help desk.
6.4.2 Accusation or Incident Alert
• unusually high numbers of failed logon attempts to a server it confirms
that there has been unauthorized use of the administrator account on the
system
6.4.3 Assessment of Worth
• most valuable intellectual property.
6.4.4 Authorization
•
Developing situation and obtains approval to gather evidence and report back any
findings.
6.4.5 Survey
• digital investigators would waste
• substantial time and effort trying to locate sources of digital evidence, and
• might ultimately find that there was insufficient information to reach any
• conclusions
44
6.4.6 Preservation
6.4.7 Transportation
6.4.8 Examination
6.4.9 Analysis
6.4.10 Reporting
45
INFORMATION TECHNOLOGY (AMENDED) ACT,
2008
• New communication systems and digital technology have made dramatic
changes in the way.
• Businessmen are increasingly using computers to create, transmit and
store information in electronic form instead of traditional paper
documents. It is cheaper, easier to store and retrieve and speedier to
communicate.
• Electronic commerce eliminates need for paper based transactions.
• The Law of Evidence is traditionally based upon paper-based records and
oral witness. Hence, to facilitate e-commerce, the need for legal changes.
• The legal recognition to electronic records and digital signatures in turn
will facilitate through the electronic communication like Internet.
• In May 2000 Indian Parliament passed the Information Technology Bill and
came to be known as the Information Technology Act, 2000. Cyber laws
are contained in the IT Act, 2000.
46
Cont..
• This Act was amended by Information Technology Amendment Bill 2006,
passed in Loksabha on Dec 22nd and in Rajyasbha on Dec 23rd of 2008.
• Objectives of the IT 2008 Act are:
·Carried out by means of electronic data interchange, and other means of
electronic communication, commonly referred to as "electronic
commerce“
· To facilitate electronic filing of documents with Government departments
· To facilitate electronic storage of data
· To facilitate and give legal sanction to electronic fund transfers between
banks and financial institutions
· To give legal recognition for keeping of books of accounts by banker’s in
electronic form.
· To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker’s
Book Evidence Act, 1891, and the Reserve Bank of India Act, 1934.
47
Important section of IT act
• Section 1:
It shall extend to the whole of India and, save as otherwise provided in
this Act, it applies also to any offence committed outside India by any
person.
• Section 2: Definitions
(a) "Access"
(b) "Addressee"
(c) “Affixing Electronic Signature"
(d) "Asymmetric Crypto System"
(e) "Certifying Authority" means a person who has been granted a license to
issue a Electronic Signature Certificate.
(f) "Communication Device"
(g) "Computer"
(h) “Computer network“
(i) "Computer Resources“ means computer, communication device,
computer system, computer network, data, computer database or
software;
48
(j) "Controller" means the Controller of Certifying Authorities
(k) "Data" means a representation of information, knowledge, facts,
concepts or instructions
• Section 3: Defines Digital Signatures
The authentication to be affected by use of asymmetric crypto system
and hash function
• Section 4 Legal Recognition of Electronic Records
Where any law provides that information or any other matter shall
be in writing or in the typewritten or printed form, then,
notwithstanding anything contained in such law, such requirement
shall be deemed to have been satisfied if such information or
matter is
(a) rendered or made available in an electronic form; and
(b) accessible so as to be usable for a subsequent reference
49
• Section 5: Legal recognition of Electronic Signature
• Section 6: Use of Electronic Records and Electronic Signature in
Government and its agencies
Where any law provides for
1. the filing of any form
2. the issue or grant of any license,
3. the receipt or payment of money in a particular manner,
• Section 7 : Retention of Electronic Records
• Section 8: Publication of rules, regulation, etc, in Electronic
Gazette
• Section 11: Attribution of Electronic Records
An electronic record shall be attributed to the originator
• Section 12: Acknowledgement of Receipt
• Section 14: Secure Electronic Record
50
• Section 16 : Security procedures and Practices (Amended vide
ITAA 2008)
The Central Government may for the purposes of sections 14 and 15
prescribe the security procedures.
It is regard to the commercial circumstances, nature of transactions
and such other related factors as it may consider appropriate.
• Section 17: Appointment of Controller and other officers
• Section 18: The Controller may perform all or any of the following
functions, namely
(a) exercising supervision over the activities of the Certifying
Authorities;
(b) certifying public keys of the Certifying Authorities
(c) laying down the standards to be maintained by the Certifying
Authorities;
(d) specifying the qualifications and experience which employees of
the Certifying Authorities should possess;
(e) specifying the conditions subject to which the Certifying Authorities
51
shall conduct their business;
• Section 21: License to issue electronic signature certificates
• A license granted under this section shall –
• (a) be valid for such period as may be prescribed by the Central
Government;
• (b) not be transferable
• (c) be subject to such terms and conditions as may be specified by
the regulations.
• Section 23: Renewal of license
• Section 29: Access to computers and data
• Section 37: Suspension of Digital Signature Certificate
• Section 40: Generating Key Pair
• Section 43: Penalty for damage to computer, computer system,
etc
If any person without permission of the owner or any other
person who is in charge of a computer, computer system or
computer network 52
(a) accesses or secures access to such computer, computer system or
computer network or computer resource (ITAA2008)
(b) downloads, copies or extracts any data, computer data base or
information from such computer, computer system or computer
network including information or data held or stored in any
removable storage medium;
(c) introduces or causes to be introduced any computer contaminant
or computer virus into any computer, computer system or
computer network;
• Section 52: Salary allowance and other terms and conditions of
service of Chairperson and Member.
The salary and allowances payable to, and the other terms and
conditions of service including pension, gratuity and other
retirement benefits
• Section 53: Filling up of vacancies (Amended vide ITAA 2008)
If, for reason other than temporary absence, any vacancy occurs in the
office of Chairperson or Member as the case may be then the
Central Government shall appoint another person in accordance
with the provisions of this Act
53
• Section 62: Appeal to High court
Any person aggrieved by any decision or order of the Cyber authority
may file an appeal to the High Court within sixty days from the date
of communication of the decision or order of the Cyber Appellate
Tribunal to him on any question of fact or law
• Section 65: Tampering with Computer Source Documents
shall be punishable with imprisonment up to three years, or with fine
which may extend up to two lakh rupees, or with both.
• Section 66: Computer Related Offences (Substituted vide ITAA
2008)
imprisonment for a term which may extend to two three years or with
fine which may extend to five lakh rupees or with both.
• Section 71 Penalty for misrepresentation
imprisonment for a term which may extend to two years, or with fine
which may extend to one lakh rupees, or with both
• Section 85 Offences by Companies
54
Modus Operandi
• Modus operandi (MO) is a Latin term that means "a method of
operating." It refers to the behaviors that are committed by a
criminal for the purpose of successfully completing an offense.
• A criminal's MO consists of learned behaviors that can evolve and
develop over time.
• It can be refined, as an offender becomes more experienced,
sophisticated, and confident.
• It can also become less competent and less skilful over time,
decompensating by virtue of a deteriorating mental state, or
increased used of mind-altering substances.
• an offender's MO behavior is functional by its nature. It most often
serves (or fails to serve) one or more of three purposes:
 protects the offender's identity;
 ensures the successful completion of the crime;
55
 facilitates the offender's escape.
Motive & Technology
• The term motive refers to the emotional, psychological, or material
need that impels, and is satisfied by, a behavior. Criminal motive is
generally technology independent.
• Classifying offenders - to classifying offense behaviors (turning it
from an inductive labeling system to a deductive tool). They include
the following types of behaviors:
 Power Reassurance
 Power Assertive
 Anger Retaliatory (Sadistic)
 Opportunistic and Profit oriented.
56
Thank You
57