SlideShare a Scribd company logo
1 of 12
Download to read offline
SC
                   Cyber Solutions




Investigative Abuses


     Null, Pune
What is an investigation?                            SC
                                                              Cyber Solutions



• Application of physical science to law in the search for
  truth in civil, criminal and social behavioural matters to
  the end that injustice shall not be done to any member of
  society.

• A systematic examination especially in order to extract,
  process and interpret evidence with the ultimate aim of
  discovering the ‘truth’.

• An investigation is often looked at as a solution, when it is
  a tool used to identify what went wrong and how.

  21/1/2012                                   shweta@sccybersolutions.com
Where, when and why is an                             SC
        investigation carried out?                      Cyber Solutions




• When someone requests an investigation
• Into the area of request
• When a crime has been committed, imminent or
  threatened

 An investigation HAS to be requested and authorised by
 the proper authority.



 21/1/2012                              shweta@sccybersolutions.com
How is an investigation carried out?                            SC
                                                           Cyber Solutions



• Understand and analyse the situation before beginning the
  investigation
• Follow correct procedures to
   – Assess
   – Collect
   – Analyze
   – Preserve
   – Report
• Maintain ‘Chain-of-Custody’ throughout the process
• Approach each case as initially isolated

  21/1/2012                                shweta@sccybersolutions.com
What can go wrong in an                          SC
                  investigation?                          Cyber Solutions




• Flawed readings
• Excess reference to other cases that look similar on the
  surface
• Incorrect findings
• False positives
• Improper procedures
• Incomplete chain-of-custody
• Leaks
• Manipulations of information

  21/1/2012                               shweta@sccybersolutions.com
What are the factors that contribute to                          SC
       flawed investigations?                               Cyber Solutions



                         INTERNAL
 (Factors that can be at work within the investigating team)
• Lack of knowledge
• Carelessness
• Laziness
• Haste
• Ego
• Ideology


  21/1/2012                                  shweta@sccybersolutions.com
What are the factors that contribute to                          SC
       flawed investigations?                               Cyber Solutions



                         EXTERNAL
 (Factors that can be at work on the investigation and/or the
                       investigating team)
• Money
• Threat / coercion
• Hacks
• Lack of security
• Blackmail


  21/1/2012                                  shweta@sccybersolutions.com
Why would investigations be misused?                        SC
                                                       Cyber Solutions




•   Monetary benefits
•   Ideological benefits
•   Coercion
•   Ego




    21/1/2012                          shweta@sccybersolutions.com
For want of a nail…                             SC
                                                           Cyber Solutions



                         LEGAL LEVELS

    The existing frameworks within which an investigation is
    carried out -
•   Indian Penal Code
•   Criminal Procedure Code
•   Evidence Act
•   Information Technology Act


    21/1/2012                               shweta@sccybersolutions.com
For want of a horse…                              SC
                                                             Cyber Solutions



                      OPERATIONAL LEVELS

    Procedures that maintain the confidentiality, integrity and
    authenticity of an investigation -
•   Investigative procedures
•   Chain of custody
•   Documentation
•   Contracts


    21/1/2012                                 shweta@sccybersolutions.com
… the Kingdom was lost?                               SC
                                                             Cyber Solutions



                      OPTIMUM LEVELS

    Measures that could strengthen the investigations -
•   Compartmentalization
•   Stricter laws and punishment
•   Financial penalization
•   Legal blacklisting
•   Stricter guidelines and standards
•   Accountability

    21/1/2012                                 shweta@sccybersolutions.com
SC
                                          Cyber Solutions




                     Thank You




Mob: +919823080864               www.sccybersolutions.com

More Related Content

Viewers also liked

Sound of colors - Gerstein
Sound of colors - GersteinSound of colors - Gerstein
Sound of colors - GersteinLota Moncada
 
As múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticasAs múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticasDaniela Carvalho
 
Livros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digitalLivros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digitalguesta3bc792
 
Dados educacionais de Feira Nova
Dados educacionais de Feira NovaDados educacionais de Feira Nova
Dados educacionais de Feira Novadiego_coliveira
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi Cn|u - The Open Security Community
 
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...n|u - The Open Security Community
 

Viewers also liked (10)

Jyoti ppt
Jyoti pptJyoti ppt
Jyoti ppt
 
Sound of colors - Gerstein
Sound of colors - GersteinSound of colors - Gerstein
Sound of colors - Gerstein
 
As múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticasAs múltiplas alfabetizações midiáticas
As múltiplas alfabetizações midiáticas
 
Livros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digitalLivros, leitura e partilha no ambiente digital
Livros, leitura e partilha no ambiente digital
 
Dados educacionais de Feira Nova
Dados educacionais de Feira NovaDados educacionais de Feira Nova
Dados educacionais de Feira Nova
 
nullcon 2011 - Fuzzing with Complexities
nullcon 2011 - Fuzzing with Complexitiesnullcon 2011 - Fuzzing with Complexities
nullcon 2011 - Fuzzing with Complexities
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
 
Indicadores itabaiana
Indicadores itabaianaIndicadores itabaiana
Indicadores itabaiana
 
A Different Kind Of College
A Different Kind Of CollegeA Different Kind Of College
A Different Kind Of College
 

Similar to Investigative abuses

Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – EthicsLee Schlenker
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
Creating a data-driven culture in Government
Creating a data-driven culture in GovernmentCreating a data-driven culture in Government
Creating a data-driven culture in GovernmentChristopher Norman
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)NAFCU Services Corporation
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propellaExo Futures
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsJohn Lovett
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationGlen Newton
 
Market Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data ManagementMarket Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data ManagementChristopher Norman
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Omar Ha-Redeye
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessmentsJim Kaplan CIA CFE
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Clio - Cloud-Based Legal Technology
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social MachinesUlrik Lyngs
 

Similar to Investigative abuses (20)

Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Technologies and Innovation – Ethics
Technologies and Innovation – EthicsTechnologies and Innovation – Ethics
Technologies and Innovation – Ethics
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Internet based assessment
Internet based assessmentInternet based assessment
Internet based assessment
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
Creating a data-driven culture in Government
Creating a data-driven culture in GovernmentCreating a data-driven culture in Government
Creating a data-driven culture in Government
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of Ethics
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and Authorization
 
Market Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data ManagementMarket Sounding Brief: ACT Government Data Management
Market Sounding Brief: ACT Government Data Management
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
 
A trust aggregation portal
A trust aggregation portalA trust aggregation portal
A trust aggregation portal
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Cyber security series vulnerability assessments
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessments
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 

More from n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 

Investigative abuses

  • 1. SC Cyber Solutions Investigative Abuses Null, Pune
  • 2. What is an investigation? SC Cyber Solutions • Application of physical science to law in the search for truth in civil, criminal and social behavioural matters to the end that injustice shall not be done to any member of society. • A systematic examination especially in order to extract, process and interpret evidence with the ultimate aim of discovering the ‘truth’. • An investigation is often looked at as a solution, when it is a tool used to identify what went wrong and how. 21/1/2012 shweta@sccybersolutions.com
  • 3. Where, when and why is an SC investigation carried out? Cyber Solutions • When someone requests an investigation • Into the area of request • When a crime has been committed, imminent or threatened An investigation HAS to be requested and authorised by the proper authority. 21/1/2012 shweta@sccybersolutions.com
  • 4. How is an investigation carried out? SC Cyber Solutions • Understand and analyse the situation before beginning the investigation • Follow correct procedures to – Assess – Collect – Analyze – Preserve – Report • Maintain ‘Chain-of-Custody’ throughout the process • Approach each case as initially isolated 21/1/2012 shweta@sccybersolutions.com
  • 5. What can go wrong in an SC investigation? Cyber Solutions • Flawed readings • Excess reference to other cases that look similar on the surface • Incorrect findings • False positives • Improper procedures • Incomplete chain-of-custody • Leaks • Manipulations of information 21/1/2012 shweta@sccybersolutions.com
  • 6. What are the factors that contribute to SC flawed investigations? Cyber Solutions INTERNAL (Factors that can be at work within the investigating team) • Lack of knowledge • Carelessness • Laziness • Haste • Ego • Ideology 21/1/2012 shweta@sccybersolutions.com
  • 7. What are the factors that contribute to SC flawed investigations? Cyber Solutions EXTERNAL (Factors that can be at work on the investigation and/or the investigating team) • Money • Threat / coercion • Hacks • Lack of security • Blackmail 21/1/2012 shweta@sccybersolutions.com
  • 8. Why would investigations be misused? SC Cyber Solutions • Monetary benefits • Ideological benefits • Coercion • Ego 21/1/2012 shweta@sccybersolutions.com
  • 9. For want of a nail… SC Cyber Solutions LEGAL LEVELS The existing frameworks within which an investigation is carried out - • Indian Penal Code • Criminal Procedure Code • Evidence Act • Information Technology Act 21/1/2012 shweta@sccybersolutions.com
  • 10. For want of a horse… SC Cyber Solutions OPERATIONAL LEVELS Procedures that maintain the confidentiality, integrity and authenticity of an investigation - • Investigative procedures • Chain of custody • Documentation • Contracts 21/1/2012 shweta@sccybersolutions.com
  • 11. … the Kingdom was lost? SC Cyber Solutions OPTIMUM LEVELS Measures that could strengthen the investigations - • Compartmentalization • Stricter laws and punishment • Financial penalization • Legal blacklisting • Stricter guidelines and standards • Accountability 21/1/2012 shweta@sccybersolutions.com
  • 12. SC Cyber Solutions Thank You Mob: +919823080864 www.sccybersolutions.com