Forensic Evidence and Investigation Method
Forensic Evidence and Investigation Method
ne.
Introduction technology (IT) based interventions has
information developmente
Internet and other every day. Like other
Use of Computer, but also is expanding
aspectsof human life, commission of crime, Ae
only touched almost all interventions are also being misused for
Technology, IT based prevetion
in Science and imperative that officers and staff dealing with
technology, it is preventing
this involvesuse of high-end adequately equipped with latest knowledge for
of crime are nabbing the
as well as investigation undertaking investigation of crime to its logical end for
commission of crime and also law. The Cyber Forensics Division
undertakes
as per due process of
culprit and imposing punishment phones including SIM card and other digital
storage media
Hard disk, Mobile
examination of Computer
like memory card, pen drive, CD, DVD etc.
What is Cyber Crime?
computers or the Internet.
crime is a type of criminal activities carried out by means of
Cyber or a target or both.
considered to be unlawful acts where in the computer is either a tool
Cyber crime instruction
electronic device that takes data as input process the data using set of
Computer is an software.
computer system consists of hardware and
(called program) and gives result (output). A
Types of Cyber Crime:
Unauthorized data access.
Hacking/Cracking of Password, e-mail account, website etc.
Mobile Threats
Cyber Terrorism
Denial of Service
Fake website for cheating
Credit card fraud
Spreading pornography
email as threat or harassment
Phishing
Image morphing
Ransomware
Investigator's Guide 457
Complaint Received
|Pre-Investigation Assessment
Criminal Offence
Issue Notices to
Register FIR
External Agencies
to provide Data
Document
everything, Photo Scene ofCrime
graphy/Videography
Evidence Seek Technical/
Collection Expertise Expertise help
Interviewing External/Third
Witness/Accused Evidence
Collection and Packing Party Service
/Victim Provider Evidence
Digital Forensic
Analysis Request
Collect Reports
Forensic Report and Information
Evidence
Sources of Digital
SCSI
Ultra ATA SATA
External
Solid State Mobile Phones
Various Types of Hard Disks
460
suspect for the pIN/
password or PIN or pattern lock, ask the
protected with
If adevice is lock.
pattern/password and disable user keeping the phone
the network bykeeping it on flight mode or
Isolate the mobile device from
phone.
in a faraday bag.
and accessories related to the seized mobile
Whenever possible get all cables
Electronics exhibits to FSL for Scientific analysis
Guidelines for packing/sending
Forwarding letter
Brief history of the case.
The details of the exhibits
seized and their place of seizure.
media.
make and description of the Hard disk or any other storage
The model,
model, make, IMEI, SIM No, Battery and memory card details.
For mobile phones crime.
to the scene of
The date and time of the visit crime.
system/mobile (on or off) at the scene of
The condition of the computer
a network ?
Is it a stand-alone computer or with external
computer has any Internet connection or any means to the communication
Is the
computers ?
Specimen seal of the forwarding authority.
Certificate of authority.
antistatic bags/faraday bag.
Exhibits must be properly sealed preferably by use of
Each exhibit should be marked/ labelled properly.
the suspect hard disk
For each Hard disk analysis, a blank hard disk of capacity more than the size of
should be sent along with suspected hard disk.
FORENSIC EVIDENCE
478
Chemistry
carat?
21. Are the ornaments made of gold? What is the have been dissolved in the proree
22. Whether the solution contains gold particles which might
of cleaning the gold ornaments?
acid? What is the acid?
23. Do the wearing apparels of the victimcontain
24. Is it corrosive chemical and can endanger human life?
being?
25. Is it chilly powder/ whether it can cause harm to human
26. Does the hand wash contain detective dye (in trap cases )?
present in the container/cloth etc?
27. Whether any corrosive substances are
human beings?
28. Name & type of the acid/corrosive substance. Can it cause harm to
Explosives
29. Is there anyexplosive substance in the exhibits marked a, b, C...? If so name of the explosiv
substance present in them.
30. Are the exhibits nmarked w1, w2, w3.... used for the preparation of explosive?
31. What is the probable mechanism of the diffused explosive device as per the remnants collected
from the device?
32. Whether the items like glass, nail, stone chips...can be used as splinter in the explosive device?
33. Whether there is any explosive like RDX or any other high explosive present in the paste like
substance ?
exhibit ...
marked as
Retrieve the chat data (Facebook messenger, WhatsApp, Telegram, imo etc) from mobile phone
8. marked X
details of the exhibit marked 'X'
ProvidelMEl de
9. Retrieve the data contents like installed application/User accounts details/Web search history/
10 marked 'X' and provide the details.
from the exhibit
Any other interesting findings related to the case may be furnished.
11.
Exhibit-Hard disk/ Laptop
12
ootrieve documents like word, excel, pdf etc. / Audio/images/video clips from the exhibit
marked X' and provide the details.
13
wbether any obscene pictures/images/video clips related to the attached hardcopy photo are
ctored in the exhibit marked 'A. If so furnish the details.
Otrieve the contents of source codes/files with names ( abc, xyz etc) from the exhibit marked
14. details.
X' and furnish the
Check whether any files with extension .doc/.exe/ppt etc with the file name abc" are stored in
15.
the exhibit marked 'X. If so furnish the details.
Check whether any files related to the attached exhibit (specimen document or image) are
16.
stored in the exhibit marked 'A. If so please provide the details.
data/Social media
17. Retrieve user account/web search history/installed software list/email/Chat
provide the
data/ web browsing history/USB devices list from the exhibit marked X and
details.
marked 'A'ondd.mm.yyyy.
18. Whether the email id pgr@abc.com was accessed from the exhibit
sales/stock/purchase/employee record are stored in
19. Whether any database files related to the
the exhibit marked X' .If so furnish the details.
A-ll
Crime-Case-Exhibit Forwarding Form
Specimen Cyber
To
The Director
State Fore nsicScience Laboratory
From:-.
Date.
Memo no
FORENSIC EXAMINATION
CASE FORWARDING NOTE FOR
Case No:..
.Date.
U/S:
District:
Police Station:...
Parcel No
4 Pendrive Make :
Capacity
S/N:
5 CD Make :
Capacity :
6 DVD Make :
Capacity:
required/questionnaires:
V. Nature of examination
1).
2)....
Signature of the Investigating Officer
and Contact No
Specimen Seal Name & Designation
Forwarding Authority
Signature of the and Seal
Designation, Contact No
Name,
496 FORENSIC EVIDENCE
CERTIFICATE OF AUTHORITY
Certified that the Director, State Forensic Science Laboratory,
has the authority to examine the forwarded electronic exhibits of the Caco
no. Date... ..P.S...
........u/S.. ..,and if desired to install or uninstall
programs/software or perform rooting or break the software enabled security lock
or delete or alter data for the purpose of
examination. The Director/Examiner will
not be liable for any loss of data and
damage of storage media etc. during the
exhibits analysis.
CHECK LIST
Brief history of the case along with case
reference
1. Yes/No
Duly packed, labelled and sealed exhibits
2. Yes/No
Specimen seal in wax
3.
Yes/No
Attested copy of FIR/Seizure list
Yes/No
4.