SlideShare a Scribd company logo
1 of 10
ARTIFICIAL INTELLIGENCE BASED
CYBER FORENSICS TOOLS: RELEVANCY
AND ADMISSIBILITY
Submitted to: Prof. (Dr) Yogendra Kumar Srivastava
CYBER FORENSICS AND CYBER CRIME
Submitted by: Anadi Tewari
Master of Laws-LLM (Technology and Law)
Hidayatullah National Law University, Raipur
INTRODUCTION
‘Digital Forensics’ is referred to as “the use of scientifically derived
and proven methods toward the preservation, collection,
validation, identification, analysis, interpretation, documentation
and presentation of digital evidence derived from digital sources
for the purpose of facilitating or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorized
actions shown to be disruptive to planned operations.
o M/s PPK NewsClick Private Limited v. UOI & Others (2023)
o Foundation for Media Professionals v. Union of India &
Others
o Technology plays a major role: its usage by offenders &
investigators [identification of digital evidence, preservation
and analysis and presentation before the court
o History & Advancement of Digital Forensic: India & Global level
CYBER FORENSICS AND CYBER CRIME
METHODOLOGY OF DIGITAL FORENSICS
CYBER FORENSICS AND CYBER CRIME
o Information Technology Act, 2000 (incl. 2008 amendment), Evidence Act, EUGDPR, Electronic
Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya
Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023.
o Lack of any standardization in the data collected also creates a nuisance when it comes to drawing
an analysis, which seems very complex for human beings but is equally on the same footing for the
digital forensic tools as well.
o When advanced tools are being used for extraction of digital evidence, emphasis must also be put
that individual rights are not compromised; focus should remain on the justice delivery and
ensuring realization of rights.
ADVANCEMENT OF DIGITAL FORENSICS: INDIA & GLOBAL
CYBER FORENSICS AND CYBER CRIME
o Enactment of new forensic technologies vis-à-vis Rule of Law.
o AI and Machine Learning based techniques: advanced and faster than
traditional means; creating another human to assist human in a more
accurate way [ISRAEL COLLECTING DIGITAL EVIDENCE FOR WAR
CRIMES CASES AGAINST HAMAS]
o Faster and quick-paced investigations; machine learning helps in automatic
analysis of data without requirement of any additional programming. (easy
analysis of Big data)
o Traditional method of forensic investigation majorly emphasises on search
and analysis of digital devices which is also manually and could be prone to
certain errors. However, with AI-based tools, results are seen in terms of
how automation process of collecting evidence is there by mitigating the
time and effort that was originally being put.
o DEEP LEARNING: Combination of neural networks for probable pattern
detection and could be regarded as the advanced version of segregating the
important pieces of evidence that is needed by the investigator to reach to a
probable conclusion.
TOOLS OF DIGITAL FORENSICS: AI & MACHINE LEARNING
SAFE STORAGE TECHNOLOGIES FOR DIGITAL EVIDENCE
HASHING TECHNIQUE (DIGITAL
FOOTPRINT)
LONG TERM STORAGE (DISTRIBUTED
LEDGER)
CYBER FORENSICS AND CYBER CRIME
o Australia: Uniform Evidence Acts, 1985; United Kingdom: United
Kingdom Police and Criminal Evidence Act, 1984; Section 20 and
Section 69; USA: The wiretap act, the pen registers and trap an trace
devices statute, and the stored wired and telecommunication act and
4th amendment.
o Shreya Singhal v. UOI (2015): SC called for cyber-crime’s systematic
regulation and has also emphasised on the lack of procedural checks
that persists.
o Information Technology Act, 2000 (incl. 2008 amendment), SECTION
65B(4) of Evidence Act, EUGDPR, Electronic Communications and
Privacy Act, 1986 and Federal Rules of Civil Procedure of USA.
Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya
Adhiniyam, 2023.
o BSA 2023: Section 61: electronic evidence is being treated at par with
the primary evidence; Section 63(4)(c): introduces Format of creation of
Certificate for creation of electronic or digital records.
DIGITAL EVIDENCE: RELEVANCY AND ADMISSIBILITY
ADMISSIBILITY OF ELECTRONIC EVIDENCE: JUDICIARY AT
FOREFRONT
Requirement of Certificate under Section 65B:
o NCT of Delhi v. Navjot Sandhu (2005)
o Anwar PV v. PK Basheer (2014): Can be produced at any stage if trial is not over.
o Tomaso Bruno v. State of UP (2015): requirement of certificate not mandatory.
o Shafhi Mohammed v. State of Himachal Pradesh (2018): requirement of certificate could be
relaxed by courts.
o Arjun Khotkar v. KK Gorantyal and Others (2020): View in Anwar upheld.
o State of Karnataka v. T Naseer (2023): Certificate can be produced at any stage of trial.
o Virendra Khanna v. State of Karnataka (2021; KHC): Guidelines issued for search of
smartphones, laptops, electronic gadgets, email accounts etc.
o Rakesh Shetty v. State of Karnataka (2020; KHC): Investigating agency cannot retain
username/password of accused person’s social media platform.
o XXX v. State of Kerala (2023; KeHC): Guidelines issued on handling of digital evidences
containing sexually explicit materials.
KEY FINDINGS AND FUTURE SUGGESTIVE DIRECTIONS
Effectiveness; improvement in comparison to traditional tools; challenges arising in
admissibility of electronic evidences; ethical and legal concerns to privacy.
KEY FINDINGS
Future Suggestions
Establishing industry-wide norms and guidelines for the usage of AI-powered
cyber forensics technologies; Ethical guidelines should be developed to govern
the use of AI in cyber forensics, ensuring that investigations prioritize privacy
and adhere to ethical standards while effectively combating cybercrime [Refer
to SC and KHC and KeHC guidelines]
CREDITS: This presentation template was created by Slidesgo, including icons by
Flaticon, and infographics & images by Freepik
THANKS!
Do you have any questions?
anadi.23727@hnlu.ac.in
+91 8299338062
CYBER FORENSICS AND CYBER CRIME

More Related Content

Similar to ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx

Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Bilingual Publishing Group
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 

Similar to ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx (20)

Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 

Recently uploaded

一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...ZurliaSoop
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfbhavenpr
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样mefyqyn
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesshobhna jeet
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Common Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdfCommon Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdfbartzlawgroup1
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawyogita9398
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证trryfxkn
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companiesSS Industries
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM Iyogita9398
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceBridgeWest.eu
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 

Recently uploaded (20)

一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Common Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdfCommon Legal Risks in Hiring and Firing Practices.pdf
Common Legal Risks in Hiring and Firing Practices.pdf
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
 
Dematerialisation of securities of private companies
Dematerialisation of securities of private companiesDematerialisation of securities of private companies
Dematerialisation of securities of private companies
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in Greece
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 

ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx

  • 1. ARTIFICIAL INTELLIGENCE BASED CYBER FORENSICS TOOLS: RELEVANCY AND ADMISSIBILITY Submitted to: Prof. (Dr) Yogendra Kumar Srivastava CYBER FORENSICS AND CYBER CRIME Submitted by: Anadi Tewari Master of Laws-LLM (Technology and Law) Hidayatullah National Law University, Raipur
  • 2. INTRODUCTION ‘Digital Forensics’ is referred to as “the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations. o M/s PPK NewsClick Private Limited v. UOI & Others (2023) o Foundation for Media Professionals v. Union of India & Others o Technology plays a major role: its usage by offenders & investigators [identification of digital evidence, preservation and analysis and presentation before the court o History & Advancement of Digital Forensic: India & Global level CYBER FORENSICS AND CYBER CRIME
  • 3. METHODOLOGY OF DIGITAL FORENSICS CYBER FORENSICS AND CYBER CRIME
  • 4. o Information Technology Act, 2000 (incl. 2008 amendment), Evidence Act, EUGDPR, Electronic Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023. o Lack of any standardization in the data collected also creates a nuisance when it comes to drawing an analysis, which seems very complex for human beings but is equally on the same footing for the digital forensic tools as well. o When advanced tools are being used for extraction of digital evidence, emphasis must also be put that individual rights are not compromised; focus should remain on the justice delivery and ensuring realization of rights. ADVANCEMENT OF DIGITAL FORENSICS: INDIA & GLOBAL CYBER FORENSICS AND CYBER CRIME
  • 5. o Enactment of new forensic technologies vis-à-vis Rule of Law. o AI and Machine Learning based techniques: advanced and faster than traditional means; creating another human to assist human in a more accurate way [ISRAEL COLLECTING DIGITAL EVIDENCE FOR WAR CRIMES CASES AGAINST HAMAS] o Faster and quick-paced investigations; machine learning helps in automatic analysis of data without requirement of any additional programming. (easy analysis of Big data) o Traditional method of forensic investigation majorly emphasises on search and analysis of digital devices which is also manually and could be prone to certain errors. However, with AI-based tools, results are seen in terms of how automation process of collecting evidence is there by mitigating the time and effort that was originally being put. o DEEP LEARNING: Combination of neural networks for probable pattern detection and could be regarded as the advanced version of segregating the important pieces of evidence that is needed by the investigator to reach to a probable conclusion. TOOLS OF DIGITAL FORENSICS: AI & MACHINE LEARNING
  • 6. SAFE STORAGE TECHNOLOGIES FOR DIGITAL EVIDENCE HASHING TECHNIQUE (DIGITAL FOOTPRINT) LONG TERM STORAGE (DISTRIBUTED LEDGER) CYBER FORENSICS AND CYBER CRIME
  • 7. o Australia: Uniform Evidence Acts, 1985; United Kingdom: United Kingdom Police and Criminal Evidence Act, 1984; Section 20 and Section 69; USA: The wiretap act, the pen registers and trap an trace devices statute, and the stored wired and telecommunication act and 4th amendment. o Shreya Singhal v. UOI (2015): SC called for cyber-crime’s systematic regulation and has also emphasised on the lack of procedural checks that persists. o Information Technology Act, 2000 (incl. 2008 amendment), SECTION 65B(4) of Evidence Act, EUGDPR, Electronic Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023. o BSA 2023: Section 61: electronic evidence is being treated at par with the primary evidence; Section 63(4)(c): introduces Format of creation of Certificate for creation of electronic or digital records. DIGITAL EVIDENCE: RELEVANCY AND ADMISSIBILITY
  • 8. ADMISSIBILITY OF ELECTRONIC EVIDENCE: JUDICIARY AT FOREFRONT Requirement of Certificate under Section 65B: o NCT of Delhi v. Navjot Sandhu (2005) o Anwar PV v. PK Basheer (2014): Can be produced at any stage if trial is not over. o Tomaso Bruno v. State of UP (2015): requirement of certificate not mandatory. o Shafhi Mohammed v. State of Himachal Pradesh (2018): requirement of certificate could be relaxed by courts. o Arjun Khotkar v. KK Gorantyal and Others (2020): View in Anwar upheld. o State of Karnataka v. T Naseer (2023): Certificate can be produced at any stage of trial. o Virendra Khanna v. State of Karnataka (2021; KHC): Guidelines issued for search of smartphones, laptops, electronic gadgets, email accounts etc. o Rakesh Shetty v. State of Karnataka (2020; KHC): Investigating agency cannot retain username/password of accused person’s social media platform. o XXX v. State of Kerala (2023; KeHC): Guidelines issued on handling of digital evidences containing sexually explicit materials.
  • 9. KEY FINDINGS AND FUTURE SUGGESTIVE DIRECTIONS Effectiveness; improvement in comparison to traditional tools; challenges arising in admissibility of electronic evidences; ethical and legal concerns to privacy. KEY FINDINGS Future Suggestions Establishing industry-wide norms and guidelines for the usage of AI-powered cyber forensics technologies; Ethical guidelines should be developed to govern the use of AI in cyber forensics, ensuring that investigations prioritize privacy and adhere to ethical standards while effectively combating cybercrime [Refer to SC and KHC and KeHC guidelines]
  • 10. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik THANKS! Do you have any questions? anadi.23727@hnlu.ac.in +91 8299338062 CYBER FORENSICS AND CYBER CRIME