SlideShare a Scribd company logo
SEARCH & SEIZURE
of Electronic
Evidence
DIFFERENCE BETWEEN
1. Less tangible than Physical Evidence
2. Made of magnetic field and
electronic pulses
3. It can be duplicated exactly and a
copy can be examined exactly as if
were the original
4. It can be destroyed, damaged or
manipulated easily but at the same
time the deleted data can be
recovered easily using proper
methods
Digital Evidence

 1. Tangible Evidence
2. Consists of real world physical
things
3. It is not possible to duplicate
physical evidence. Original
needs to be examined
4.Deleted or destroyed evidence
is hard to bring in its original
form
Physical Evidence
DIGITAL EVIDENCE IS EVERYWHERE
Terrorism
Child Pornography
Crimes of Violence
Trade secret theft
Theft or destruction of intellectual property
Financial crimes
Property crimes
Internet crimes
Fraud
IMPEDIMENTS IN THE
INVESTIGATION OF CYBER CRIME
There is no eye-witness account to the digital crime.
It is a trans-national crime.
The investigation becomes difficult as the procedures to acquire
evidence are too tedious and time-consuming.
The extradition process is tedious too.
DIGITAL EVIDENCE MAY NOT BE
DESTROYED
“Deleted” files really aren’t
Even “erased” files can be recovered as a result of how the write heads
drift
“Physically destroyed” drives can be recovered in many cases
Experienced forensic technicians can recover data even if the device is
damaged
PREPARATIONS / PRECAUTIONS
FOR SEARCH AND SEIZURE
Preparations Before going to Search and Seizure
Precaution to be taken on reaching the search spot
Precaution to be taken After Search and Seizure
PREPARATIONS BEFORE GOING TO
SEARCH AND SEIZER
Still and video camera
Hand gloves
Permanent Markers
Labeling Materials
Sealing Materials
Stationary
Finger Print development kit
Take along Digital Forensics Analyst
STILL AND
VIDEO
CAMERA
HAND GLOVES
LABELING MATERIALS, SEALING MATERIALS
& STATIONARY
PERMANENT
MARKERS
SCREW
DRIVERS SET
TAKE ALONG DIGITAL FORENSICS
ANALYST
PRECAUTION TO BE TAKEN ON
REACHING THE SEARCH SPOT
Secure the spot
Preserve the fingerprints
Restrict the access to a computer(s)
Don’t accept the help of the suspect for operating the computer
Make the Computers Standalone(Remove LAN/Telephone/
If computer is/are “OFF”; don’t turn “ON”
Wi-fi/Blue tooth etc)
PRECAUTION TO BE TAKEN ON
REACHING THE SEARCH SPOT
Some screen savers will show that the computer is off hence to make
sure by checking the light of CPU.
If the computer is “ON” then note down the date and time of the
computer system, don’t try to correct it.
Take the photograph of the Monitor screen
PRECAUTION TO BE TAKEN ON
REACHING THE SEARCH SPOT
Don’t shut down the computer in the normal manner but for shutting
down pull the power cord from the CPU and not from the wall point. (to
avoid the booby trap)
Photograph the scene, then disconnect all power sources; unplug from
the wall and also from the back of the system.
Draw the sketch of the scene of the spot.
PRECAUTION TO BE TAKEN ON
REACHING THE SEARCH SPOT
Label all the types of equipment, connectors, and cable ends to allow
reassemble as needed.
Seal all the ports and also screws of the CPU with a paper seal.
Pack and seal the equipment carefully and a sample of the same seal
must be sent to the FSL where the analysis of the CPU will be carried
out.
ADDITIONAL POINTS TO BE COVERED
DURING THE SEARCH AND SEIZER
Examine the persons, including suspects for the passwords, username, etc.
Search the premises for the printouts, handwritten notes, diary, notebooks, etc,
for the passwords, username, etc.
Search the premises for the software /programs, printouts, handwritten notes,
financial transactions, books, etc, which may be of vital importance to the
investigation.
In personal search look for the pen/flash drives which might be attached to key
chain and may contain huge important data.
WHAT
SHOULD
BE SEIZED
Portable/external storage devices
Relevant printouts
CPU
Leads in certain cases (Doubt seek
expert advice)
Hard disk not fitted in PC
Modems (Some may contain
Phone nos)
WHAT
SHOULD
BE SEIZED
MMC/Memory Sticks
Digital Cameras
CPU
Back up tapes
Wireless Network Cards
If finger prints are present on Key
board, mouse, Monitor, Printer etc
SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS
SET
(Devices we expect)
SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS
SET
(Devices we don't expect)
SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS SET


Places we don’t expect (wireless hard drives)
SCREW DIGITAL EVIDENCE CAN BE ANYWHERE DRIVERS
SET
(Global Positioning Sensors)
PRECAUTION TO BE TAKEN AFTER
SEARCH AND SEIZER
Packaging
Transportation
Storing
PACKAGING, TRANSPORTATION AND
STORING THE SEIZED COMPUTER
Due to the sensitive and fragile nature of the computer evidence place
the computer in a box properly cushioned with non-static material.
Store the computer in a secure and dust-free place.
The storage place should be away from the magnetic field, radio
transmitters, and otherwise hostile environments.
Store it in normal temperature
PACKAGING, TRANSPORTATION AND
STORING THE SEIZED COMPUTER
The storage should not come in contact with water.
As far as possible cover the mouse and keyboard with a polythene cover
to preserve fingerprints.
Don’t bend the Pen drives, Floppy, CDs, etc.
Don’t place labels directly on Floppy drive/CD.
FORWARDING DIGITAL EVIDENCE
If the seized CPU is important as regards evidentiary value,
the same should be sent to the Cyber Forensic Laboratory,
Hyderabad with a questionnaire on the following address
through a special messenger.
THANK YOU!

More Related Content

What's hot

Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
DINESH KAMBLE
 
Charred documents
Charred documentsCharred documents
Charred documents
NishantPahuja3
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
Elliot Ward
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video ForensicsDipika Sengupta
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
Prashant Mehta
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
VAISHNAVI BHEDODKAR
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
noorashams
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Incident response process
Incident response processIncident response process
Incident response process
Bhupeshkumar Nanhe
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
Ishan Tiwari
 
Gait pattern.pptx
Gait pattern.pptxGait pattern.pptx
Gait pattern.pptx
MATANGI LAD
 

What's hot (20)

Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Charred documents
Charred documentsCharred documents
Charred documents
 
A Brief History of Secret Writing
A Brief History of Secret WritingA Brief History of Secret Writing
A Brief History of Secret Writing
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Handwriting and Document Examination
Handwriting and Document ExaminationHandwriting and Document Examination
Handwriting and Document Examination
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Data recovery
Data recoveryData recovery
Data recovery
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Incident response process
Incident response processIncident response process
Incident response process
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
 
Gait pattern.pptx
Gait pattern.pptxGait pattern.pptx
Gait pattern.pptx
 

Similar to Search & Seizure of Electronic Evidence by Pelorus Technologies

Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level OneCTIN
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingCTIN
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
University of Southern Mississippi
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftCTIN
 
Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure SandybCTIN
 
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
David Sweigert
 
Bag and Tag
Bag and TagBag and Tag
Bag and TagCTIN
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
John LEE
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesSTO STRATEGY
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence SeizureCTIN
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-bBbAOC
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
Jan Geirnaert
 
Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
Gol D Roger
 
pda forensics
pda forensicspda forensics
pda forensics
saddamhusain hadimani
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
Andre Debilloez
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 

Similar to Search & Seizure of Electronic Evidence by Pelorus Technologies (20)

Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For PolishingEvidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
 
Evidence Seizure Sandyb
Evidence Seizure SandybEvidence Seizure Sandyb
Evidence Seizure Sandyb
 
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
 
Bag and Tag
Bag and TagBag and Tag
Bag and Tag
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Evidence Seizure
Evidence SeizureEvidence Seizure
Evidence Seizure
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
 
pda forensics
pda forensicspda forensics
pda forensics
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
MADS6638
MADS6638MADS6638
MADS6638
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 

More from urjarathi

Creating values through electromechanical solutions
Creating values through electromechanical solutionsCreating values through electromechanical solutions
Creating values through electromechanical solutions
urjarathi
 
Select the best Fire Fighting Pump - Vemc
Select the best Fire Fighting Pump - VemcSelect the best Fire Fighting Pump - Vemc
Select the best Fire Fighting Pump - Vemc
urjarathi
 
Vmzinc: Train Station Architecture & Design Projects Around the World
Vmzinc: Train Station Architecture & Design Projects Around the WorldVmzinc: Train Station Architecture & Design Projects Around the World
Vmzinc: Train Station Architecture & Design Projects Around the World
urjarathi
 
Vmzinc: Famous Architects Projects
Vmzinc: Famous Architects ProjectsVmzinc: Famous Architects Projects
Vmzinc: Famous Architects Projects
urjarathi
 
Top Vmzinc Perforation Projects Worldwide
Top Vmzinc Perforation Projects WorldwideTop Vmzinc Perforation Projects Worldwide
Top Vmzinc Perforation Projects Worldwide
urjarathi
 
Supreme Vmzinc Woods Projects Across The Globe
Supreme Vmzinc Woods Projects Across The GlobeSupreme Vmzinc Woods Projects Across The Globe
Supreme Vmzinc Woods Projects Across The Globe
urjarathi
 
From modest water pump supplier to an electro mechanical solution provider
From modest water pump supplier to an electro mechanical solution provider  From modest water pump supplier to an electro mechanical solution provider
From modest water pump supplier to an electro mechanical solution provider
urjarathi
 
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS  KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
urjarathi
 
Knowledge Sharing Session on Fire Fighting Pumps
Knowledge Sharing Session on Fire Fighting PumpsKnowledge Sharing Session on Fire Fighting Pumps
Knowledge Sharing Session on Fire Fighting Pumps
urjarathi
 
Control panel brochure
Control panel brochureControl panel brochure
Control panel brochure
urjarathi
 
Vijay Engineering and Machinery Company - Corporate Profile
Vijay Engineering and Machinery Company - Corporate ProfileVijay Engineering and Machinery Company - Corporate Profile
Vijay Engineering and Machinery Company - Corporate Profile
urjarathi
 
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
urjarathi
 
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONSA STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
urjarathi
 
Brand packaging design company in mumbai @pods
Brand packaging design company in mumbai @podsBrand packaging design company in mumbai @pods
Brand packaging design company in mumbai @pods
urjarathi
 
CONTROL PANELS BROCHURE | VEMC
CONTROL PANELS BROCHURE | VEMCCONTROL PANELS BROCHURE | VEMC
CONTROL PANELS BROCHURE | VEMC
urjarathi
 
Why Do We Need Control Panels?
Why Do We Need Control Panels?Why Do We Need Control Panels?
Why Do We Need Control Panels?
urjarathi
 
Top fashion designing colleges in mumbai | raffles design
Top fashion designing colleges in mumbai | raffles design  Top fashion designing colleges in mumbai | raffles design
Top fashion designing colleges in mumbai | raffles design
urjarathi
 
Importance of Solar Energy in India | Solar Energy PDF
Importance of Solar Energy in India | Solar Energy PDFImportance of Solar Energy in India | Solar Energy PDF
Importance of Solar Energy in India | Solar Energy PDF
urjarathi
 
VEMC Control Panels
VEMC Control PanelsVEMC Control Panels
VEMC Control Panels
urjarathi
 
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURESOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
urjarathi
 

More from urjarathi (20)

Creating values through electromechanical solutions
Creating values through electromechanical solutionsCreating values through electromechanical solutions
Creating values through electromechanical solutions
 
Select the best Fire Fighting Pump - Vemc
Select the best Fire Fighting Pump - VemcSelect the best Fire Fighting Pump - Vemc
Select the best Fire Fighting Pump - Vemc
 
Vmzinc: Train Station Architecture & Design Projects Around the World
Vmzinc: Train Station Architecture & Design Projects Around the WorldVmzinc: Train Station Architecture & Design Projects Around the World
Vmzinc: Train Station Architecture & Design Projects Around the World
 
Vmzinc: Famous Architects Projects
Vmzinc: Famous Architects ProjectsVmzinc: Famous Architects Projects
Vmzinc: Famous Architects Projects
 
Top Vmzinc Perforation Projects Worldwide
Top Vmzinc Perforation Projects WorldwideTop Vmzinc Perforation Projects Worldwide
Top Vmzinc Perforation Projects Worldwide
 
Supreme Vmzinc Woods Projects Across The Globe
Supreme Vmzinc Woods Projects Across The GlobeSupreme Vmzinc Woods Projects Across The Globe
Supreme Vmzinc Woods Projects Across The Globe
 
From modest water pump supplier to an electro mechanical solution provider
From modest water pump supplier to an electro mechanical solution provider  From modest water pump supplier to an electro mechanical solution provider
From modest water pump supplier to an electro mechanical solution provider
 
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS  KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
KNOWLEDGE SHARING SESSION ON FIRE FIGHTING PUMPS
 
Knowledge Sharing Session on Fire Fighting Pumps
Knowledge Sharing Session on Fire Fighting PumpsKnowledge Sharing Session on Fire Fighting Pumps
Knowledge Sharing Session on Fire Fighting Pumps
 
Control panel brochure
Control panel brochureControl panel brochure
Control panel brochure
 
Vijay Engineering and Machinery Company - Corporate Profile
Vijay Engineering and Machinery Company - Corporate ProfileVijay Engineering and Machinery Company - Corporate Profile
Vijay Engineering and Machinery Company - Corporate Profile
 
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
Industrial Water Pump Dealer & Manufacturer | Vijay Engineering and Machinery...
 
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONSA STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
A STEP TOWARDS A GREENER FUTURE | VEMC SOLAR SOLUTIONS
 
Brand packaging design company in mumbai @pods
Brand packaging design company in mumbai @podsBrand packaging design company in mumbai @pods
Brand packaging design company in mumbai @pods
 
CONTROL PANELS BROCHURE | VEMC
CONTROL PANELS BROCHURE | VEMCCONTROL PANELS BROCHURE | VEMC
CONTROL PANELS BROCHURE | VEMC
 
Why Do We Need Control Panels?
Why Do We Need Control Panels?Why Do We Need Control Panels?
Why Do We Need Control Panels?
 
Top fashion designing colleges in mumbai | raffles design
Top fashion designing colleges in mumbai | raffles design  Top fashion designing colleges in mumbai | raffles design
Top fashion designing colleges in mumbai | raffles design
 
Importance of Solar Energy in India | Solar Energy PDF
Importance of Solar Energy in India | Solar Energy PDFImportance of Solar Energy in India | Solar Energy PDF
Importance of Solar Energy in India | Solar Energy PDF
 
VEMC Control Panels
VEMC Control PanelsVEMC Control Panels
VEMC Control Panels
 
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURESOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
SOLAR SOLUTIONS A STEP TOWARDS A GREENER FUTURE
 

Recently uploaded

Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 

Recently uploaded (20)

Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 

Search & Seizure of Electronic Evidence by Pelorus Technologies

  • 1. SEARCH & SEIZURE of Electronic Evidence
  • 2. DIFFERENCE BETWEEN 1. Less tangible than Physical Evidence 2. Made of magnetic field and electronic pulses 3. It can be duplicated exactly and a copy can be examined exactly as if were the original 4. It can be destroyed, damaged or manipulated easily but at the same time the deleted data can be recovered easily using proper methods Digital Evidence 1. Tangible Evidence 2. Consists of real world physical things 3. It is not possible to duplicate physical evidence. Original needs to be examined 4.Deleted or destroyed evidence is hard to bring in its original form Physical Evidence
  • 3. DIGITAL EVIDENCE IS EVERYWHERE Terrorism Child Pornography Crimes of Violence Trade secret theft Theft or destruction of intellectual property Financial crimes Property crimes Internet crimes Fraud
  • 4. IMPEDIMENTS IN THE INVESTIGATION OF CYBER CRIME There is no eye-witness account to the digital crime. It is a trans-national crime. The investigation becomes difficult as the procedures to acquire evidence are too tedious and time-consuming. The extradition process is tedious too.
  • 5. DIGITAL EVIDENCE MAY NOT BE DESTROYED “Deleted” files really aren’t Even “erased” files can be recovered as a result of how the write heads drift “Physically destroyed” drives can be recovered in many cases Experienced forensic technicians can recover data even if the device is damaged
  • 6. PREPARATIONS / PRECAUTIONS FOR SEARCH AND SEIZURE Preparations Before going to Search and Seizure Precaution to be taken on reaching the search spot Precaution to be taken After Search and Seizure
  • 7. PREPARATIONS BEFORE GOING TO SEARCH AND SEIZER Still and video camera Hand gloves Permanent Markers Labeling Materials Sealing Materials Stationary Finger Print development kit Take along Digital Forensics Analyst
  • 9. LABELING MATERIALS, SEALING MATERIALS & STATIONARY
  • 11. TAKE ALONG DIGITAL FORENSICS ANALYST
  • 12. PRECAUTION TO BE TAKEN ON REACHING THE SEARCH SPOT Secure the spot Preserve the fingerprints Restrict the access to a computer(s) Don’t accept the help of the suspect for operating the computer Make the Computers Standalone(Remove LAN/Telephone/ If computer is/are “OFF”; don’t turn “ON” Wi-fi/Blue tooth etc)
  • 13. PRECAUTION TO BE TAKEN ON REACHING THE SEARCH SPOT Some screen savers will show that the computer is off hence to make sure by checking the light of CPU. If the computer is “ON” then note down the date and time of the computer system, don’t try to correct it. Take the photograph of the Monitor screen
  • 14. PRECAUTION TO BE TAKEN ON REACHING THE SEARCH SPOT Don’t shut down the computer in the normal manner but for shutting down pull the power cord from the CPU and not from the wall point. (to avoid the booby trap) Photograph the scene, then disconnect all power sources; unplug from the wall and also from the back of the system. Draw the sketch of the scene of the spot.
  • 15. PRECAUTION TO BE TAKEN ON REACHING THE SEARCH SPOT Label all the types of equipment, connectors, and cable ends to allow reassemble as needed. Seal all the ports and also screws of the CPU with a paper seal. Pack and seal the equipment carefully and a sample of the same seal must be sent to the FSL where the analysis of the CPU will be carried out.
  • 16. ADDITIONAL POINTS TO BE COVERED DURING THE SEARCH AND SEIZER Examine the persons, including suspects for the passwords, username, etc. Search the premises for the printouts, handwritten notes, diary, notebooks, etc, for the passwords, username, etc. Search the premises for the software /programs, printouts, handwritten notes, financial transactions, books, etc, which may be of vital importance to the investigation. In personal search look for the pen/flash drives which might be attached to key chain and may contain huge important data.
  • 17. WHAT SHOULD BE SEIZED Portable/external storage devices Relevant printouts CPU Leads in certain cases (Doubt seek expert advice) Hard disk not fitted in PC Modems (Some may contain Phone nos)
  • 18. WHAT SHOULD BE SEIZED MMC/Memory Sticks Digital Cameras CPU Back up tapes Wireless Network Cards If finger prints are present on Key board, mouse, Monitor, Printer etc
  • 19. SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS SET (Devices we expect)
  • 20. SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS SET (Devices we don't expect)
  • 21. SCREW DIGITAL EVIDENCE CAN BE ANYWHEREDRIVERS SET Places we don’t expect (wireless hard drives)
  • 22. SCREW DIGITAL EVIDENCE CAN BE ANYWHERE DRIVERS SET (Global Positioning Sensors)
  • 23. PRECAUTION TO BE TAKEN AFTER SEARCH AND SEIZER Packaging Transportation Storing
  • 24. PACKAGING, TRANSPORTATION AND STORING THE SEIZED COMPUTER Due to the sensitive and fragile nature of the computer evidence place the computer in a box properly cushioned with non-static material. Store the computer in a secure and dust-free place. The storage place should be away from the magnetic field, radio transmitters, and otherwise hostile environments. Store it in normal temperature
  • 25. PACKAGING, TRANSPORTATION AND STORING THE SEIZED COMPUTER The storage should not come in contact with water. As far as possible cover the mouse and keyboard with a polythene cover to preserve fingerprints. Don’t bend the Pen drives, Floppy, CDs, etc. Don’t place labels directly on Floppy drive/CD.
  • 26. FORWARDING DIGITAL EVIDENCE If the seized CPU is important as regards evidentiary value, the same should be sent to the Cyber Forensic Laboratory, Hyderabad with a questionnaire on the following address through a special messenger.