×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

  • 14 March, 2021

  • 15 Min Read

Cyber Forensics

Cyber Forensics

What is Cyber Forensics or Computer Forensics?

  • Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • Cyberforensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes.
  • Although still in its infancy, cyberforensics is gaining traction as a viable way of interpreting evidence.
  • Cyberforensics is also known as computer forensics.
  • The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Need for Cyber Forensics

  • Cyber Forensics is needed for the investigation of crime and law enforcement.
  • There are cases like hacking and denial of service (DOS) attacks where the computer system is the crime scene.
  • The proof of the crime will be present in the computer system.
  • The proofs can be browsing history, emails, documents, etc.
  • These proofs on the computer system alone can be used as evidence in the court of law to sort out allegations or to protect the innocent people from charges.

Procedures for Cyber Forensics

  • Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media.
  • Once the original media has been copied, it is locked in a safe or other secure facility to maintain its pristine condition. All investigation is done on the digital copy.

Here are the 7 steps about How the Cyber Forensics Experts work

  1. Copying the hard drive of the system under investigation.
  2. Verification of the copied data.
  3. Ensuring the copied data is forensically sound.
  4. Deleted files recovery.
  5. Finding data in free space.
  6. Performing keyword search.
  7. The technical report.
  • Investigators use a variety of techniques and proprietary software forensic applications to examine the copy, searching hidden folders and unallocated disk space for copies of deleted, encrypted, or damaged files.
  • Any evidence found on the digital copy is carefully documented in a "finding report" and verified with the original in preparation for legal proceedings that involve discovery, depositions, or actual litigation.
  • Computer forensics has become its own area of scientific expertise, with accompanying coursework and certification.

What does it cover?

  • Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for distribution, and are fueled by a desire to profit from another person's intellectual property or private information.
  • Cyberforensics can readily display a digital audit trail for analysis by experts or law enforcement.
  • Developers often build program applications to combat and capture online criminals; these applications are the crux of cyberforensics.

Resource Centre for Cyber Forensics (RCCF)

  • Resource Centre for Cyber Forensics (RCCF) is a pioneering institute, pursuing research activities in the area of Cyber Forensics.
  • The centre was dedicated to the nation by the then Honorable union minister in August 2008.

Objectives of RCCF:

  • Developing indigenous Cyber Forensics tools.
  • Providing training on Cyber Forensics to Law Enforcement Agencies (LEAs)
  • Providing technical support to LEAs for cybercrime investigation and analysis.
  • Supporting LEAs for setting up of Cyber Forensics Laboratories.

RCCF has identified the following thrust research areas:

  • Disk Forensics
  • Network Forensics
  • Mobile Device Forensics
  • Live Forensics.
  • Memory Forensics
  • Multimedia Forensics
  • Internet Forensics

Conclusion

People will rely on computers, for security, and there will be people who will break them. The world will need people who can stop this from happening and think as these hackers do. Therefore, the demand for security professionals will continue to rise and cyber forensics is an evergreen field.

Cyber Police in India: A Case study of Delhi

  • When Inspector Vijay Gahlawat joined the Delhi Police cyber cell in 2008, it comprised a small office in Malviya Nagar with two workstations and a team of around eight officers.
  • Thirteen years later, the force’s cyber unit is running full throttle from its very own National Cyber Forensic Laboratory (NCFL) and catering to technical investigation requirements of cases from across the country.
  • A major change came in 2011-12, when the number of workstations increased to around seven, and the office shifted to Mandir Marg, said Mr. Gahlawat.
  • In 2015, Deputy Commissioner of Police (Cyber Cell) Anyesh Roy joined the unit.
  • Six years ago, there was no dedicated institutional mechanism to attend to cybercrimes or even a dedicated platform to report them.
  • It was still under the Economic Offences Wing of the Delhi police, Mr. Roy said, adding: “Special units like Crime Branch and Special Cell had their own cyber cells but they only concentrated on their own needs. This cyber cell was taking care of headquarter-level requirements.”
  • In 2019, CyPAD was inaugurated and was brought directly under the Special Cell while the Economic Offences Wing remained a separate unit.
  • Mr. Roy, however, said the nature of complaints has mostly remained the same and only the platforms have changed. The two broad categories include: online harassment and online fraud. “In the last couple of years, the numbers of cas\es have increased under both heads, proportionally,” he said.
  • There are two aspects in a cybercrime investigation: digital footprint and money trail. The digital footprint, essentially involves investigating the platform used: the victim’s device and the suspect’s device.
  • “When it comes to platforms like Facebook, Google, Twitter, Instagram, we have to ask them for information. The difficulty for any law enforcement agency is that most of these platforms are foreign-based private entities and it’s a challenge to get information, but since 2018, the government at the highest level is following up with these platforms to ensure that they respond to these agencies,” he said.
  • Over the years, every district of the Capital has set up a separate cyber cell, apart from the CyPAD unit which constantly interacts with the district cyber cells.
  • The police are currently using Encase, Forensic Tool Kit (FTK), Universal Forensic Extraction Device (UFED) among other tools that are able to copy, analyse, and extract deleted information from most devices.
  • Citing an example, Mr. Gahlawat shared how the unit had been given a burnt and a damaged phone from a spot where a man was found murdered. “After deleted data from those phones were extracted, it turned out that the wife had killed the man,” he said.
  • With the current technology available with the police, data from over 40,000 types pf phone can be extracted, he said. Earlier, there was no way to extract deleted information, Mr. Roy said. “The FTK existed in 2008 as well but in a very primitive form,” Mr. Gahlawat said.
  • Another technology the department is proud of is malware and spyware-detection tools such as FireEye, which enables them to detect if a system is being attacked for spying.
  • “Previously, we did not have any technology to detect an infected or hacked system. This particular technology enables us to analyse the type of attack and where the information is being sent,” Mr. Roy said.
  • Since 2020, a technology that is widely being used during investigations is video and photograph enhancement.
  • It has proved to be a boon in probes related to last year’s communal riots. Currently, the force is using programmes called Amped Five and Kanescence for the purpose.
  • Giving an example, Mr. Gahlawat said that while investigating a kidnapping case, they managed to enhance a video grab from grainy CCTV footage to ascertain the number plate of a motorbike. “This helped the police trace the accused and rescue the child,” he said.
  • At present, the Delhi police have 10 dedicated labs, including memory forensics, mobile forensics, cloud forensics, network forensics, crypto forensics, malware forensics, image and video enhancement, damaged device labs for mobile and laptops, and audio forensics where not only officials from the Information Technology cadre are working but also domain experts have been hired from outside the force.
  • While the city police have come a long way from the “dark ages”, they still face some challenges, including retrieving encrypted data from locked devices and issue of privacy, which “enables service providers to wash their hands off when information is asked for”.
  • Another major challenge is the increased use of Virtual Private Network, which makes it tough to track online activities.

Source: TH


Sun, Solar Missions & Solar Phenomenon

Sun, Solar Missions & Solar Phenomenon Context: This topic is important for UPSE Prelims and Mains GS Paper3. Aurora An aurora also known as the polar lights or aurora polaris, is a natural light display in Earth's sky, predominantly seen in high-latitude regions (around the Arctic&nb

Changes in the Prompt Corrective Action norms for bank

Changes in the Prompt Corrective Action norms for banks Context: This topic is important for UPSE GS Paper 3. What will commercial banks under scrutiny need to do to get out of the restrictions imposed by the central bank? The story so far: The RBI issued a notification on November 2 revising norms for commercial banks to be placed under t

Study on Countries’ commitment on Climate Change

Study on Countries’ commitment on Climate Change Context: This topic is important for UPSE GS Paper 3. The findings, while optimistic, come amidst the deliberations underway at Glasgow. How effective are climate change pledges made by countries in containing global warming?  A study published Friday in the journal Science fin

National Investment and Manufacturing Zones (NIMZ)

About National Investment and Manufacturing Zones (NIMZ) The Government of India (GoI) has announced a National Manufacturing Policy, 2011, with the objective of enhancing the share of manufacturing in GDP to 25% within a decade and creating 100 million jobs. NIMZs are one of the important instruments to achieve it. As per the Policy, &ldqu

International Financial Services Centre (IFSC)

What is an International Financial Services Centre (IFSC)? An IFSC caters to customers outside the jurisdiction of the domestic economy.  Such centres deal with flows of finance, financial products and services across borders.  London, New York and Singapore can be counted as global financial centres. 

Students Achievement

Search By Date

Newsletter Subscription
SMS Alerts