SlideShare a Scribd company logo
Digital Forensics &
Justice in court
Understanding Digital crime
Whoami?
❖ Kharim Mchatta
❖ CEO of HACK IT CONSULTANCY
❖Author of 4 Cybersecurity books
❖ Cybersecurity professional (Pen tester & Digital Forensics expert)
❖ Founder of H4K-IT (Cybersec community in TZ)
❖ CTF player
❖ Blogger
❖ Author at eForensics and Pentets Magazine in Poland
❖ DW Swahili Subject matter expert (cybersecurity)
ROAD MAP OF TODAYS DISCUSSION
Discussion around
- digital economy
- Effects of digital economy
Discussion around digital forensics
- Types of digital forensics
- Digital forensics experts
Discussion on cybercrime
- Types of cybercrime
- Cybercrime inTanzania
Discussion around laws
- International vs Local laws
- Advocate vs Digital Forensics Expert
DIGITAL
ECONOMY
USA
CHINA
JAPAN
GERMANY
UK
Largest Digital Economy Countries Worldwide
AFRICA DIGITAL ECONOMY
Majority of African countries are heading into the digital
economy while some of them are already in there. Some
African countries that are well known for their digital
economy include the following
Nigeria
Kenya
S. Africa
Tanzania in Digital Economy
Tanzania is heading into the digital economy.This means
that majority of the activities are being moved over to the
internet.
Here are some of the activities that are done online currently
includes
➢ National ID Number
➢ TRA (Filing returns)
➢ BRELA Registration
➢ Workers Compensation Funds (WCF)
➢ NHIF
Problems of Digital Economy
Tanzania being in the digital economy means majority of our
information can be found and accessed over the internet.
This comes with its draw backs and the major one is
cybercrime which affects the lives of people in variety of ways.
Example
➢ Privacy of the people can be compromised
➢ Information can be leaked
➢ System being hacked
➢ System being inaccessible due to denial of services (DOS)
➢ Financial Loss
➢ Reputational Loss
Problems of Digital Economy
Cybercrime inTanzania is constantly increasing as more entities keep
on digitalizing their operations.This means that there are going to
be more cybercrime cases faced in the court.
The problem that we are facing as a country currently is that most of
the advocates and lawyers haven’t got the opportunity to explore and
understand about the digital crime since it’s a new concept.
Hence it is important to have advocates and lawyers who are knowledgeable
on issue’s relating to digital crime.This can be achieved through training.
Tanzania Digital Crime Ruling
What is cybercrime?
The first reported cybercrime took place in 1834 where the French
telegram system was hacked by a couple of robbers where they stole
information from the stoke market making it the first cybercrime in the
world. This led to the rise of more cybercrime activities which involved
viruses and network hacks.
History of Cybercrime
These are all the crimes that are conducted by means of computer or
over the internet.
There are several cybercrime that are being conducted and some of
them include;
Types of Cybercrime
Financial Fraud Theft of intellectual
property
Damage of company
service network
Systems being
hacked
Other Cybercrime’s
Tanzania as a country in the digital era faces plenty of cyber attacks. On
21st July 2020, IPPmedia reported that TCRA has called on all
Information and Communication Technology (ICT) experts in the
country to be wary of cyber-attacks due to 10 - 15 companies had
been hacked.
Cybercrime in Tanzania
The most common cybercrime activities happening in Tanzania include
the following;
➢ System hacking
➢ Financial fraud
➢ Social Engineering
➢ Cyberbullying
➢ Intellectual property theft
The rise of cybercrime in the world had to be addressed. This led to the
need of having a way on which these crime had to be addressed by law
enforcers.This Led to a rise of digital forensics.
Cybercrime & Digital Forensics
It is the process of collecting, analyzing, preserving and documenting of
digital evidence and presenting them in court of law for prosecution.
What is digital forensics
When it comes to digital forensics this refers to acquiring of evidence
from any electronic device. Here are some of the common types of
digital forensics
digital forensics Investigation
❖ Computer forensics
❖ Mobile forensics
❖ Email forensics
❖ Network forensics
❖ Hacking
❖ Malware forensics
❖ Wireless forensics
❖ Database forensics
Purpose of Digital Forensics
Render Justice in Court (Back Story)
Render Justice in Court (Technicals)
Render Justice in Court (Evidence Seizure)
When a cybercrime has occurred, there are 3 technical people who are
going to be responsible for handling the case and these individual's have
different roles to play when it come’s to digital forensics and each role
should be well understood by everybody.
➢ First responder
➢ Computer forensics analyst
➢ Expert witness
In court the expert witness is going to be responsible to answer all the
questions in court of how the investigation was conducted and whether
the procedures were followed.
Digital Forensics Expert
In digital forensics there are a set of stages that an expert must go
through in order until they present the evidence in the court of law
and these stages include:
Stage/Phases of Digital Forensics
➢ Authority
➢ Planning
➢ Evidence identification
➢ Evidence collection
➢ Chain of custody
➢ Analysis
➢ Report writing
➢ Expert witness
Best Practice in Digital Forensics (Kenya National Forensics Lab)
Law and Investigators
Laws in digital forensics are there to govern digital forensics expert on
what is or is not allowed to do when doing an investigation.
There is no single law that governs digital forensics but a nexus of them
which needs to be put into consideration. There are situations where a
digital forensics expert may be carry out an investigation and later it is
considered a criminal offense.
Here are some of the International Laws that govern digital forensics
➢ Human rights act of 1998 – every person has their basic rights.
➢ Data protection right
➢ Interception of communication
➢ Computer misuse act 1990
➢ Police and criminal evidence act 1984 – this act is for law enforcers
which covers power to search a person and property, power to
detain and arrest people, questioning of suspects, access and copying.
Law and Investigators (Breach of International Laws)
Law and Investigators
Here are some of the local Laws that govern digital forensics which can
be found on the cybercrime act 2015 part IV search and seizure
➢ Search and seizure
➢ Disclosure of data
➢ Expedited preservation
➢ Disclosure and collection of traffic data
➢ Disclosure and collection of content data
➢ Court order
➢ Use of forensic tools
➢ Hearing of application
In Court Advocate vs Expert Witness (Digital Forensics Expert)
Food for Though (Discussion)
We have discussed about Tanzania heading into the digital economy but
there are some questions we should be asking ourselves
1. Is Tanzania well prepared for the effects of being in the digital economy
2. Do we have experts who can help us combat the effects of digital economy
3. Do law enforcers understand about the effects of digital economy
4. Is the laws in place satisfying the ways to combat effects of cybercrime (are
there loopholes on the current laws)
5. What is our way forward
This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy

More Related Content

Similar to Cybersecurity and Digital Forensics | 2022

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
Custom Paper Writing Service
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
Olusegun Mosugu
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
JiaJunWang17
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
manisha9kathuria
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Gamaliel Olayiwola Fasuyi
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige HurleyDigital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
amcates
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
Help With Papers Tacoma
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
Deepam Aggarwal
 

Similar to Cybersecurity and Digital Forensics | 2022 (19)

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Crime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.pptCrime Crime and Cyber crime Investigation.ppt
Crime Crime and Cyber crime Investigation.ppt
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige HurleyDigital Citizenship Andrew Cates Anthony Torres Paige Hurley
Digital Citizenship Andrew Cates Anthony Torres Paige Hurley
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 

More from KharimMchatta

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
KharimMchatta
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
KharimMchatta
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
KharimMchatta
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
KharimMchatta
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
KharimMchatta
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
KharimMchatta
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
KharimMchatta
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
KharimMchatta
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
KharimMchatta
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
KharimMchatta
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
KharimMchatta
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
KharimMchatta
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
KharimMchatta
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
KharimMchatta
 

More from KharimMchatta (14)

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Cybersecurity and Digital Forensics | 2022

  • 1. Digital Forensics & Justice in court Understanding Digital crime
  • 2. Whoami? ❖ Kharim Mchatta ❖ CEO of HACK IT CONSULTANCY ❖Author of 4 Cybersecurity books ❖ Cybersecurity professional (Pen tester & Digital Forensics expert) ❖ Founder of H4K-IT (Cybersec community in TZ) ❖ CTF player ❖ Blogger ❖ Author at eForensics and Pentets Magazine in Poland ❖ DW Swahili Subject matter expert (cybersecurity)
  • 3. ROAD MAP OF TODAYS DISCUSSION Discussion around - digital economy - Effects of digital economy Discussion around digital forensics - Types of digital forensics - Digital forensics experts Discussion on cybercrime - Types of cybercrime - Cybercrime inTanzania Discussion around laws - International vs Local laws - Advocate vs Digital Forensics Expert
  • 5. AFRICA DIGITAL ECONOMY Majority of African countries are heading into the digital economy while some of them are already in there. Some African countries that are well known for their digital economy include the following Nigeria Kenya S. Africa
  • 6. Tanzania in Digital Economy Tanzania is heading into the digital economy.This means that majority of the activities are being moved over to the internet. Here are some of the activities that are done online currently includes ➢ National ID Number ➢ TRA (Filing returns) ➢ BRELA Registration ➢ Workers Compensation Funds (WCF) ➢ NHIF
  • 7. Problems of Digital Economy Tanzania being in the digital economy means majority of our information can be found and accessed over the internet. This comes with its draw backs and the major one is cybercrime which affects the lives of people in variety of ways. Example ➢ Privacy of the people can be compromised ➢ Information can be leaked ➢ System being hacked ➢ System being inaccessible due to denial of services (DOS) ➢ Financial Loss ➢ Reputational Loss
  • 9. Cybercrime inTanzania is constantly increasing as more entities keep on digitalizing their operations.This means that there are going to be more cybercrime cases faced in the court. The problem that we are facing as a country currently is that most of the advocates and lawyers haven’t got the opportunity to explore and understand about the digital crime since it’s a new concept. Hence it is important to have advocates and lawyers who are knowledgeable on issue’s relating to digital crime.This can be achieved through training. Tanzania Digital Crime Ruling
  • 10. What is cybercrime? The first reported cybercrime took place in 1834 where the French telegram system was hacked by a couple of robbers where they stole information from the stoke market making it the first cybercrime in the world. This led to the rise of more cybercrime activities which involved viruses and network hacks. History of Cybercrime These are all the crimes that are conducted by means of computer or over the internet.
  • 11. There are several cybercrime that are being conducted and some of them include; Types of Cybercrime Financial Fraud Theft of intellectual property Damage of company service network Systems being hacked Other Cybercrime’s
  • 12. Tanzania as a country in the digital era faces plenty of cyber attacks. On 21st July 2020, IPPmedia reported that TCRA has called on all Information and Communication Technology (ICT) experts in the country to be wary of cyber-attacks due to 10 - 15 companies had been hacked. Cybercrime in Tanzania The most common cybercrime activities happening in Tanzania include the following; ➢ System hacking ➢ Financial fraud ➢ Social Engineering ➢ Cyberbullying ➢ Intellectual property theft
  • 13. The rise of cybercrime in the world had to be addressed. This led to the need of having a way on which these crime had to be addressed by law enforcers.This Led to a rise of digital forensics. Cybercrime & Digital Forensics It is the process of collecting, analyzing, preserving and documenting of digital evidence and presenting them in court of law for prosecution. What is digital forensics
  • 14. When it comes to digital forensics this refers to acquiring of evidence from any electronic device. Here are some of the common types of digital forensics digital forensics Investigation ❖ Computer forensics ❖ Mobile forensics ❖ Email forensics ❖ Network forensics ❖ Hacking ❖ Malware forensics ❖ Wireless forensics ❖ Database forensics
  • 15. Purpose of Digital Forensics
  • 16. Render Justice in Court (Back Story)
  • 17. Render Justice in Court (Technicals)
  • 18. Render Justice in Court (Evidence Seizure)
  • 19. When a cybercrime has occurred, there are 3 technical people who are going to be responsible for handling the case and these individual's have different roles to play when it come’s to digital forensics and each role should be well understood by everybody. ➢ First responder ➢ Computer forensics analyst ➢ Expert witness In court the expert witness is going to be responsible to answer all the questions in court of how the investigation was conducted and whether the procedures were followed. Digital Forensics Expert
  • 20. In digital forensics there are a set of stages that an expert must go through in order until they present the evidence in the court of law and these stages include: Stage/Phases of Digital Forensics ➢ Authority ➢ Planning ➢ Evidence identification ➢ Evidence collection ➢ Chain of custody ➢ Analysis ➢ Report writing ➢ Expert witness
  • 21. Best Practice in Digital Forensics (Kenya National Forensics Lab)
  • 22. Law and Investigators Laws in digital forensics are there to govern digital forensics expert on what is or is not allowed to do when doing an investigation. There is no single law that governs digital forensics but a nexus of them which needs to be put into consideration. There are situations where a digital forensics expert may be carry out an investigation and later it is considered a criminal offense. Here are some of the International Laws that govern digital forensics ➢ Human rights act of 1998 – every person has their basic rights. ➢ Data protection right ➢ Interception of communication ➢ Computer misuse act 1990 ➢ Police and criminal evidence act 1984 – this act is for law enforcers which covers power to search a person and property, power to detain and arrest people, questioning of suspects, access and copying.
  • 23. Law and Investigators (Breach of International Laws)
  • 24. Law and Investigators Here are some of the local Laws that govern digital forensics which can be found on the cybercrime act 2015 part IV search and seizure ➢ Search and seizure ➢ Disclosure of data ➢ Expedited preservation ➢ Disclosure and collection of traffic data ➢ Disclosure and collection of content data ➢ Court order ➢ Use of forensic tools ➢ Hearing of application
  • 25. In Court Advocate vs Expert Witness (Digital Forensics Expert)
  • 26. Food for Though (Discussion) We have discussed about Tanzania heading into the digital economy but there are some questions we should be asking ourselves 1. Is Tanzania well prepared for the effects of being in the digital economy 2. Do we have experts who can help us combat the effects of digital economy 3. Do law enforcers understand about the effects of digital economy 4. Is the laws in place satisfying the ways to combat effects of cybercrime (are there loopholes on the current laws) 5. What is our way forward
  • 27. This intellectual property belongs to HACK IT Consultancy a cybersecurity company located in Dar es salaam,Tanzania. Author: Kharim Mchatta Contact: +255 735 212 145 Email: info@hackitconsultacy.com Website: www.h4k-it.com LinkedIn: hack it consultancy Instagram: @hackitconsultancy