You are on page 1of 32

DIGITAL FORENSICS

DR. DEEPTI PURANIK


Real World & Virtual World
• Current approaches
evolved to deal with
real- world crime

• Recent Crimes
occurs in a virtual-
world and therefore
presents different
issues
Cyber-crime

Think
Before u
click
Is your information secure?
Types of Cyber Crimes
• Hacking
• Software Piracy
• Pornography
• Forged Documents
• Credit Card Fraud
• Cyber stalking
• Phishing
DIGITAL FORENSICS

Digital Forensics

Tape Authentication
Cyber Mobile Speaker
&
Forensics Forensics Identification
Video Examination
DIGITAL FORENSICS

Digital forensics pertains to the analysis of all


forensic and non-forensic applications and
investigations related to Digital storage media.
Cyber

Forensics
Real-world & Virtual- world

• Current approaches evolved to deal


with real-world crime
• Cybercrime occurs in a virtual-
world and therefore presents
different issues
What is Computer Crime
“Unlawful acts wherein the computer is either a tool
or a target or both".
Two aspects:
•Computer as a tool to commit crime Child porn,
Threatening email, identity theft, sexual harassment,
defamation, phishing.
•Computer itself becomes target of crime
Viruses, worms, software piracy, hacking.
Computer Forensics-Steps

Forensics Lab
Preservation

Presentation

Analysis
Scene of Crime

Acquisition

Authentication

Seizure

Identification
Cyber Forensics:

It is Identification, Extraction, Analysis, Preservation, Documentation,


and Presentation of Digital Evidence in a manner that is legally
acceptable using well-defined methodologies and procedures.
Mobile Forensic

• Now-a-days mobile phones are frequently seized as prime


crime exhibits.
• Mobile phones are used in the crimes like –
❑ Threatening or extortion calls
❑ Obscene Messages
❑ To send/receive/store messages containing obscene
picture images or video files
❑ Sports betting
❑ Terrorist & Naxalite activities
Mobile Forensics:

Cell / Mobile phone forensics is the science of


retrieving data from a mobile phone under
forensically sound conditions. This includes
retrieval and examination of data found on the
following :

❑ The Subscriber Identity Module


❑ The Mobile Station
❑ The Core Network
The Differences
• Computer Forensics: – Only a Few Major Operating
System Standards: Windows, Mac, Linux. Standard
practice is to image the Hard drive and Examine Data.

• Cell Phone Forensics: – Multiple Operating Systems.


Various Communication Standards. Each manufacturer
has their own OS: Communication Standards Evolving.
Connection/Cable challenge.

• Mobility Aspect: - Phones are live things roaming


around. It’s not just about what’s on the device, but
where has it been?
Mobile Evidence
Dependent on the model, includes;

❑ IMEI/ESN
❑ Short Dial Numbers
❑ Text/Multimedia Messages
❑ Settings (language, date/time, etc)
❑ Stored Audio Recordings
❑ Stored images/multimedia
❑ Stored Computer Files
❑ Logged incoming calls and dialled numbers
❑ Stored Executable Programs (eg J2ME, apks)
❑ Stored Calendar Events
❑ GPRS, WAP and Internet settings
Audio –Video

Forensics
Definition

Authentic Recording- “…a recording made


simultaneously with the acoustic events it purports to
have recorded, and in a manner fully and completely
consistent with the method of recording claimed by
the party who produced the recording; a recording
free from unexplained artifacts, alterations,
deletions, or edits.”
Audio Authentication
Motive behind Tampering of recording:

❑Political attacks
❑Blackmail
❑Disputes
❑Fraud Insurance claims
❑Infidelity
❑Harassment etc.
TAPE AUTHENTICATION & VIDEO EXAMINATION

⮚ Audio/Video authentication
Audio / Video Authentication is a process that is
used to ascertain the trustworthiness of a digital
or analog recording. In other words, it ensures
the integrity of recording and verifies that the
audio/video recorded using it has not been
tampered/altered/doctored.
Audio Forensics
⮚ Speaker Identification:
Identifying a person solely by their speech.

The Voice Identification


Technique is widely being
used in most of the cases
in crime investigation.
SPEAKER / VOICE IDENTIFICATION

Goal: To extract the information recorded in the form of speech


signal uttered by the speaker.

?
Whose voice is this?

?
Speaker Identification

⮚It means identifying a person solely by their speech.


⮚The aim of speaker identification is to compare the
sample from the unknown speaker with the known set of
samples, and determine whether it was produced by any of
the known speakers.
Audio Forensics

Voice print

Spectrograph

Formant
Frequency
Video Examination & Image Enhancement

❑ CCTV Footages, Stabilizing, Image Enhancement, Theft in dark,


Morphing etc
❑ Cases of theft in dark

❑ Enhancement of license (number) plate of suspicious vehicles.


Benefits of Ethical Hacking
• Ethical Hacking sometimes called as
Penetration Testing is an act of
intruding/penetrating into system or
networks to find out threats, vulnerabilities in
those systems which a malicious attacker
may find and exploit causing loss of data,
financial loss or other major damages.
• The purpose of ethical hacking is to improve
the security of the network or systems by
fixing the vulnerabilities found during testing.
• Ethical hackers may use the same methods
and tools used by the malicious hackers but
with the permission of the authorized person
for the purpose of improving the security and
defending the systems from attacks by
malicious users.
Benefits of Ethical Hacking
• Discovering vulnerabilities from an attacker’s
POV so that weak points can be fixed.
• Implementing a secure network that prevents
security breaches.
• Defending national security by protecting
data from terrorists.
• Gaining the trust of customers and investors
by ensuring the security of their products and
data.
• Helping protect networks with real-world
assessments.
TOI Dated 21.11.2016
CASE STUDY
• A tiny village named Jamtara in
Jharkand, has emerged as the centre, in
a series of banking frauds. By posing as
bank representatives, a gang of seven
members ask people for their account
details and in turn siphon off large sums
of money. Police have busted a
countrywide network of crooks who had
duped more than a thousand people by
posing as customer care representatives
of banks.
THANK
YOU

You might also like