Cyber Forensics - Cyber Crime Investigation

By

Puneet Nagpal

(Master of Science Cyber Law and Information Security)

Indian Institute of Information Technology, Allahabad.

FORENSICS:-

Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to the legal system. This may be in relation to a crime or to a civil action.

COMPUTER FORENSICS



It is the art of finding the attacker that what is he doing in the cyber world?

Locard's Exchange Principal -

"ANYONE OR ANYTHING ENTERING IN THE CRIME SCENE TAKES SOMETHING OF THE SCENE WITH THEM & LEAVES SOMETHING OF THEMSELVES BEHIND THEY
DEPART"

Also the GOLDEN RULE of forensic says-"IF U WANT TO FIND OUT A CRIMINAL THEN U SHOULD ALSO A CRIMINAL"

Because the hackers/crackers are almost 2-steps further than a simple one.

->Possible suspects of computer crime-

.internal disgruntled employees
.visitors steel data using pen drives etc.
.external attackers
.company associates

Another one is that your opposing companies can hire an hacker

->Motive-

.profit
.unhappy
.accidental
.blackmail

->Medium of attack-

.internet
.chat
.internal networks
.e-mail
.phone/fax

Cyber Crime Investigation:-

Steps to follow by Investigation Team on Spot :-

.Data imaging- Never use the suspect pc.

.Evidence preservation- Store the data on more than one places

.Data discovery- From each & every location

.Evidence study- Look for possible suspects & motives

.Non-Electric Study- Interview witness & colleagues

.Preparing the report- Make sure that Ur report will be able to convince someone from the non-technical background

.Challenges faced- Identity thefts & Data hiding techniques

If you are able to make a good final report u will find out the criminal very easily.

In case of network security, you can easily find out the attacker by tracing e-mail id.

(A) DATA IMAGING :-

Never use the original suspect computer because use may destroy date by time dependent viruses from attacker. A good computer forensic expert never user original suspect computer.

- Pull the plug and shutdown the machine
- Use Hard disk on another computer foe backup copy of suspect machine hard disk.
- Create a sector by sector Image/Clone of hard disk

Image: - Disk to File
Clone: - Disk to Disk

- Remove the link from Operating System stored on hard disk are known as Live Files and the files which are not accessed after removing from operating system are Known as Dead Files.

( B ) EVIDENCE PRESERVATION :-

The Image/clone copy of evidence must be stored in secure storage to avoid any alteration of data. It should store on some optical media. Floppy is not reliable at all.
-Store data on more than one location.
-Always use write-protect all image/clone copy media to ensure secured continues preservation.
-Any delay potentionally lead to loss.

(C) DATA DISCOVERY :-

All type of data /evidence must be discovered from various locations.

Discovery of active data: - These are encrypted hidden active files like Ms-word, Pdf, E-mails,*.mdb
Discovery of Backup data using recovery
Temporary swap files. Eg
. Autos in Ms-office.
Discovery from residual data .- From bad sectors
Discovery of other data as follows :-
System files
Access control lists
E-mail accounts
Internet cookies
System Registry and security policies
Interview the people involved
History
Gain access to encrypted/password protected files etc.

(D) EVIDENCE STUDY :-

a) Study the proofs and look for possible suspects and motives
b) Analyze evidence and look for proof which is acceptable in court of law and can be used to convict the suspect.

(E) NON-ELECTRIC STUDY :-

a) Interview with colleagues to gain more insight into case

b) Look for both a possible suspect and probable motive then finally match them to proof

c) Don't forget to examine the suspect's home desktop, laptop, or any other removable media. They may contain vital proofs.

(F) PREPARING THE REPORT :-

Make sure that your report will be able to convince someone from non-technical back round that suspect is indeed guilty.
Don't forget to provide a non-technical overview and explanation of Cyber Crime.
Also always add technical evidence in your report

Investigation agencies in India :-

Government (Central & State Law Enforcement) Sector:

The State Forensics Science Laboratory, New Delhi
The State Forensics Science Laboratory, Gujarat
The Delhi Police- Special Cell
CID Police Hyderabad
CBI New Delhi
Anti-terror squad
EOW and RAW
Cyber Crime Investigation Cell of Crime Branch, C.I.D.,Mumbai

What investigation agencies do ?

Professional Computer Forensics
E-discovery
Investigations & Incident Response Services to Corporate, Law Enforcement, Law
firms, Fraud Investigators and individuals around the world.

Various Types of kits and technologies used by investigation agencies are discussed as follows :-

1 ) Cloning/Imaging:- This is done by using various type of hardware tools on the spot. According to spot process is used either cloning or imaging. Two main things are -

Source and Destination. In case of Cloning destination can be equal in size as of source but in Imaging always destination should large in size than source.

2 ) Write Blockers:- Write blocker plays an important role in the investigation activities. Using them a Cyber Crime Analyst is free to do the cloning and imaging. These are always in read only mode and helps to clone and image the suspect hard drive without changing its hash value.

3 ) Data Recovery:- This is one of the favorite process used by the cyber crime investigator because it is used to recover the data from various locations which makes the investigation so easy as per investigation rule that 'Information Gathering Is The Basic Step of Investigation. Various locations includes:-

Discovery of active data: - These are encrypted hidden active files like Ms-word, pdf, E-mails,*.mdb
Discovery of Backup data using recovery
Temporary swap files. Eg
. Autos in Ms-office.
Discovery from residual data.- From bad sectors

Discovery of other data as follows :-
System files
Access control lists
E-mail accounts
Internet cookies
System Registry and security policies
Interview the people involved
History
Gain access to encrypted/password protected files etc.

We can recover the formatted data from the format media but we can never recover the data from wiped media. Because while on formatting the address is deleted from the FAT/FAT32 table not the content but while on wiping the media the content is also deleted.

4 ) Movement Analysis:- This process is used to identify the actual location of the criminal on the spot. This is done by using various investigation processes (Cdr Plays Interesting Role)

5 ) Password Cracking:- Investigation agencies love to do the technique of Password Cracking using various hardware tools. The cracking is done at various levels as follows:

-Cracking physical media
-Wireless detectives
-Network password cracking-LAN password cracking
-Handling Cryptography
-E-mail Cracking
-Files / Applications password cracking using Hardware or portable software's using special dongles

6) Financial Crime analysis: - Investigation Agencies are using various techniques and tools under Law on the Financial Crime Investigation Service Act.

7 ) Mobile phone Investigation: The recovered mobile phones are examined by the special investigation officers using various tools that

Extract data for all mobile phones includes:-

Phonebook, Videos, Text messages, Call Logs , ESN(Electrinic Serial No.) and IMEI(International Mobile Equipment Identity) , IMSI (International Mobile Subscriber Identity) information.

8) Network Forensics: - Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. There are various tools and techniques used by Cyber crime investigation cells in the area. This investigation includes :-

Live network investigation

Live forensic discovery and triage of simultaneous target systems

Acquire system information

Physical memory imaging

Remote screen shot

Active port mapping

Windows service discovery

File system blueprinting

Installed software cataloging

Network state and open connections

Intelligent file acquisition and safeguarding
Dynamic
indexing and analysis (Memory, Registry, File System, Image, etc.)

 

CHALLENGES FACED : -

Anonymous web activity through proxy
Internet cafes
IP Spoofing
Identity Thefts
Common using systems like in colleges /offices
Encryption of data
Steganography

Safety and Precautions : -

Precautions- Cyber Crime Investigator's safety comes first

Safety tips :-

-To secure the crime scene, always wear gloves to prevent distributing potentional evidence

-Must documents, video tapes or photographs and write all notes about all that is on the scene of digital devices.

-Seal computer or any other digital device by placing evidence tape along the edges of computer housing panel

-Place your initiates date and time over the seal with permanent ink

-When you are removing the cables or devices, label each part and empty sockets as MTY.
This helps in establishing a proper Chain of Custody.

These precautions are followed in searching and seizing operation by investigation agencies.

Always we deal with the two main states of computers in investigation either on or off. Intelligent investigation says that never change the state of evidence use it its pre-existing state.

 

Cyber Crime Police Stations in Different States of India

Location

Address

Telephone No

E-mail

Chennai

Assistant Commissioner of Police
Cyber Crime Cell
Commissioner office Campus
Egmore, Chennai- 600008

55498211

cyberac@rediffmail.com
baluac@vsnl.net

Chennai for Rest of Tamil Nadu

Cyber Crime Cell
CB, CID
Chennai

Mobile: 98410-13541
Off: 25393359

cbcyber@tn.nic.in Notification

Bangalore for the Whole of Karnataka

Cyber Crime Police Station
C.O.D Headquarters,
Carlton House,
# 1, Palace Road,
Bangalore - 560 001

22201026
22943050
22387611 (FAX)

ccps@kar.nic.in
ccps@blr.vsnl.net.in
http://www.cyberpolicebangalore.nic.in/
List of e-mail addresses of all Senior Police officers in Karnataka

Hyderabad

Crime Investigation Department,
3rd Floor, D.G.P. Office,
Lakdikapool,
Hyderabad-500004

23240663, 27852274
23297474 (Fax)

cidap@cidap.gov.in
info@cidap.gov.in
http://www.cidap.gov.in/cybercrimes.aspx

Mumbai

Cyber Crime Investigation Cell
(Crime Branch, C.I.D),
Annex-III Building,
Police Commissioner Office,
Crowford Market,
Mumbai

22630829
22641261

officer@cybercellmumbai.com
http://www.cybercellmumbai.com/

Delhi

CBI Cyber Crime Cell

Supdt. of Police, Cyber Crime Investigation Cell Central Bureau of Investigation,
5th Floor, Block No.3, CGO Complex, Lodhi Road,
New Delhi - 3,

4362203, 4392424 :

cbiccic@bol.net.in

Trivandrum

Cyber Crime Reporting Center

Call center
(0471) 2727004

http://www.cyberkeralam.in/


Hence in last I would like to address one thing that please never hesitate while lodging complaint of Cyber Crime. Do not take it easy it's a serious matter and it's our responsibility to fight against it. But one question I want to ask:-

Is War against Crime a Crime?