Module V
Module V
The investigation in cybercrime requires special skill and scientific tools without
which investigation is impossible. The Information Technology Act, 2000
provides certain provisions on investigation of cybercrime. Certain changes
have also been done in the CrPC and the Evidence Act with regard to this.
Investigation in Cybercrime
Crimes became more complex with the advancement of technology, and criminals
became more sophisticated, as their modus operandi is incomparable to the
normal investigation methods. Information technology provides a chance to the
criminals to commit crimes such as attacks against the security of critical
infrastructures like tele-communication, banking and emergency services. Such
crimes could also be committed through computer networks across the national
borders, affecting individuals and that may also result in compromising the
security and the economy of the nation.
The criminal offence is committed in one country extents to the other country
and even to many other countries. The speed and accuracy is additionally in no
time and excellent.
The Information Technology Act, 2000 has set up a special procedure for
investigation and further proceeding in cybercrime contended which makes
cybercrime investigation slow. Section 78 of the Act describes that the
investigation of cybercrime shall be done by an inspector. Before the
Amendment of 2008 in IT Act, the power of investigation was with the Deputy
Superintendent of Police. The object behind this amendment is to bring the
cybercrime for investigation in mainstream as sort of conventional crime. This
gives power to the inspector to register and investigate the cybercrime just like
other traditional crimes. There are various problems and various minute
processes required for the investigation of cybercrime. No single proceeding is
often laid down within the investigation of the cybercrime.
With the rise in the domain of the internet, it is now possible for an individual
sitting in one country to hack into someone’s account in another country.
Therefore, to fight against cybercrime, the CBI has created a specialized
structure. They are:
To ensure that such evidences are admissible in the court, it should be ensured
that all the process and formalities are followed properly. This means that every
document is seized in a proper legal manner and the chain of custody is
not broken.
The purpose of the organs of the cybercrime department is to police the internet
to ensure that cybercrime can be stopped before it is committed.
Investigation of Cybercrime
These are the techniques to search and seizer in investigation of cyber crime.
Application of these techniques of search and seizer can make the
investigation effective.
Cyber Forensics
The word ‘forensic’ can be understood as, the application of scientific methods
and techniques in the investigation of crime. It provides a new and different way
to the investigator for investigating the crime by using modern technique. Use
of forensic tools is important to make the investigation in technical crimes. The
criminals these days are using modern techniques to commit crimes. Therefore,
Forensic Science offers a useful way to trace the truth. This technology is very
useful in the traditional offences also, because it has invented and discovered
various things, which can be used to know the truth behind the incident, act or
crime.
Computer Forensics
Computer forensics is the study of computer technology. Computer
forensics is the science of applying computer science to aid the legal
process. It is more than the technological, systematic inspection of the
computer system. Computer forensics requires expertise and tools that
goes beyond the traditional data collection and preservation techniques
available to end-users or system support personnel. Computer Forensics
is just the appliance of computer investigation and analysis techniques
within the interests of determining potential legal evidence.
IP Address: When a cybercrime is committed using a particular device,
one of the most useful ways to trace the user by detecting the IP address.
IP address means Internet Protocol Address. Every computer or devices
communicate through the IP address that’s allotted either on a static or
dynamic basis and this is the reason why law enforcement agencies
throughout the world use IP address to trace cyber criminals. This is the
common mode to trace out the person, who is behind the any crime
committed through internet.
There are two types of IP address
a. Statics and
b. Dynamic
Challenges faced
The Section 17 of the Indian Evidence Act deals with admission, this
Section now includes the statement in electronic form.
Section 22A of Indian Evidence Act, 1872, deals with the relevancy of
oral evidence regarding the content of electronic record. It says the
contents of electronic records are not relevant, unless the genuineness of
the electronic record produced is in question.
Section 88A of the evidence Act, 1872 grants discretion to the court to
presume that an electronic massage forwarded by the originator through
an electronic mail server to the addressee correspondents with the
massage as fed into his computer transmission. Section 88A clarifies that
the court shall not make any presumption as to the person by whom such
electronic massage is sent. The law thus accepts the vulnerability of
fabrication of electronic message.
The next amendment in the Indian Evidence Act 1872, is Section 45A of
the Evidence Act, which provides, 45A.
Opinion of Examiner of Electronic Evidence.- When in a proceeding, the
court has to form an opinion on any matter relating to any information
transmitted or stored in any computer resource or any other electronic or
digital form, the opinion of the Examiner of Electronic Evidence referred
to in section 79A of the Information Technology Act, 2000(21 of 2000) is
a relevant fact.
Thus, the various provisions of the evidence Act deals with the electronic
or digital evidence.