Professional Documents
Culture Documents
• Recent Crimes
occurs in a virtual-
world and therefore
presents different
issues
Cyber-crime
Think
Before u
click
Is your information secure?
Types of Cyber Crimes
• Hacking
• Software Piracy
• Pornography
• Forged Documents
• Credit Card Fraud
• Cyber stalking
• Phishing
DIGITAL FORENSICS
Digital Forensics
Tape Authentication
Cyber Mobile Speaker
&
Forensics Forensics Identification
Video Examination
DIGITAL FORENSICS
Forensics
Real-world & Virtual- world
Forensics Lab
Preservation
Presentation
Analysis
Scene of Crime
Acquisition
Authentication
Seizure
Identification
Cyber Forensics:
❑ IMEI/ESN
❑ Short Dial Numbers
❑ Text/Multimedia Messages
❑ Settings (language, date/time, etc)
❑ Stored Audio Recordings
❑ Stored images/multimedia
❑ Stored Computer Files
❑ Logged incoming calls and dialled numbers
❑ Stored Executable Programs (eg J2ME, apks)
❑ Stored Calendar Events
❑ GPRS, WAP and Internet settings
Audio –Video
Forensics
Definition
❑Political attacks
❑Blackmail
❑Disputes
❑Fraud Insurance claims
❑Infidelity
❑Harassment etc.
TAPE AUTHENTICATION & VIDEO EXAMINATION
⮚ Audio/Video authentication
Audio / Video Authentication is a process that is
used to ascertain the trustworthiness of a digital
or analog recording. In other words, it ensures
the integrity of recording and verifies that the
audio/video recorded using it has not been
tampered/altered/doctored.
Audio Forensics
⮚ Speaker Identification:
Identifying a person solely by their speech.
?
Whose voice is this?
?
Speaker Identification
Voice print
Spectrograph
Formant
Frequency
Video Examination & Image Enhancement