SlideShare a Scribd company logo
By A.S. Jaybhaye
B.A.,LL.M.,NET
Definition of Investigation
 Section 2(h): Cr.p.c.
“Investigation includes all the proceedings under this
Code for the collection of evidence conducted by a
police officer or by any person who is authorised by a
Magistrate in this behalf.”
Purpose of investigation
To ascertain and record the facts concerning the
commission of crime.
To identify criminal and his accomplices if any.
To arrest the criminals in cognizable offences.
To secure, preserve and evaluate the evidence
To put evidence in a court in a legal manner.
Procedure of investigation
 To lodge F.I.R. in cognizable cases.
 Duty of IO to prepare case diary.
 Duty to inspect crime scene properly.
 Search and seizure
 Need to seize CPU.
 In a counterfeiting case – computer, scanner and
colour printer.
 Hard disk, CD, DVD, modem etc.
 Hard copy print outs, hand written notes.
Procedure of investigation
 Interrogation of suspect persons.
 Arrest of suspect persons and bail, remand if any.
 Taking opinion from forensic expert.
 Collection of evidence.
 Filing the charge sheet before the court.
 Power of Police Inspector to investigate in cyber crime.
 Procedure given under Cr.p.c. has to be followed for
investigating a cyber crime.
 Need for a dedicated team of professionals.
Admissibility of e-records in courts
 Sec 65-B of evidence Act.
 E-records/ digital evidence is admissible in courts.
 Concept of primary and secondary evidence.
 Primary evidence – section 62 Evidence Act.
 secondary evidence- section 63 Evidence Act.
 Requirement of certificate in case secondary evidence
is produced before the court.
 Refer Anwar v. P.K. Basheer case.
Challenges involved
 Issues of jurisdiction of Internet.
 Difficult to determine where crime has been
committed- technical challenges.
 Difficulty in investigating in another countries due to
different laws, procedure.
 Lack of skilled, specialised investigators in cyber
crimes.
 Traditional method of investigation is different than
investigation of cyber crimes.
Precautions before investigation:
a. Do not disconnect the power supply to the computer.
b. Do not touch the keyboard as far as possible.
c. Do not disconnect the telephone.
d. Videotape the crime scene, condition of site on your
arrival and the conditions of equipments you see.
e. Photograph the equipment with its serial number.
f. Label all the evidence you see.
Role of computer forensic expert:
 He should be actively involved right from the stage of
search and seizure.
 He should advice IO regarding presentation of digital
evidence in a court.
 He should analyse and preserve digital evidence
properly.
Lacunas under IT Act
 Following offences have not been included under IT
Act:
Cyber defamation.
Cyber stalking.
Violation of domain name issues.
Violation of IP rights online.
Cyber security and data protection.
Jurisdiction issues not covered.

More Related Content

What's hot

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
unnilala11
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 

What's hot (20)

Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 

Similar to Investigation of a cyber crime

Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
AASTHA76
 
76 s201924
76 s20192476 s201924
76 s201924
IJRAT
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
FORnSECSolutions
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
AnamZunaira
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
FORnSECSolutions
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
 
Specialized Crime Investigation 1 updated.pptx
Specialized Crime Investigation 1 updated.pptxSpecialized Crime Investigation 1 updated.pptx
Specialized Crime Investigation 1 updated.pptx
BartVanta2
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
Applied Forensic Research Sciences
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
Gautam708801
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
ICFECI
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
Alleli Faith Leyritana
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
David Sweigert
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptx
adiljamalullaily
 
CRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptxCRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptx
CDT3CSandayan
 

Similar to Investigation of a cyber crime (20)

Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docxBerkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
Berkeley College Cyber CrimeLecture Notes Chapter 11Searching .docx
 
76 s201924
76 s20192476 s201924
76 s201924
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Specialized Crime Investigation 1 updated.pptx
Specialized Crime Investigation 1 updated.pptxSpecialized Crime Investigation 1 updated.pptx
Specialized Crime Investigation 1 updated.pptx
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
First-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.pptFirst-Responders-in-CSI_01.19.ppt
First-Responders-in-CSI_01.19.ppt
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptx
 
CRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptxCRIM-INVEST-PROTOCOLS.pptx
CRIM-INVEST-PROTOCOLS.pptx
 

More from atuljaybhaye

Procedure for registration of patents
Procedure for registration of patentsProcedure for registration of patents
Procedure for registration of patents
atuljaybhaye
 
Patentable inventions
Patentable inventionsPatentable inventions
Patentable inventions
atuljaybhaye
 
Non patentable inventions in india
Non patentable inventions in indiaNon patentable inventions in india
Non patentable inventions in india
atuljaybhaye
 
Introduction to patents
Introduction to patentsIntroduction to patents
Introduction to patents
atuljaybhaye
 
Infringement of patents and remedies
Infringement of patents and remediesInfringement of patents and remedies
Infringement of patents and remedies
atuljaybhaye
 
Copyright amendment Act, 2012
Copyright amendment Act, 2012Copyright amendment Act, 2012
Copyright amendment Act, 2012
atuljaybhaye
 
Assignment of trademark
Assignment of trademarkAssignment of trademark
Assignment of trademark
atuljaybhaye
 
Amendments under patent law
Amendments under patent lawAmendments under patent law
Amendments under patent law
atuljaybhaye
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem vi
atuljaybhaye
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
atuljaybhaye
 
E governance
E  governanceE  governance
E governance
atuljaybhaye
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
atuljaybhaye
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
atuljaybhaye
 
Labour law ii
Labour law  iiLabour law  ii
Labour law ii
atuljaybhaye
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Trademark law ppt
Trademark law pptTrademark law ppt
Trademark law ppt
atuljaybhaye
 

More from atuljaybhaye (20)

Procedure for registration of patents
Procedure for registration of patentsProcedure for registration of patents
Procedure for registration of patents
 
Patentable inventions
Patentable inventionsPatentable inventions
Patentable inventions
 
Non patentable inventions in india
Non patentable inventions in indiaNon patentable inventions in india
Non patentable inventions in india
 
Introduction to patents
Introduction to patentsIntroduction to patents
Introduction to patents
 
Infringement of patents and remedies
Infringement of patents and remediesInfringement of patents and remedies
Infringement of patents and remedies
 
Copyright amendment Act, 2012
Copyright amendment Act, 2012Copyright amendment Act, 2012
Copyright amendment Act, 2012
 
Assignment of trademark
Assignment of trademarkAssignment of trademark
Assignment of trademark
 
Amendments under patent law
Amendments under patent lawAmendments under patent law
Amendments under patent law
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem vi
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
E governance
E  governanceE  governance
E governance
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Copyright issues in cyberspace
Copyright issues in cyberspaceCopyright issues in cyberspace
Copyright issues in cyberspace
 
Labour law ii
Labour law  iiLabour law  ii
Labour law ii
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Trademark law ppt
Trademark law pptTrademark law ppt
Trademark law ppt
 

Recently uploaded

Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
SidharthKashyap5
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 

Recently uploaded (20)

Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 

Investigation of a cyber crime

  • 2. Definition of Investigation  Section 2(h): Cr.p.c. “Investigation includes all the proceedings under this Code for the collection of evidence conducted by a police officer or by any person who is authorised by a Magistrate in this behalf.”
  • 3. Purpose of investigation To ascertain and record the facts concerning the commission of crime. To identify criminal and his accomplices if any. To arrest the criminals in cognizable offences. To secure, preserve and evaluate the evidence To put evidence in a court in a legal manner.
  • 4. Procedure of investigation  To lodge F.I.R. in cognizable cases.  Duty of IO to prepare case diary.  Duty to inspect crime scene properly.  Search and seizure  Need to seize CPU.  In a counterfeiting case – computer, scanner and colour printer.  Hard disk, CD, DVD, modem etc.  Hard copy print outs, hand written notes.
  • 5. Procedure of investigation  Interrogation of suspect persons.  Arrest of suspect persons and bail, remand if any.  Taking opinion from forensic expert.  Collection of evidence.  Filing the charge sheet before the court.  Power of Police Inspector to investigate in cyber crime.  Procedure given under Cr.p.c. has to be followed for investigating a cyber crime.  Need for a dedicated team of professionals.
  • 6. Admissibility of e-records in courts  Sec 65-B of evidence Act.  E-records/ digital evidence is admissible in courts.  Concept of primary and secondary evidence.  Primary evidence – section 62 Evidence Act.  secondary evidence- section 63 Evidence Act.  Requirement of certificate in case secondary evidence is produced before the court.  Refer Anwar v. P.K. Basheer case.
  • 7. Challenges involved  Issues of jurisdiction of Internet.  Difficult to determine where crime has been committed- technical challenges.  Difficulty in investigating in another countries due to different laws, procedure.  Lack of skilled, specialised investigators in cyber crimes.  Traditional method of investigation is different than investigation of cyber crimes.
  • 8. Precautions before investigation: a. Do not disconnect the power supply to the computer. b. Do not touch the keyboard as far as possible. c. Do not disconnect the telephone. d. Videotape the crime scene, condition of site on your arrival and the conditions of equipments you see. e. Photograph the equipment with its serial number. f. Label all the evidence you see.
  • 9. Role of computer forensic expert:  He should be actively involved right from the stage of search and seizure.  He should advice IO regarding presentation of digital evidence in a court.  He should analyse and preserve digital evidence properly.
  • 10. Lacunas under IT Act  Following offences have not been included under IT Act: Cyber defamation. Cyber stalking. Violation of domain name issues. Violation of IP rights online. Cyber security and data protection. Jurisdiction issues not covered.