Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

CYBER CRIME

INVESTIGATION
WHAT IS CYBER CRIME?
The definition of Cyber Crime is expansive, which
includes any type of crime conducted through a
digital device or the internet network. Its most
distinctive nature from the traditional ones are
that they are anonymous and borderless.
TYPES OF CRIME CONDUCTED
TROUGH CYBERNET
Majorly all crimes in present times can and are
conducted using the cyberspace. Examples of
such crimes are: Crime against Government
Banking and credit card frauds

Pornography

Selling of illegal material such as weapons wildlife


Crime against property
and narcotics

Stealing of intellectual property- trademarks trade


secrets, copyright infringement, piracy

Defamation
Crime against persons
Stalking

Terrorism

Forgery
EFFECTS OF CYBER CRIME
Everything is connected to each other through the
intangible means of cyberspace. The collective impact
of cyber attack is staggering. Each year millions and
millions of dollars are being spent to protect and
repair systems affected from cyber attacks.

Cyber attacks have the ability to destroy vital


systems, disrupting and sometimes disabling the work
of hospitals, banks, financial institutions. These
attacks can be so dangerous and a potential threat
that they have an ability to even damage a countries
security system.
WHAT IS AN
INVESTIGATION
An investigation is a process for an effective search
of material and evidences to serve justice to the
victims of crime by bring an offender/criminal to
justice. A complete investigation includes searching,
interviews, interrogations, evidence collection and
their preservation.

In order to solve cyber crime it is crucial during


investigation to capture digital evidence that may be
found on computers, cloud network, servers, GPS
devices and mobile phones.
CORE INVESTIGATIVE
DOCTRINE
The C.I.D provides with a definitive national guidance that
are essential for a criminal investigation. The key
principles highlighted in the document are as follows:

A conceptual framework for all subsequent doctrine


developed for the Police Service

A way of promoting good practice amongst practitioners

A research agenda, by identifying investigative areas


where little or no definitive guidance currently exists

A way of identifying the skills and knowledge required


by practitioners which are reflected in the National
Occupational Standards (NOS) and PIP.
PROCEDURE FOR
INVESTIGATION
TECHNIQUES FOR
COLLECTING INFORMATION
Tracking cyber activities

IP tracking from ISP.


Analysing a web server log.
Tracking an e-mail account.
Recovering deleted evidence.
Cracking password.
Handling hidden data.
ROLE OF SOCIAL MEDIA IN
INVESTIGATION
Platforms such as Facebook, Twitter and blogs can
be used in investigations to gather evidences.

They provide with:

Photographs

location

Information about the people with whom the


suspect interacts

Thought process
Methods to record evidences
available on Social Media
Screenshots of Facebook post and Tweets

Using software such as Screencast to record


what the investigator is viewing in real time

Using tools to collect Metadata that can reveal


time stamps, IP addresses and other sensitive
information.

Hooking onto the APIs on Facebook


Ethics and Legal
Implications
Information available off the web is admissible as
evidence but only to the point of relevance.

Unrelated information can lead to ethical issues


and can be interpreted as violation of privacy.

Countries and states have different cyber


regulations that need to be observed during
investigations.
Methods For Examining The
Data

Interviews

Surveillance

Computer forensics

Undercover
EVALUATION OF EVIDENCE
Decision making
This process is it most important as life of a
person depends on it.

The collected evidence should be analyzed


properly to help make a correct decision.

The final decision should be supported with


enough evidence to provide a solid backing to
the decision.
Factors Affecting Decisions
Experience

Cognitive Biases

Age of the investigator

Individual perception

Escalation of commitment
THANK YOU

You might also like