Forensics Bi-MonthlyMagazine Issue4
Forensics Bi-MonthlyMagazine Issue4
PSYCHOLOGICAL
TRAUMA AND
COPING Behind the Profile:
MECHANISMS Exploring the
AMONG DOMESTIC
VIOLENCE Most Reliable
SURVIVORS: A Methods in
LONGITUDINAL Criminal Profiling
STUDY
Decoding
Cybersecurity:
The Inspiring
Journey and
Expert Insights in
Ethical Hacking
and Digital
The Atul Subhash Case: A Tragic Forensics
Intersection of Matrimonial Disputes
and Legal Complexities Interview with Sachin Dedhia
& MANY
MORE
EXCITING ARTICLES
Table of
CONTENT
Forensic Automation Using Machine Pg 10
Learning and Behavioral Patterns
CONTENT
Digital Footprints: How Forensic Pg 61
Experts Use Technology to Solve Cyber
Crimes
CONTENT
Automated PFAS Extraction : Pg 105
A Revolution in Forensic Environmental
Analysis
External Editors
Mr. Kiran R Dodiya Dr. Parvesh Sharma Mr. Akash Patel Ms. Divya Patel
Ms. Grishma Pithiya Ms. Mandvi Singh Ms. Ria Ghosh Mr. Vikram K. Hankare
Abstract 1. Introduction
The fast improvements in machine Forensic science plays a pivotal role
getting-to-know (ML) and artificial in solving crimes, analysing proof, and
intelligence (AI) have converted the ensuring justice. Traditionally,
landscape of forensic technology. forensic investigations involve
This article explores how ML manual collection, examination, and
algorithms and behavioural evaluation of proof, which may be
evaluation styles automate traditional time-consuming, exertion-intensive,
forensic processes, decorate and susceptible to errors. The
accuracy, and improve performance. integration of device-gaining
When integrated with ML techniques, knowledge of (ML) and behavioural
including supervised learning, deep forensics automates repetitive
learning, and pattern reputation, tactics and enhances selection-
behavioural forensics affords a making skills.
robust solution for figuring out
personal activities, anomalies, and 1.1. Evolution of Forensics with AIML
unauthorised operations. A case With the evolution of technology, ML
takes a look at facial recognition strategies have allowed forensic
integrated with behavioural sample professionals to research complex
prediction in automating safety raise statistics units, discover styles, and
operations is presented, highlighting expect results successfully.
its realistic implications. The article Behavioural forensics, which includes
also identifies challenges together studying human conduct and sports,
with records privacy, aid enhances those techniques by
dependency, and fake positives, even offering insights into personal habits,
offering insights into future traits anomalies, and predictive
analysis(Gehl & Plecas, 2017).
10
1.2. Role of Behavioral Patterns differentiate between regular
behaviour and anomalous
Behavioural styles consult with a movements Behavioural analysis is,
series of observable sports, conduct, therefore, pivotal in identifying
or deviations exhibited through dangers, improving operational
people within a defined environment. efficiency, and automating choice-
These patterns shape the idea for making tactics in forensic
analysing human interactions, programs(García-Aliaga et al., 2021).
detecting anomalies, and predicting
destiny behaviours. When mixed with Types of Behavioral Patterns and
Machine Learning (ML) algorithms, Their Applications
behavioural pattern analysis turns
into an effective device for forensic Behavioral styles can be classified
automation, improving the potential into ordinary sports and deviations:
to hit upon unauthorised movements
and expected conduct and facilitate 1. Regular Activities
secure admission to manage These are ordinary user habits or
structures(Choi et al., 2021). behaviors that arise predictably
below everyday instances. Examples
Analysing Behavioral Patterns with include:
ML • Employees logging into systems at
the same time each day.
Machine Learning algorithms can • Residents getting access to lifts at
method and analyse full-size amounts precise hours.
of behavioural information to become • Routine patterns in actions captured
aware of deviations or abnormal via surveillance cameras.
sports. Such styles are essential in Regular patterns function as a
environments in which security, baseline for assessment whilst
surveillance, and predictive analysis detecting anomalies. Machine
play a pivotal position, such as: Learning models, together with
• Corporate networks (detecting supervised knowledge, use these
unauthorised get entry to). patterns to train the system and
• Residential safety structures predict typical personal behavior.
(predicting traveller styles).
• Law enforcement surveillance
(analysing suspect movement).
By training ML models on ancient.
consumer data, structures can
11
Example: In office surroundings, ML models • Physical Movement Tracking: Using
educated on personal login facts can surveillance systems to hit upon
predict the predicted login instances for uncommon actions in limited areas.
personnel. If an employee tries to get entry
to the device outside of the doors during Example: In smart building surroundings,
ordinary hours, the machine can flag it as behavioural statistics of citizens gaining
suspicious(Behavioral Design Patterns - access to elevators are analysed to
GeeksforGeeks, n.d.). become aware of uncommon styles, such
as an
Unauthorised moves occur when
individuals deviate from established
behavioural norms.
Example:
• Illegal System Access: ML algorithms
examine access logs and hit upon
deviations, along with login tries at odd
times or from unusual IP addresses.
• Physical Security Breaches: The
behavioural patterns of employees or
citizens are analysed to identify
unauthorised people entering restrained
2. Deviations (Anomalous Behavior) zones.
Deviations occur when a character's ML Technique: Supervised type fashions
conduct strays from its traditional patterns. like Random Forest or Support Vector
Such anomalies regularly indicate that Machines (SVMs) can classify sports as
unauthorised people are admitted to legal or unauthorised based on education
suspicious moves or capability security records.
breaches. Machine Learning strategies,
mainly unsupervised mastering and anomaly Example: In a bank's IT infrastructure,
detection algorithms, are powerful in employees are predicted to log in from
identifying those irregularities(Anomaly specific structures during workplace
Detection for Fraud Prevention—Advanced hours. If an ML model detects a device
Strategies | Fraud.Com, n.d.). gaining entry during non-operating hours,
it flags the movement as probably
Applications of Anomaly Detection: unauthorised(What Is Anomaly
• Illegal System Access: Monitoring login Detection? An Overview and Explanation,
tries outdoors of everyday styles to detect n.d.)
unauthorised moves.
• Fraud Detection: Analyzing banking
transactions to discover anomalies,
together with surprising huge withdrawals
or transactions in unusual places.
12
Applications:
• Movement Analysis: Predicting the
motion styles of individuals in surveillance
pictures to decorate protection.
• Resource Optimization: Forecasting
height raises utilisation instances in smart
homes to enhance performance.
• Criminal Behavior Prediction: Analyzing
styles in ancient crook facts to count on
illegal sports.
13
ML Techniques: Behavioural Pattern Analysis in Practice
1. Convolutional Neural Networks (CNNs): Consider a smart forensic surveillance
Extract features from facial photographs machine carried out in a secured
for correct reputation. corporate building:
2. Pattern Matching Algorithms: Compare 1. Data Collection: Surveillance cameras
actual-time facial information with pre- and access to logs gather behavioural
saved databases(Biometric Facial facts, including facial pictures, login
Recognition - Enhancing User Verification patterns, and motion paths.
and Authentication (Fraud.Com, n.d.).
Figure 2 : Pie charts illustrating the distribution of applications, challenges, and benefits in
the context of ML-driven forensic automation.
14
2.Machine Learning in Forensic 2. Behavioral Pattern Analysis:
Automation ML algorithms examine user interest and
ML strategies offer sensible systems behaviour to expect anomalies. This
which could automate the detection, application is essential in figuring out
identification, and prediction of criminal unauthorised rights of entry, fraudulent
hobbies. In forensic investigations, ML behaviour, or sudden deviations in
algorithms can analyse records units at a secured environments.
scale that exceeds human potential.
3. Automated Evidence Analysis:
2.1 Key Machine Learning Techniques in ML gear analyses evidence from big
Forensics datasets along with CCTV pictures, logs,
1. Supervised Learning: Trains fashions and virtual forensics artefacts.
using classified datasets to categorise or
expect outcomes. 4. Predictive Forensics:
Example: Detecting regarded crook Predictive models anticipate ability crook
conduct or figuring out faces in activities based on previous behaviours
databases. and datasets(Face Recognition Using
2. Unsupervised Learning: Analyzes Artificial Intelligence - GeeksforGeeks,
unlabeled statistics to find hidden styles. n.d.).
15
3.1 The Importance of Behavioral Patterns customers with unsupervised clustering
Behavioural styles help forensic systems (e.g., K-way).
apprehend: 4. Automation: Automate lift to get the
1. Frequent or authorised behaviours. right of entry for identified customers.
2. Unauthorized or anomalous sports. Trigger security alarms for anomalies.
16
2. False Positives: ML fashions, on
occasion, misclassify behaviours,
resulting in fake alerts.
3. Resource Dependency: High
computational electricity and
tremendous datasets are required for
schooling ML structures.
4. Model Accuracy: Inadequate training
datasets can impact version reliability
and accuracy.
3. Edge AI:
Example Challenge: AI models running on aspect gadgets
enable quicker actual-time analysis,
In the case of facial reputation, biases in
lowering reliance on centralised
datasets might also bring about
systems((PDF) Face Recognition
misidentifications, requiring robust and
Challenges and Solutions Using Machine
diverse statistics for model training.6. Learning, n.d.).
Future Trends in Forensic Automation. 4. Blockchain for Data Integrity:
The future of forensic science lies in Blockchain technology can ensure the
integrating rising technologies, including integrity and authenticity of forensic
the Internet of Things (IoT), Edge AI, and statistics.
explainable AI.
1. IoT and ML Integration:
Conclusion
IoT gadgets equipped with ML can
Machine-gaining knowledge of
provide actual-time forensic statistics
behavioural pattern evaluation has
from linked devices.
revolutionised forensic science with the
2. Explainable AI (XAI):
aid of automating the proof collection,
XAI ensures that ML model selections are
enhancing predictive competencies, and
transparent and interpretable for improving accuracy. Applications,
forensic professionals. together with facial reputation systems,
behavioural anomaly detection, and
predictive modelling, show off the
transformative electricity of ML in
forensics. Despite demanding situations
like statistics privacy and model
accuracy, ML-driven forensic automation
can reinforce safety and investigative
efficiency. Future advancements in IoT,
Edge AI, and blockchain will, in addition,
reinforce forensic procedures, making
investigations smarter, faster, and more
dependable.
17
References
Anomaly detection for fraud prevention - Advanced strategies | Fraud.com. (n.d.). Retrieved
December 15, 2024, from https://www.fraud.com/post/anomaly-detection
Behavioural Design Patterns - GeeksforGeeks. (n.d.). Retrieved December 15, 2024, from
https://www.geeksforgeeks.org/behavioral-design-patterns/
Biometric facial recognition - Enhancing user verification and authentication | Fraud.com. (n.d.).
Retrieved December 15, 2024, from https://www.fraud.com/post/biometric-facial-recognition
Choi, S., Kim, C., Kang, Y. S., & Youm, S. (2021). Human behavioural pattern analysis-based anomaly
detection system in residential space. Journal of Supercomputing, 77(8), 9248–9265.
https://doi.org/10.1007/S11227-021-03641-7
Face recognition using Artificial Intelligence - GeeksforGeeks. (n.d.). Retrieved December 15, 2024,
from https://www.geeksforgeeks.org/face-recognition-using-artificial-intelligence/
García-Aliaga, A., Marquina, M., Coterón, J., Rodríguez-González, A., & Luengo-Sánchez, S. (2021). In-
game behaviour analysis of football players using machine learning techniques based on player
statistics. International Journal of Sports Science and Coaching, 16(1), 148–157.
https://doi.org/10.1177/1747954120959762
Gehl, R., & Plecas, D. (2017). Chapter 10: Forensic Sciences. Justice Institute of British Columbia.
(PDF) Face Recognition Challenges and Solutions Using Machine Learning. (n.d.). Retrieved December
15, 2024, from
https://www.researchgate.net/publication/374738467_Face_Recognition_Challenges_and_Solutions_
using_Machine_Learning
(PDF) PREDICTIVE ANALYTICS FOR CUSTOMER BEHAVIOUR: DEVELOPING A PREDICTIVE MODEL THAT
ANALYZES CUSTOMER DATA TO FORECAST FUTURE BUYING TRENDS AND PREFERENCES, ENABLING
SMALL BUSINESSES TO TAILOR THEIR MARKETING AND PRODUCT STRATEGIES EFFECTIVELY. (n.d.).
Retrieved December 15, 2024, from
https://www.researchgate.net/publication/378176015_PREDICTIVE_ANALYTICS_FOR_CUSTOMER_BEHA
VIOUR_DEVELOPING_A_PREDICTIVE_MODEL_THAT_ANALYZES_CUSTOMER_DATA_TO_FORECAST_FUTURE
_BUYING_TRENDS_AND_PREFERENCES_ENABLING_SMALL_BUSINESSES_TO_TAILOR_THEIR_MARKETI
What is Anomaly Detection? An Overview and Explanation. (n.d.). Retrieved December 15, 2024, from
https://www.techtarget.com/searchenterpriseai/definition/anomaly-detection
18
Mr. Akash Patel
Assistant Professor and Program Coordinator of Cyber Security
(Cyber Security and DFIS)
NSIT-IFSCS, Gandhinagar, Gujarat, India
Grishma Pithiya
Assistant Professor (Forensic Science),
IFSCS-NSIT, Jetalpur, Ahmedabad.
19
20
Biogeolocation
Forensic Palynology
Epigenetic Age Estimation
Digital Taphonomy
Bloodstain Pattern Analysis (BPA)
Forensic Biometrics
Entomotoxicology
GSR (Gunshot Residue) Mapping
Forensic Linguistics
Geoforensics
Answer Key :
LETS UNSCRAMBLE
Unmasking Digital Voices: A
Comprehensive Guide to VoIP
Forensics
Author: Ria Ghosh
Abstract
Voice over Internet Protocol (VoIP) forensics Key Components of VoIP Systems:
is a pivotal field in digital investigations, VoIP Phones: Devices or software used to
addressing the challenges posed by the make calls. Gateways: Convert analog
increasing use of VoIP systems in legitimate signals to digital data. Softswitches:
and malicious activities. This article explores Manage call routing and switching.
the foundational technologies of VoIP, the
importance of forensics in combating VoIP- Key Components of VoIP Systems:
related cybercrimes, and the VoIP Phones: Devices or software used
methodologies used to investigate to make calls.
incidents. Key tools and techniques, such as Gateways: Convert analog signals to
packet capture and log analysis, are digital data.
discussed alongside real-world applications Softswitches: Manage call routing and
in corporate security, law enforcement, and switching.
fraud detection. A case study on call Servers: Store call logs, user data, and
spoofing illustrates practical forensic other configurations.
approaches, while future directions Codecs: Compress and decompress
highlight advancements in AI, blockchain, audio streams for efficient data
and cloud-based solutions. By transmission.
understanding and evolving with these
technologies, forensic experts can secure Importance of VoIP Forensics:
communications and ensure justice in the VoIP (Voice over Internet Protocol)
digital era. forensics is an essential aspect of
modern digital investigations, as it helps
Understanding VoIP Technology : VoIP to uncover and analyze voice
technology allows voice communication communications that occur over IP
and multimedia sessions over the Internet networks. The importance of VoIP
rather than traditional , telephony systems. forensics lies in its ability to address
It employs protocols such as Session several key areas of investigation,
Initiation Protocol (SIP) Real-time Transport security, and compliance. Here’s why VoIP
Protocol (RTP), and H.323 to facilitate call forensics is crucial:
signalling, data transport, and session
management.
21
Feature Importance Impact
VoIP systems are often used by VoIP forensics helps trace the
criminals to make anonymous origin and destination of these
Tracing Unlawful or encrypted calls, especially communications, uncovering
Communications for activities like drug illicit networks and aiding law
trafficking, money laundering, enforcement in dismantling
and human trafficking. criminal operations.
Regulatory compliance in
industries such as finance,
In the event of a compliance
healthcare, and
breach, VoIP forensics allows
telecommunications often
companies to provide
Ensuring requires the monitoring and
accurate records to
Compliance with archiving of communications
regulators and demonstrate
Regulations for audit and legal purposes.
adherence to laws like GDPR,
VoIP forensics helps ensure
IPAA, or the Communications
that these communications are
Assistance for Law
properly recorded and can be
Enforcement Act (CALEA).
retrieved for compliance
audits.
Investigators can
collaborate across
VoIP is a global communication
jurisdictions to trace calls,
tool, and VoIP forensics can be
Supporting identify perpetrators, and
used to investigate crimes that
International gather evidence, helping
cross international borders, such
Investigations to solve crimes that
as human trafficking or
involve transnational
international fraud.
networks.
23
VoIP forensics is crucial for uncovering hidden communications, supporting criminal
investigations, ensuring compliance, improving security, and safeguarding against fraud.
Its ability to capture and analyze call data and metadata makes it an indispensable tool in
modern digital investigations.
Encrypted communications
Many VoIP communications are prevent investigators from
encrypted to protect user listening to or analyzing the
Encryption and
privacy, making it difficult for conversations without
Security
forensic investigators to access decrypting the traffic, which
and analyze the actual content of may require access to private
the calls. keys or legal authorizations
that are not always available.
The investigation of VoIP incidents VoIP (Voice over Internet Protocol) forensics
typically follows a structured process: involves the collection, analysis, and
investigation of data related to voice
1. Identification: Determine the scope and communications transmitted over the
nature of the incident. Identify affected internet. It is crucial for detecting fraud,
systems, devices, and communication verifying legal compliance, investigating
sessions. cybercrimes, and tracing illegal activities.
2. Preservation: Preserve evidence to Here are the key tools and techniques used in
maintain its integrity. This includes VoIP forensics:
capturing network traffic, securing log
files, and imaging storage devices. Tools in VoIP Forensics:
3. Collection: Gather data from relevant
sources such as: Call Detail Records Wireshark: A widely used network
(CDRs), Network Traffic Captures (PCAP protocol analyser that can capture and
files), VoIP server logs, Endpoints (e.g., inspect VoIP traffic. Helps in decoding VoIP
VoIP phones, softphones) protocols (e.g., SIP, RTP) and provides
4. Analysis: Examine the collected data to insights into call data, quality, and
identify anomalies, reconstruct call metadata.
sessions, and pinpoint the source of the Tcpdump: A command-line tool for
attack. Tools like Wireshark, Splunk, and capturing network traffic, which can be
Xplico are commonly used for this used to monitor VoIP communication and
purpose. identify suspicious activity. 26
X-Lite: A softphone application often used RTP Stream Reconstruction: The Real-
in VoIP communications that can be Time Protocol (RTP) is used for
examined to recover call records, logs, transmitting audio in VoIP. Analyzing
and connection details. RTP streams can help reconstruct
Asterisk: An open-source VoIP software conversations, identify quality issues,
that acts as a call server. It generates logs and pinpoint disruptions.
and records that can be analysed to trace VoIP Call Logging: Logs from VoIP
call patterns and detect fraudulent systems (such as PBXs or gateways)
activity. provide detailed records of every call
Nmap: A network scanning tool to identify made, including call initiation,
open ports and services related to VoIP termination, and routing details. These
communication, which can help locate the logs are vital for tracing calls and
devices and servers involved in illicit identifying anomalies.
activities. VoIP Signal Analysis: Analyzing the
Call Detail Record (CDR) Analysers: signaling protocols (e.g., SIP, H.323)
Specialized software used to parse and helps investigators understand the call
analyze CDRs to track call metadata, such setup process, identify sources of VoIP
as origin, destination, time, duration, and fraud, and detect spoofing or hijacking.
associated costs. VoIP Fraud Detection: Detecting
Ostinato: A network traffic generator that anomalies such as unauthorized call
allows the simulation of VoIP traffic for routing, toll fraud, or international call
forensic analysis, testing network abuse by analyzing patterns in CDRs or
resilience, and verifying the integrity of monitoring real-time traffic.
VoIP setups. Voice Analysis: Forensic techniques
ELK Stack (Elasticsearch, Logstash, such as speaker recognition and voice
Kibana): A powerful set of tools for biometrics can be used to identify or
indexing, searching, and visualizing VoIP verify the identity of people involved in
call data logs, providing forensic a VoIP call.
investigators with an efficient way to Traffic Pattern Correlation:
analyze large datasets. Correlating traffic data with other
network activities (e.g., web traffic,
Techniques in VoIP Forensics: email logs) to uncover hidden
communication networks, such as
Packet Sniffing and Traffic Analysis: VoIP those used for cybercriminal activities
calls are often transmitted as IP packets. or corporate espionage.
Sniffing and analyzing these packets help Forensic Reconstruction: Rebuilding
identify suspicious patterns, such as the events leading up to and following
unusual call destinations or traffic spikes. a VoIP communication by linking
Call Metadata Extraction: Extracting together metadata, call logs, packet
metadata (e.g., IP addresses, call captures, and associated network
timestamps, duration, and codecs used) is traffic.
crucial for reconstructing the details of a These can be used to uncover and
VoIP call and correlating it with other document fraudulent activities, trace illicit
activities. calls, and support legal proceedings
related to VoIP communications.
27
Applications of VoIP Forensics: Future Directions in VoIP Forensics
Corporate Security: Organizations use VoIP AI-Powered Analysis: AI can enhance
forensics to investigate insider threats, anomaly detection, automate protocol
unauthorized call usage, and compliance decoding, and improve the accuracy of
violations. forensic investigations.
Law Enforcement: Authorities rely on VoIP Blockchain for Evidence Integrity:
forensics to track criminal networks, Blockchain technology can be used to
investigate fraud, and combat terrorism. timestamp and verify the integrity of
Fraud Detection: VoIP forensics helps captured evidence.
detect and mitigate VoIP-based fraud Cloud-Based VoIP Forensics: As more
schemes, such as toll fraud and organizations adopt cloud-hosted VoIP
subscription fraud. solutions, forensic tools must evolve to
Cybersecurity Incident Response: During address cloud-specific challenges.
cybersecurity breaches, VoIP forensics 5G and IoT Integration: The proliferation
aids in identifying and mitigating the of 5G and IoT devices will introduce new
impact of VoIP system compromises. dimensions to VoIP forensics, requiring
specialized methodologies. For
Case Study: Call Spoofing Investigation example, forensic techniques must
A financial institution reported receiving a
adapt to analyze VoIP sessions initiated
series of spoofed calls targeting their
from IoT-enabled devices or 5G-
customers. The attackers impersonated
connected platforms.
bank representatives to extract sensitive
Quantum Cryptography Implications:
information. VoIP forensic experts were
The emergence of quantum computing
engaged to investigate. The steps
poses both challenges and
included:
opportunities for VoIP forensics.
Capturing Network Traffic: Packet
Quantum cryptography could
captures from the VoIP server were
revolutionize secure communications,
analysed using Wireshark, revealing
but forensic tools must evolve to handle
suspicious SIP invite requests.
quantum-resistant encryption methods
Tracing IP Addresses: Logs showed
effectively.
multiple spoofed IP addresses, but further
Standardization of Protocols and Tools:
analysis pinpointed a compromised
The lack of uniformity in VoIP protocols
endpoint used by the attackers.
complicates forensic efforts. Future
Reconstructing Call Data: Audio streams
were reconstructed, and metadata was advancements could include
extracted to identify patterns and the standardized frameworks and
attack’s origin. interoperable tools to streamline
Collaboration with ISPs: Law enforcement investigations.
collaborated with Internet Service Enhanced Real-Time Monitoring: Future
Providers to trace the attacker’s actual tools could focus on proactive
location, leading to their apprehension. forensics, allowing investigators to
monitor VoIP traffic in real-time for
anomalies, attacks, or policy violations,
rather than relying solely on post-
incident analysis.
28
Augmented Reality (AR) for Forensic Visualization:
AR technologies might assist forensic experts by providing immersive environments to
visualize complex VoIP networks, analyze data patterns, and simulate attack scenarios in
real-time.
CONCLUSION:
VoIP forensics is an essential discipline in today’s interconnected world, enabling
investigators to tackle the complexities of cybercrime involving VoIP systems. By
understanding the technology, employing robust tools and techniques, and addressing
legal challenges, forensic experts can effectively safeguard communications and bring
perpetrators to justice. As VoIP technology evolves, so too must the strategies and tools
used in its forensic analysis, ensuring that this critical field remains at the forefront of
digital investigations.
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers,
and the internet (3rd ed.). Elsevier.
Perumal, S., Kasamuthu, N., & Jebarajan, D. (2020). Challenges in VoIP forensics: A
review. Journal of Digital Forensics, Security and Law, 15(4), 1-15.
https://doi.org/10.15394/jdfsl.2020.1613
Karpisek, T., Baggili, I., & Breitinger, F. (2015). VoIP forensics: Discovering the last call.
Digital Investigation, 12, S56–S65. https://doi.org/10.1016/j.diin.2015.01.011
Kumar, S., & Kaur, R. (2014). Forensic analysis of VoIP traffic using SIP and RTP
protocols. International Journal of Advanced Research in Computer Science and
Software Engineering, 4(6), 542–547.
Porter, T., & Gough, M. (2006). Practical VoIP security. Syngress Publishing.
SANS Institute. (n.d.). Whitepapers on VoIP security. Retrieved from
https://www.sans.org/white-papers/
tcpdump. (n.d.). tcpdump/libpcap public repository. Retrieved from
https://www.tcpdump.org/
Wireshark. (n.d.). Documentation. Retrieved from https://www.wireshark.org/docs/
Collier, P., & Spaul, W. (2018). Legal considerations in VoIP forensic investigations.
Forensic Science International, 289, 75–85.
https://doi.org/10.1016/j.forsciint.2018.04.021
Alshammari, F., Rawat, D., & Alotaibi, M. (2022). Machine learning for VoIP traffic
analysis and forensics. Computer Communications, 180, 12–24.
https://doi.org/10.1016/j.comcom.2022.01.012
Ria Ghosh
Co-Founder & Director
Forency LLP
New Delhi, India 29
In bustling halls of learning, they strive,
Forensic students, dreams alive.
With microscopes and books, they plan,
To uncover truth with a steady hand.
On August 9, 2024, the medical community and the nation were shaken by the brutal rape and
murder of a 31-year-old postgraduate trainee doctor at R.G. Kar Medical College and Hospital in
Kolkata, West Bengal, India. This incident not only highlighted the vulnerabilities of medical
professionals but also ignited widespread protests and discussions on workplace safety and
gender violence. This case study delves into the forensic aspects of the investigation, the
subsequent legal proceedings, and the current status of the case. 31
Incident Overview Public Response and Protests
The victim, a 31-year-old female postgraduate The incident sparked widespread outrage,
trainee doctor, was found deceased in a leading to protests by medical professionals
seminar room on the campus of R.G. Kar across India. Doctors organized strikes,
Medical College and Hospital in Kolkata. Initial demanding justice for the victim and enhanced
reports indicated that she had been raped and safety measures for healthcare workers. The
murdered. The discovery of her body in a semi- Federation of Resident Doctors' Association
nude state with signs of violence, including (FORDA) called for a Central Protection Act for
bleeding from her eyes, mouth, and genitals, Doctors to ensure healthcare worker safety.
pointed to a heinous crime. The victim had
reportedly retired to the seminar hall after a Current Status
grueling 36-hour shift.
As of January 2025, the trial of Sanjoy Roy is
Forensic Investigation ongoing. The court proceedings are closely
monitored, with the medical community and the
The autopsy revealed that the victim had been public keenly observing the developments. The
sexually assaulted and murdered. The forensic case has prompted discussions on the safety of
team collected various pieces of evidence, medical professionals and the need for
including DNA samples, fingerprints, and other stringent measures to prevent such incidents in
trace materials from the crime scene. These the future.
forensic findings were crucial in identifying the
perpetrator and understanding the sequence of
events leading to the crime.
32
Conclusion
References
Vikram K. Hankare
Head and Assistant Professor
Dept. of Forensic Science,
Yashavantrao Chavan Institute of Science,
Satara (Autonomous), Maharashtra.
33
Dogs can be trained to detect
specific scents linked to crime
scenes? They can track a
suspect’s scent or even detect
the unique odor of decomposing
bodies, helping solve
crimes faster than
human investigators.
34
PSYCHOLOGICAL TRAUMA AND COPING
MECHANISMS AMONG DOMESTIC
VIOLENCE SURVIVORS: A
LONGITUDINAL STUDY
Author: Dr. Nuri Momin
36
Figure 1 Signs of mental trauma
trauma, such as that experienced in Adaptive Coping Mechanisms
domestic violence situations. Complex
trauma affects survivors' cognitive, Adaptive coping mechanisms are those
emotional, and social functioning, that promote healing and recovery. One
leading to difficulties in forming of the most important coping strategies
relationships, regulating emotions, and for survivors of domestic violence is
maintaining a coherent sense of self. seeking social support. Studies by
Deborah K. Anderson and Daniel G.
Saunders (2003) have shown that
COPING MECHANISMS AMONG
access to supportive networks, such as
DOMESTIC VIOLENCE SURVIVORS
friends, family, or domestic violence
shelters, significantly improves the
While the psychological trauma from
psychological well-being of survivors.
domestic violence is often debilitating,
Support groups, in particular, provide a
survivors also exhibit various coping safe space for survivors to share their
mechanisms that help them navigate experiences and process their emotions
their recovery. Coping mechanisms can without fear of judgment or further
be broadly categorized into two types: victimization.
adaptive and maladaptive. Claire M. Renzetti (1992) emphasizes the
Susan Folkman and Richard Lazarus role of community support in helping
(1984) developed the Transactional survivors regain a sense of control over
Model of Stress and Coping, which their lives, which is critical for their long-
describes how individuals assess term recovery. Through therapy,
stressful situations and select coping survivors learn to reframe their
strategies. According to this model, understanding of the abuse and reduce
individuals engage in primary appraisal nother adaptive coping mechanism is
(evaluating the threat) and secondary therapy, particularly Trauma-Focused
appraisal (assessing available coping Cognitive Behavioural Therapy (TF-CBT)
resources), followed by the selection of and Dialectical Behaviour Therapy (DBT).
coping strategies. Donald Meichenbaum (1994),
37
Aone of the pioneers of cognitive- psychosomatic symptoms, including
behavioural therapy, highlights how headaches, gastrointestinal issues, and
cognitive restructuring can help chronic fatigue, as their unresolved trauma
survivors challenge distorted beliefs manifests physically.
about themselves and their experiences.
feelings of shame, guilt, and self-blame, The Role of Time in Healing
which are common in domestic violence
cases. Judith Herman’s (1997) stage- One of the unique aspects of this
based model of trauma recovery, which longitudinal study is its focus on the
includes stages of safety, remembrance progression of trauma and coping over
and mourning, and reconnection, has time. Previous research has often focused
also been influential in guiding on cross-sectional data, which provides a
therapeutic interventions for domestic snapshot of survivors’ psychological states
violence survivors. at a single point in time. However, trauma
recovery is a dynamic process, and
Maladaptive Coping Mechanisms understanding how coping mechanisms
evolve is critical for effective intervention.
Unfortunately, many survivors of
domestic violence resort to maladaptive Bonanno and Diminich (2013) have
coping mechanisms, particularly when contributed significantly to the field of
they lack access to adequate support trauma recovery with their research on
systems. Monica Swanberg (2004) found resilience, which suggests that many
that survivors of domestic violence are individuals have an inherent capacity to
at an increased risk of developing recover from traumatic events over time. In
substance abuse disorders as a way of the context of domestic violence, resilience
coping with the overwhelming stress may manifest as an increased ability to
and trauma they have experienced. manage emotional distress, seek out social
lcohol and drug use, while providing connections, and engage in self-care
temporary relief, often lead to further practices. However, Zinzow and Thompson
psychological and physical health (2011) caution that recovery is often non-
problems, complicating the survivor’s linear, with survivors experiencing periods
recovery process. of improvement followed by setbacks.
Psychological Impact of Domestic Other studies have delved into the specific
Violence mental health consequences for survivors.
Leslie E. Tower (2006) focused on the
Research on the psychological effects of heightened risk of PTSD in survivors, finding
domestic violence has consistently that the severity and frequency of abuse
highlighted the severe mental health were directly correlated with the
challenges faced by survivors. Judith development of trauma symptoms. Ellen
Herman (1992), a key figure in trauma Pence and Michael Paymar (1993) also
studies, explored the long-term explored the concept of "coercive control,"
psychological consequences of which plays a critical role in the emotional
prolonged abuse, coining the term and psychological devastation experienced
"complex trauma" to describe the by survivors. Their work demonstrated that
cumulative effects of repeated violence. psychological abuse, even in the absence of
Survivors often develop PTSD, physical violence, can lead to severe
depression, and anxiety, all of which are emotional trauma.
compounded by the cyclical nature of
39
Coping Mechanisms access to supportive networks and
intervention services were more likely to
Coping mechanisms adopted by recover from trauma and rebuild their lives.
survivors of domestic violence vary Therapeutic interventions, particularly
greatly depending on individual trauma-focused cognitive behavioral
circumstances, support systems, and the therapy (TF-CBT) and dialectical behavior
severity of abuse. Susan Folkman and therapy (DBT), have been shown to be
Richard Lazarus (1984), in their effective in helping survivors cope with the
Transactional Model of Stress and psychological effects of abuse. Donald
Coping, proposed that coping strategies Meichenbaum (1994) argued that cognitive
are influenced by how individuals restructuring, a key component of TF-CBT,
appraise stressors and their available can help survivors challenge their distorted
resources. They categorized coping beliefs about themselves and the abuse
mechanisms into problem-focused and they endured.
emotion-focused strategies, both of
which are used by domestic violence Lisa Goodman and Deborah Epstein (2008),
survivors. Several studies have explored in their study on trauma-informed care,
adaptive coping mechanisms. Claire M. emphasized the need for therapeutic
Renzetti (1992) emphasized the interventions to address both the
importance of community supporting immediate psychological effects of trauma
helping survivors regain control over their and the long-term recovery process.
lives. Social support, whether from
friends, family, or domestic violence In contrast, Monica Swanberg (2004)
shelters, has been shown to significantly examined maladaptive coping mechanisms,
reduce feelings of isolation and such as substance abuse, which some
helplessness. Jacquelyn C. Campbell survivors adopt as a way to numb the
(2002) found that survivors who had emotional pain of abuse. Substance abuse,
while offering temporary relief, often
exacerbates the trauma, leading to further
psychological and physical harm.
43
leaving an abusive relationship involves far SOCIETAL IMPLICATIONS AND THE NEED
more than physical escape—it requires FOR AWARENESS
rebuilding one’s life and identity.
Domestic violence is not just a privateissue
Despite these challenges, many survivors but a societal one. It affectsfamilies,
exhibit remarkable resilience. George A. communities, and the broader social
Bonanno (2004), in his work on trauma fabric. The stigma surrounding domestic
and resilience, found that many violence often prevents survivors from
individuals who experience trauma are seeking help, as they fear judgment or
able to recoverand lead fulfilling lives. disbelief. Increasing awareness about
Resilience is not aboutavoiding emotional domestic violence, its impact, and the
pain but about findingways to adapt and resources available for survivorsis crucial
rebuildafter trauma. Survivorswho are in addressing this issue. Education and
able to access resources, both personal public campaigns can help break the
and communal, often experience greater silence around domestic violence,
success in their recovery. Programs such encouraging survivors to come forward
as domestic violence shelters, legal and seek the help they need.
advocacy, and mental health services play
an essential role in supporting survivors. Legislative action is also necessary to
These services provide not only provide survivors with the protection they
immediate safetybut also long-term need. Many countries have implemented
supportin navigating the legal laws to address domestic violence, such as
system,securing housing, and obtaining restraining orders and specialized
financial independence. Jacquelyn C. domestic violence courts, but
Campbell (2002) emphasizes that enforcement and accessibility remain key
comprehensive support is necessary for issues.
survivors to break free from the cycle of
violence and recover fully. 44
Deborah Epstein (2008) argues that legal reforms must go hand in hand with social
services to create a comprehensive safety net for survivors.
CONCLUSION
References
Anderson, D. K., & Saunders, D. G. (2003). Leaving an abusive partner: An empirical
review of predictors, the process of leaving, and psychological well-being. Trauma,
Violence, & Abuse, 4(2), 163-191.
Bonanno, G. A., & Diminich, E. D. (2013). Annual Research Review: Positive adjustment
to adversity—Trajectories of minimal-impact resilience and emergentresilience.
Journal of Child Psychology and Psychiatry, 54(4), 378-401.
Campbell, J. C. (2002). Health consequences of intimate partner violence. The
Lancet, 359(9314), 1331-1336.
Daro, D. (2003). Preventing child abuse and neglect: Programmatic interventions.
Child Abuse & Neglect, 27(10), 1021-1043.
Dutton, M. A. (1996). Empowerment and healing: Working with battered women.
Springer Publishing.
Epstein, D., & Goodman, L. A. (2008). Listening to battered women: A survivor-
centered approach to advocacy, mental health, and justice. American Journal of
Public Health, 98(9), 1524-1532.
45
Ferraro, K. (2006). Neither angels nor demons: Women, crime, and victimization.
Northeastern University Press.
Folkman, S., & Lazarus, R. S. (1984). Stress, appraisal, and coping. Springer Publishing
Company.
Gondolf, E. W. (2002).Batterer intervention systems:Issues, outcomes, and
recommendations.
SAGE Publications.
Herman, J. L. (1992).Trauma and recovery: The aftermath of violence—from
domesticabuse to political terror. Basic Books.
Herman, J. L. (1997).Trauma and recovery. Basic Books.
Kolk, B. A. van der (2005). Developmental trauma disorder: Toward a rational diagnosis
for children with complex trauma histories. Psychiatric Annals, 35(5), 401-408.
Meichenbaum, D. (1994). A clinical handbook/practical therapist manual for assessing
and treating adults with post-traumatic stress disorder (PTSD). Institute Press.
Pence, E., & Paymar,M. (1993). Educationgroups for men who batter:The Duluth model.
Springer Publishing Company.
Pennebaker, J. W. (1997).Writing about emotionalexperiences as a therapeutic
process.
Psychological Science,8(3), 162-166.
Renzetti, C. M. (1992).Violent betrayal: Partner abuse in lesbianrelationships. SAGE
Publications.
Straus, M. A., & Gelles,R. J. (1995). Physical violencein American families:Risk factors
and adaptations to violence in 8,145 families. Routledge.
Swanberg, M. (2004). Substance abuse among domestic violence survivors: An
exploratory study. Journal of Addictions Nursing, 15(2), 63-68.
Tower, L. E. (2006). Barriersin the workplace: The experiences of professional women
survivors of domestic violence. Violence Against Women, 12(9), 850-872.
Van der Kolk, B. A. (2005). Developmental trauma disorder: Toward a rational diagnosis
for children with complex trauma histories. Psychiatric Annals, 35(5), 401-408.
Van der Kolk, B. A. (2005). The body keepsthe score: Brain,mind, and body in the
healing of trauma. Penguin Books.
Walker, L. (1979). The batteredwoman syndrome. Harper & Row.
Zinzow, H. M., & Thompson, M. P. (2011). Barriers to seeking help for sexual assault and
intimate partner violence: A prospective analysis of women’s health. Journal of
Interpersonal Violence, 26(13), 2910-2934.
46
Decoding Forensics :
A Visionary’s Journey
An interview with Dr. Ranjeet Kr Singh
What inspired you to pursue a career in But despite the obstacles, I was driven by
forensic science, and how did your journey as the belief that what we were offering could
a forensic expert begin? make a real difference.
To be honest, my journey into forensic science Looking back, the journey has been filled
started quite unexpectedly. I never imagined with moments of doubt and struggle, but
pursuing a career in this field at first. It all also immense pride. The effort to deliver
began when I decided to take a course in reliable, impactful services and training has
Fingerprints and Document Examination at paid off, and today, SIFS INDIA stands as a
Ramjas College, University of Delhi. At that globally recognized name in forensic
time, I wasn’t thinking about the future or any science.
career plans—I was simply curious. But as I got With over 15 years of experience in forensic
more into the subject, I found it interesting and science, what has been the most rewarding
felt an instant connection. moment of your career so far?
That initial exposure sparked a deep interest in Reflecting on my journey in forensic
forensic science, and I quickly realized how science, one of the most fulfilling moments
much I enjoyed analyzing details and tackling was establishing the Sherlock Institute of
complex cases. It felt like I had discovered a Forensic Science (SIFS) India. This institute
passion I never knew I had. From that moment has enabled me to make forensic education
on, I decided to dedicate myself to learning and services more accessible, addressing a
more and honing my skills in this field. critical need in the field.
SIFS INDIA is recognized globally for its Providing expert opinions in numerous
forensic services. What motivated you to criminal cases has been equally rewarding,
establish this organization, and what as knowing my analyses have contributed to
challenges did you face in its early stages? justice strengthens my commitment to the
The motivation to establish SIFS INDIA came profession.
from a deep desire to make forensic services Moreover, delivering lectures and
and quality training more accessible, conducting workshops globally has been an
especially at a time when they were limited incredibly gratifying experience. These
and difficult to find. I wanted to create a experiences, among others, have been
platform that not only met the growing important in my career, affirming my
demand for forensic expertise but also dedication to advancing forensic science
provided a space for professionals and and education.
learners to grow, learn, and connect.
50 47
How has the field of forensic science Digital tools have also changed areas like
evolved since you first entered it, cyber forensics, where investigators use
particularly in India? advanced software to recover and
Since I started in forensic science, the field examine data from electronic devices,
in India has evolved rapidly. Initially, and find important evidence in
forensic services were not as widely cybercrime cases. Also, tools like
utilized, but now, they are integral to automated DNA analysis and digital
criminal investigations. Advances in digital imaging have made investigations faster
forensics, and fingerprinting have greatly and more precise.
enhanced investigative accuracy. Cyber forensics is an area of your
Institutions like SIFS INDIA have been expertise. How do you see the
essentials in this growth, offering challenges in this field changing with
specialized forensic services and training the rapid growth of cybercrime?
that keep professionals up to date with the As a specialist in cyber forensics, I see
latest techniques. The demand for forensic the challenges in this field growing
services has increased, and today, forensic rapidly due to the increasing rate of
science is deeply embedded in law cybercrime. With technology evolving so
enforcement practices across the country. quickly, cybercriminals are becoming
more sophisticated, using advanced
tools and techniques to hide their
activities.
In India, the rise of cybercrime has led to
a greater need for skilled forensic
experts who can handle digital evidence.
As new cyber threats emerge, we need
more advanced tools and training to stay
ahead of criminals. The increasing use of
encryption, anonymizing technologies,
and the dark web makes it even more
challenging to trace criminal activity.
At SIFS, we stay updated with these
changes by using tools and offering
What role do you think technology, such as specialized training in cyber forensics.
AI and digital tools, plays in modern This ensures that forensic professionals
forensic investigations? are well-equipped to deal with the
Technology, including AI and digital tools, complexities of modern-day cybercrime
plays an important role in modern forensic investigations
investigations. AI helps analyze large
amounts of data quickly, allowing forensic
experts to find patterns, match evidence,
and make more accurate predictions
48
You’ve worked with enforcement
agencies and universities across the
globe. Could you share some of the most
unique or memorable international
experiences?
One of the most memorable experiences
from working internationally has been the
opportunity to learn from the diversity and
culture of different countries. It’s been
incredible to see how people from various
backgrounds approach forensic science.
Coming from a small, underdeveloped
town like Ballia, I never imagined that I’d
have the chance to work with law
You’ve trained police officials from
enforcement agencies and universities
countries like Sudan, Nigeria, and the
worldwide. The way people treat me-
Philippines. How do their forensic
valuing my knowledge and experiences-
challenges compare to those in India?
has been truly humbling.
I’ve learned so much from these diverse Training police officials from countries like
cultures and have been able to share my Sudan, Nigeria, and the Philippines has
own experiences and knowledge with been an insightful experience. These
them. countries, like India, are still developing
Your organization has collaborated with their forensic capabilities, and they face
various universities worldwide. How do challenges in terms of having the right
these partnerships contribute to tools and advanced techniques.
advancing forensic science? In many of these places, resources are
limited, which makes it harder to access
As the famous saying goes, " सबके पास सब कु छ
the latest forensic technologies. While
नहीं होता," which translates to "Not everyone
India is making progress, some areas still
has everything." I truly believe that the
struggle with getting the necessary
essence of our collaborations with
equipment or training. Similarly, in Sudan,
universities worldwide is to bridge these
Nigeria, and the Philippines, they often
gaps. Our primary goal is to provide
face delays in receiving the tools and
education to every corner of the world, no
expertise needed for effective
matter the cost. Many countries may lack
investigations.
access to the resources and expertise we
Instead of these challenges, the dedication
take for granted, and that’s where our
of professionals in these countries is
collaborations come in. By collaborating
inspiring. Through training and working
with universities globally, we can offer
together, we can help them improve their
training not only to students but also to
skills and find solutions to overcome these
professionals like police officials, lawyers,
obstacles in solving cases. It's not just
and other experts. This empowers them
about having the best tools but being
with the necessary skills to handle forensic
resourceful and creative with what they
investigations more effectively.
have to get justice.
49
You’ve been actively involved in and institutes can collaborate with law
forensic training for police and other enforcement agencies, private firms, and
organizations. How critical is training in research organizations to provide
improving the efficiency of forensic internships, practical training, and job
investigations? placements for students. I began my career
with a strong foundation in physics, which
Training is absolutely important in
naturally led me to explore analytical and
improving the efficiency of forensic
investigative sciences. Forensic science
investigations. In many cases, the
fascinated me because it marries science
previous education systems didn’t focus
with justice, two fields that deeply resonate
on forensic science, so police officials
with me. My interest grew further as I
and other professionals often don’t
recognized the critical role forensic
know the basics of how to tackle cases
evidence plays in ensuring fairness and
or handle evidence properly. We have to
accuracy in legal proceedings. The
start from scratch, teaching them not
multidisciplinary nature of forensic science,
only the theoretical knowledge but also
combining law, science, and technology,
the practical skills required for effective
inspired me to delve deeper into this
investigation.
fascinating domain.
Forensics isn’t just about collecting
evidence; it’s about understanding how What message or advice would you give to
to process, preserve, and analyze it to young forensic science enthusiasts and
build a strong case. Proper training budding professionals?
helps professionals develop these skills, I began my career with a strong foundation
making them more confident and in physics, which naturally led me to explore
efficient in handling complex situations. analytical and investigative sciences.
It’s also vital in closing the gap between Forensic science fascinated me because it
theory and real-world application, marries science with justice, two fields that
ensuring they can adapt to new deeply resonate with me. My interest grew
challenges as forensic science further as I recognized the critical role
continues to evolve. forensic evidence plays in ensuring fairness
and accuracy in legal proceedings. The
Forensic science is still a developing
multidisciplinary nature of forensic science,
field in India. What steps can be taken
combining law, science, and technology,
to make it more mainstream and
inspired me to delve deeper into this
attract young professionals?
fascinating domain.
Forensic science is definitely a growing
field in India, but there’s still a need to
raise awareness about its scope and
importance. Many people are unaware
of how forensic science can open doors
to various specializations.
Dr. Ranjeet Kumar Singh is the founder and CEO of SIFS India
Forensic Lab, a leading forensic science laboratory established in
2006. With over 15 years of experience in forensic science, he
specializes in questioned document examination, cyber forensics,
and fingerprint analysis. Dr. Singh earned his M.Sc. and Ph.D. from
the University of Delhi and holds certifications such as Certified
Ethical Hacker (CEH) and Computer Hacking Forensic Investigator
(CHFI) from the EC Council. Throughout his career, he has provided
expert opinions in thousands of cases for various courts, police
departments, and government organizations. He has also delivered
lectures at international institutions, including University College
Cork and Trinity College in Ireland.
51
D
I DNA evidence
D
can identify a
Y person with
O 99.9% accuracy?
U It has
revolutionized
K
N crime-solving
O since its first use
W in 1986!
?
52
Ethical Concerns in Forensic
Science: AI and Privacy
Author: Mr. Anantkumar R Patil, Kiran R Dodiya, Dr. Parvesh Sharma, Akash Patel,
Divya Patel, Grishma Pithiya, Mandvi Singh
Abstract:
speed, and efficiency, by replacing many
Artificial intelligence (AI) has transformed daily activities in the routine with
forensics drastically in the past few years automation and providing leads by
by empowering investigators and law predictive analysis, and all this comes at a
enforcement professionals to enhance not so high cost making it an attractive
accuracy, efficiency, and speed in tool to enhance work quality and
criminal investigation this article critically efficiency(Jarrett & Choo, 2021).
discusses the challenges posed by the Some major tasks performed in forensic
integration of AI in the legal arenas science by AI include:
especially in the forensic sciences with its 1. Facial recognition and biometrics where
ethical constraints and how it can harm AI is implemented in processes involving
the integrity of the analysis along with suspect identification through multimedia
that this article also focuses on like CCTV footage where it can use
addressing the solution based approach biometric data points and compare it with
to suggest some of the ways to address data from CCTV and locate an individual
the problems and resolve the from a pool of people this process is
shortcomings limiting the seamless extremely useful in areas like airport
integration of the technology in forensic security where threat monitoring is very
sciences while keeping in consideration crucial(Simmler & Canova, 2025).
the ethical and moral responsibilities of
the authorities who will use these tools in 1. Crime Scene Reconstruction where AI
better and more advanced forensic along with tools like 3D modeling,
practices. Photogrammetry, and other imaging tools
and data points obtained from the scene
Introduction of the crime can help us reconstruct the
scene in virtual mode, without AI it used to
Artificial intelligence in today's world be a tedious task requiring excessive
needs no special introduction it has physical work and manpower(Villa et al.,
changed our day-to-day life in a very 2023).
dramatic way. In a very short period, just 2. Deciphering encrypted and cyphered
like every other field of law enforcement, messages has been a very hectic task for
criminal investigation, and forensics is the investigator fraternity, this challenge
also witnessing a tectonic shift in also raised concerns in the alleys of
operations with assistance from artificial security. But now with AI-based tools, we
intelligence it has helped forensic can perform numerous such tasks very
professionals enhance their accuracy, fast and decode these messages in no
53
time(Artificial Intelligence and Privacy – Along with these many more
Issues and Challenges – Office of the applications of AI for forensic purposes
Victorian Information Commissioner, n.d.). have improved investigation
3. Artificial intelligence in Behavioral and professionals largely but this inclusion of
Predictive Profiling uses data from previous this new generation tool also brings new
cases and suspects' records, and modus threats to the field. Forensics compared
operendy to analyze and predict the future to any other field has a more sensitive
activity of the suspect. This helps nature of work and the implications of
investigators and enforcement agencies the actions taken in the ways of a job
plan and take preventive majors(Yokota & have very serious repercussions ranging
Watanabe, 2002). from changing the life of an individual to
.4. Artificial intelligence in Behavioral and leaving long-lasting impacts on society
Predictive Profiling uses data from previous as a whole. In forensics experts act as
cases and suspects' records, and modus eyes of the judiciary helping them to see
operendi to analyze and predict the future the truth more clearly and hence need
activity of the suspect. This helps to be very professional and stick to their
investigators and enforcement agencies ethical standards. This field thrives on
plan and take preventive majors(Yokota & the shoulders of ethics and morals.
Watanabe, 2002). Some of the moral and ethical concerns
5. In Image and Video Forensics tasks like regarding the implementation and
image processing and enhancement, integration of AI in forensic science and
detection of manipulation of images and allied fields are as follows:
metadata analysis can be simplified by
automation using Artificial Bias
intelligence(Dunsin et al., 2024). Individuals Privacy
6. Along with this there are various other Transparency in decision making
uses of AI in forensics and allied fields like Accountability in AI-driven forensic
Virtopsy, Multimedia analysis, Toolmark, investigation
blood-spatter and gunshot analysis, Misuse of AI in Forensics
Anthropological analysis, Malware
identification, VAPT, etc(Wankhade et al., Let's understand them one by one
2022).
1. Bias:
AI models are data-driven and their
outcomes are the result of the data they
are being trained on. They rely
completely on the dataset used in the
process of training the biases and
lacune left in the training process can
lead to further bias like the outcomes
derived from such models.
Bias arises when the data set used in the
training process of the algorithm is not
the actual representation of the
diversity 54
Fig. 01: Various uses of AI in Forensic Science
of the on-ground situation of the real-world Consequences of such bias may over
population. time cross the limits of individuals and
Along with dataset bias can also arise from start impacting the larger population by
the poor designing of the algorithm, developing systematic errors that
historically incomplete and incorrect data reinforce stereotypes, create mistrust in
which arises from inherent biases and the society, and undermine public trust
social stereotypes and incomplete datasets in the justice system as a whole. For
(Bigelow et al., 2024). example, if the data used for an AI used
in predictive policing where police
depend on the AI to predict crime and
possible perpetrators is derived from
historically biased policing; this bias may
lead to targeting of the minority or any
particular group of the population and
eventually leading to feedback loop of
discriminatory policing practices.
References:
AI Accountability: Who’s Responsible When AI Goes Wrong? | Emerge Digital. (n.d.).
Retrieved December 18, 2024, from https://emerge.digital/resources/ai-accountability-
whos-responsible-when-ai-goes-wrong/
Arshad, S., Arshad, J., Khan, M. M., & Parkinson, S. (2021). Analysis of security and privacy
challenges for DNA-genomics applications and databases. Journal of Biomedical
Informatics, 119, 103815. https://doi.org/10.1016/J.JBI.2021.103815
Artificial Intelligence and Privacy – Issues and Challenges – Office of the Victorian
Information Commissioner. (n.d.). Retrieved December 18, 2024, from
https://ovic.vic.gov.au/privacy/resources-for-organisations/artificial-intelligence-and-
privacy-issues-and-challenges/
Dunsin, D., Ghanem, M. C., Ouazzane, K., & Vassilev, V. (2024). A comprehensive analysis of
the role of artificial intelligence and machine learning in modern digital forensics and
incident response. Forensic Science International: Digital Investigation, 48, 301675.
https://doi.org/10.1016/J.FSIDI.2023.301675
Jarrett, A., & Choo, K. R. (2021). The impact of automation and artificial intelligence on
digital forensics. WIREs Forensic Science, 3(6). https://doi.org/10.1002/WFS2.1418
Simmler, M., & Canova, G. (2025). Facial recognition technology in law enforcement:
Regulating data analysis of another kind. Computer Law & Security Review, 56, 106092.
https://doi.org/10.1016/J.CLSR.2024.106092
Villa, C., Lynnerup, N., & Jacobsen, C. (2023). A Virtual, 3D Multimodal Approach to Victim
and Crime Scene Reconstruction. Diagnostics, 13(17), 2764.
https://doi.org/10.3390/DIAGNOSTICS13172764
Wankhade, T. D., Ingale, S. W., Mohite, P. M., & Bankar, N. J. (2022). Artificial Intelligence in
Forensic Medicine and Toxicology: The Future of Forensic Medicine. Cureus, 14(8), e28376.
https://doi.org/10.7759/CUREUS.28376
What is Machine Learning Bias (AI Bias)? | Definition from TechTarget. (n.d.). Retrieved
December 18, 2024, from
https://www.techtarget.com/searchenterpriseai/definition/machine-learning-bias-
algorithm-bias-or-AI-bias
Yokota, K., & Watanabe, S. (2002). Computer-Based Retrieval of Suspects Using Similarity
of Modus Operandi. International Journal of Police Science and Management, 4(1), 5–15.
https://doi.org/10.1177/146135570200400102.
58
Mr. Kiran Dodiya
Assistant Professor and Program Coordinator of DFIS
(Cyber Security and DFIS)
NSIT-IFSCS, Jetalpur, Ahmedabad
(Affiliated with NFSU), Gandhinagar, Gujarat, India
Grishma Pithiya
Assistant Professor (Forensic Science),
IFSCS-NSIT, Jetalpur, Ahmedabad.
(Affiliated to NFSU) Gandhinagar, Gujarat, India.
59
DID YOU KNOW?
60
Digital Footprints: How Forensic
Experts Use Technology to Solve
Cyber Crimes
Author: Lakshya Sharma
ABSTRACT
64
Cross-platform tracking becomes very THE FORENSIC FRONTIER: CASE STUDIES
important, as the criminals themselves The forensic frontier of cybercrime
leverage multiple channels to obfuscate investigation is defined by the adoption of
their identity. Social engineering cutting-edge technologies that enable
methods, combined with open-source experts to address criminal activities that
intelligence tools (OSINT), help unmask are not only increasingly sophisticated
these actors by allowing them to but also vastly different. Tools such as
aggregate publicly available information. blockchain analysis and interrogation of
It is, however, the dark web that carries IoT devices are poised to revolutionise
concrete challenges since it is this domain, with some unparalleled
infrastructure that is inherently capabilities in discovering and assessing
anonymous; it is hidden beneath layers of digital evidence. Blockchain analysis
encryption and serves as a safe haven for continues to gain increased prominence
illicit activities, which range from illegal as a solution towards cryptocurrency-
trading to cyberattacks. This is further reliant criminal activities. One major
provided using specialized tools like Tor dismantling of a ransomware operation
network analyzers, blockchain explorers, happened in the year 2020 and was made
and honeypots. Despite the many steps possible through blockchain analysis.
forward, that kind of dynamism between Experts were able to trace Bitcoin
technologies and the increasing level of transactions through analysis of the
anonymization techniques to match public ledger then going ahead to tie the
cybercrimes create a need for continuous wallets belonging to the cybercrime
innovation. First up, forensic teams have actors with illegal activities. Another is Silk
to stay ahead in terms of technological Road case, which attests that, yes,
trends to fight back and, not less to blockchain technology works.
update their toolkits and strategies to
effectively counter the emerging threats. Investigators were able to track millions of
The digital shadows bring complexity in dollars in cryptocurrency transactions,
cybercrime and stresses a need for linking them to a discovery of the
forensic proficiency, also, adding the operators behind the dark web
various tool names which helps the marketplace. In the Bitfinex hack case, in
investigators in their investigation, like, which $72 million in Bitcoin was stolen,
Foto Forensics, ExifTool, Exif Viewer, forensics used blockchain analysis tools
EXIFData, Diffchecker, Fake News to trace and track the flow of money
Debunker by InVID & WeVerify. (All tools through different wallets. By analyzing
shall be used for educational purposes patterns of transactions and identifying
not to abuse the people, though, they are clusters of related activities, professionals
more advanced in nature). succeeded in attributing assets that were
stolen to specific people, resulting in their
arrests and asset recovery. A great
example is the investigation of incidents
of crypto jacking, wherein hostile actors
were stealing computing power to mine
cryptocurrencies.
65
CONCLUSION
The domain of cyber forensics is about to Balancing between what should be
be radically transformed, due to the rapid secretive and transparent in the fight
changes in technology and the social and against crime shall stand as one of the
legal settings that drive the former to central areas of both legislative and
develop. With all the sophisticated tactics judicial scrutiny. In such a dynamic
that cybercriminals have upped their game environment, technologists, legislators,
with, forensic experts also have to innovate and forensic professionals must come
as well as stay ahead in predicting future together. The shared area education and
challenges to shape the future of certification requirements must be
investigating digital crime. Technological updated to implant the proper knowledge
innovation is going to redefine cyber in experts to work in this fast-changing
forensics. The application of artificial landscape. More importantly, with the
intelligence (AI) and machine learning (ML) increase in technology, the field of cyber
is likely to feature heavily in processing forensics will have a deeper keeping
huge volumes of digital evidence in a guarantee and trust within the digital age.
manner that is time-efficient. Algorithms
could one day enable an investigator to be
able to track threats in real time and even
predict when a cybercrime may be
looming. Although quantum computing can
threaten modern encryption standards, it
may also give the forensic expert enough
computational power to decrypt data that
is, for all practical purposes, beyond
decryption. At the same time, the
increasing number of interconnected
devices through the Internet of Things (IoT)
will generate a massive volume of digital
footprints that can be leveraged for
forensic opportunities but will also multiply
data complexity. Yet another use case of
blockchain technology beyond secure
transactions could be the creation of
immutable evidence trails; this can make
blockchain invaluable in the pursuit of
digital accountability. All of this will need to
be done against a background of increased
legal and ethical considerations. For
example, rights to privacy and protection in
data such as GDPR in the UK might tighten
the rules on collection and use of digital
evidence.
66
References
UNODC, Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S.,
Ignatuschtschenko, E., Max Planck Institute for Foreign and International
Criminal Law, Brown, I., Wright, J., Oxford Internet Institute and Cyber Security
Centre, University of Oxford, Broadhurst, R., Krüger, K., Brandenburg Institute
for Society and Security, Sieber, U., Tropina, T., & Mühlen, N. V. Z. (2013).
Comprehensive study on
Cybercrime.https://www.unodc.org/documents/organizedcrime/UNODC_CC
PCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Tinku. (2024, December 14). Cyber Forensics - Methods & Techniques | Cyber
Security Institute In Delhi. Craw Security. https://www.craw.in/methods-
techniques-of-cyber-forensics-best-cyber-security-institute-in-delhi/
Ogunseyi, T. B., & Adedayo, O. M. (2023). Cryptographic Techniques for Data
Privacy in Digital Forensics. IEEE Access, 11, 142392–142410.
https://doi.org/10.1109/access.2023.3343360
Tyagi, A. K., Balogun, B. F., & Tiwari, S. (n.d.). Role of Blockchain in Digital
Forensics: A Systematic study. In Role of Blockchain in Digital Forensics: A
Systematic study. https://doi.org/10.4018/978-1-6684-8127-1.ch008
Forensic Investigations and Computer Forensics in the Age of Blockchain.
(n.d.). ISACA. https://www.isaca.org/resources/isaca-
journal/issues/2023/volume-5/forensic-investigations-and-computer-
forensics-in-the-age-of-blockchain
67
Investigators now use virtual
reality to recreate crime
scenes for juries in
courtrooms?
68
Behind the Profile: Exploring
the Most Reliable Methods in
Criminal Profiling
Author: Dr. Satwik Chatterjee
INTRODUCTION The Modern Era: Behavioural Science
Takes Center Stage – It was during the
THE MIND BEHIND THE CRIME 1970s that criminal profiling truly came
In the intricate world of criminal of age. The FBI’s Behavioral Science Unit
investigations, the ability to understand (BSU), founded in 1972, spearheaded a
the motives, behaviours, & psychological new wave of investigative
states of offenders can mean the methodologies, driven by pioneers like-
difference between solving a case & John Douglas & Robert Ressler. They
letting it grow cold. Criminal Profiling – introduced systematic profiling
often dramatized in popular culture but techniques by conducting in-depth
grounded in meticulous science – offers interviews with incarcerated serial
investigators a vital tool to narrow killers & studying patterns of behavior.
suspects, anticipate future actions, & Their work laid the groundwork for what
piece together seemingly fragmented is now referred to as investigative
evidence. But what are the most reliable psychology.
methods behind this art & science of · Profiling in the 21st Century – Today,
decoding the criminal mind? In this profiling integrates sophisticated
article, we take a deep dive into the technologies, advanced psychological
methodologies that form the backbone of research, & data analytics. Despite the
effective criminal profiling & distinguish controversy & misconceptions fueled by
fact from fiction. pop culture, profiling has evolved into a
methodologically sound & increasingly
A BRIEF HISTORY OF CRIMINAL PROFILING reliable investigative practice.
· The Early Foundations – The roots of
criminal profiling stretch back centuries. TYPES OF CRIMINAL PROFILING
In 1888, during the region of terror caused Understanding the various methods of
by jack the Ripper in London’s profiling is essential to appreciate its
Whitechapel district, Dr. Thomas Bond, a complexity. Each type serves a unique
British physician, offered one of the purpose, & the most reliable approaches
earliest documented psychological often combine these methodologies for
assessments of a criminal. Bond’s a holistic profile.
evaluation detailed the killer’s likely 1. Deductive Profiling – It focuses on
physical & mental characteristics, laying a specific evidence from the crime scene
rudimentary foundation for modern to infer characteristics about the
profiling. offender.
69
This method relies on logic & an in-depth Case Study: Railway Rapist & Railway
understanding of human behavior. Killer –
Forensic evidence, such as- blood spatter Dr. Canter’s profiling techniques helped
patterns, tool marks, & the nature of capture John Duffy, known for a string of
wounds, can provide critical insights into assaults & murders near railway lines in
the offender’s personality, emotional London.
state, & motives. By analyzing the behaviours & patterns
Example: The BTK Killer Case – of the offender, Canter’s profile led
Dennis Rader, the infamous BTK (Bind, authorities to Duffy, who fit the
Torture, Kill) killer, was identified in part psychological & geographical
through meticulous deductive reasoning. parameters identified.
Investigators deduced from the crime 4. Geographical Profiling – It focuses on
scenes that the offender was organized, the spatial behaviour of offenders.
methodical, & likely had a steady, Developed by Kim Rossmo, this
outwardly normal lifestyle – traits that technique employs mathematical
eventually matched Rader’s profile. algorithms & spatial analysis to predict
2. Inductive Profiling – It uses statistical where a serial offender might live or,
data & behavioural patterns derived from work based on the locations of their
past criminal cases to make inferences crimes.
about the current offender. This method is Working Procedure –
less personalized but highly Geographical profiling creates a
effective when patterns & trends can be probability map, known as a “Jeopardy
applied. Surface”. This map highlights the areas
Example: Geographic Profiling in Serial offenders are most likely to frequent,
Crimes – which can be a game-changer for
Inductive profiling can be combined with investigators handling large-scale cases.
geographic analysis to determine the likely
area of an offender’s residence or,
workspace. The “Comfort Zone” concept,
where criminals feel most confident
committing their crimes, has proven
reliable in narrowing down search areas.
70
1.Crime Scene Analysis 4. Forensic Evidence Examination:
Modus Operandi (MO) – Analyzing the Forensic Psychology – Utilizing
offender’s method of operation can psychological evaluations &
provide insights into their behaviour assessments to understand the
patterns & level of sophistication. offender’s mental state, potential
Signature Behaviour – Identifying disorders & decision-making
behaviours or, actions that are not processes.
necessary to commit the crime but are Forensic Linguistics – Analyzing
unique to the offender, that can help language patterns, writing style &
narrow down suspects & understand content of communications
their motives. associated with the crime to identify
2. Victimology: linguistic clues that may lead to the
Victim Profiling – Studying the victim’s offender.
background, lifestyle & relationships 5. Data Analysis:
can offer clues about the offender’s Statistical Analysis – Using statistical
motives & potential connection to the methods to identify patterns or,
victim. correlations between different crime
Geographical Profiling – Analyzing the scenes, behaviours or, offender
spatial relationship between crime characteristics.
scenes can help identify areas where Data mining – Analyzing large
the offender is likely to reside or, datasets of past crimes to identify
operate. similarities, trends & associations
3. Behavioural Analysis: that can help narrow down suspect
Behavioural Analysis - Psychological profiles.
Profiling – Using Psychological theories 6. Interviews & Interrogations:
& principles to create a profile of the Criminal Profiling Interviews –
offender’s personality, motives & likely Conducting structured interviews
behaviours. with witnesses, victims & law
Offender Characteristics – Identifying enforcement to gather information &
characters such as – Age, Gender, develop a profile of the offender.
Occupation, & Social status based on Statement Analysis - Analyzing the
behavioural patterns observed in the content & structure of statements
crime scenes. made by suspects or, witnesses to
detect deception or, inconsistencies.
71
CONCLUSION: THE FUTURE OF CRIMINAL PROFILING
Criminal profiling remains a critical tool in the fight against crime, blending
psychology, forensic science, & technology. The most reliable methods – behavioral
analysis, victimology, linkage analysis, & geographic profiling – have proven their worth
through decades of successful investigations. As technology advances, profiling will
continue to evolve, becoming even more accurate & indispensable. Behind every
profile lies a story, a science, & a relentless pursuit of justice. In the end, profiling is
about more than understanding criminals – it is about bringing closure to victims,
safeguarding society, & ensuring that the darkest minds are brought into the light.
References:
·“Mindhunter: Inside the FBI’s Elite Serial Crime Unit”. John E. Douglas, Mark Oishaker. Gallery
Books.
ISBN No.: 978-1501191961
·“Geographic Profiling”. Kim Rossmo. CRC Press.
ISBN No.: 978-0367578028
·“Criminal Profiling: An Introduction to Behavioural Analysis”. Brent E. Turvey. Academic
Press.
ISBN No.: 978-0123852434
·“The Anatomy of Motive: The FBI’s Legendary Mindhunter Explores the Key to Understanding
& Catching Violent Criminals”. John E. Douglas. Pocket Books.
ISBN No.: 978-0671023935
·“Investigative Psychology: Offender Profiling & the Analysis of Criminal Action”. David
Canter, Donna Youngs. Wiley.
ISBN No.: 978-0470023976
·Richard N. ‘Criminal Profiling: A Viable Investigative Tool Against Serial & Violent Crime’.
Journal- Psychiatry, Psychology & Law.
https://doi.org/10.1080/13218710109525008
·Bryanna Fox, David P. Farrington. “The Effectiveness of Criminal Profiling in Serial Crime
Investigations”. Journal- Psychology, Public Policy, & Law.
https://doi.org/10.1037/law0000093
·Jessica Woodhams, Anthony R. Harris. ‘Linkage Analysis in Serial Crime Investigations’.
Journal- Legal & Criminological Psychology.
·https://doi.org/101348/135532508X349337
·Websites;
ØAPA Criminal Psychology.
ØFBI Profiling. ABOUT THE AUTHOR
ØCIP Research.
ØNIJ Crime Analysis.
ØHowStuffWorks.
Dr. Satwik Chatterjee
ØFBI BAU. Dentist
ØPsychology Today. Kolkata
West Bengal
72
Decoding Cybersecurity: The Inspiring
Journey and Expert Insights in Ethical
Hacking and Digital Forensics
An interview with Sachin Dedhia
Can you share your journey into ethical The role of ethical hacking and digital
hacking and digital forensics? What forensics in protecting critical data,
inspired you to choose this career path? systems, and national security is more
My journey into ethical hacking and digital important than ever. This sense of duty
forensics began with a deep passion for to contribute to the defense of my
technology and a curiosity about how nation, both in terms of cyber resilience
things work and criminal justice, motivated me to
Ethical hacking, in particular, intrigued me dedicate myself to this field. in essence,
because it blends my interest in my passion for technology, combined
technology with my drive to help others. I with a deep desire to make a meaningful
saw it as an opportunity to make a impact on the world, led me to choose a
positive impact by protecting individuals, career in ethical hacking and digital
organizations, and even nations from forensics. It is a field where I can
cyber threats. The thought of being able constantly learn, face new challenges,
to use my skills to outsmart malicious and contribute to securing a safer digital
hackers and prevent breaches is what future.
inspired me to pursue this field
professionally.
75
This requires a high level of creativity and Organizations should invest in regular
persistence, as well as a deep security training to raise awareness about
understanding of the various ways digital potential threats and ensure that staff
evidence can be stored or manipulated. members understand the importance of
However, there are instances where, maintaining good security hygiene.
despite our best efforts, the available Additionally, many organizations fail to
evidence may simply not be recoverable regularly update and patch their software.
or is too compromised to be useful. In Cyber attackers often exploit known
these situations, it’s important to vulnerabilities in outdated systems, so
acknowledge that not all leads will be neglecting to apply updates and patches
fruitful. At times, we may have to shift leaves systems exposed. Another issue is
focus and look beyond the digital realm poor or inconsistent access control. Failing
for additional sources of evidence, such to implement the principle of least
as physical documentation, eyewitness privilege or not regularly reviewing access
testimony, or other investigative permissions can lead to unauthorized
methods. users gaining access to sensitive data.
The key is to ensure that every possible Inadequate incident response planning is
approach has been explored thoroughly also a major issue. Many organizations do
so that we can confidently say we've done not have a clear, well-practiced response
our best to retrieve the evidence. It's plan in place in the event of a breach.
about maintaining a balance between Without a proper plan, even minor security
persistence and the understanding that, incidents can escalate, causing significant
sometimes, we may need to pivot to other damage to the organization’s reputation,
investigative avenues to uncover the finances, and data.
truth.
What are the common mistakes
organizations make that lead to security
breaches?
One of the most common mistakes
organizations make that lead to security
breaches is taking security for granted.
Often, businesses assume that their
systems and networks are secure without
implementing comprehensive and
proactive security measures. This can
create vulnerabilities that cybercriminals
can exploit.
Another significant mistake is neglecting
to properly educate staff. Human beings
are often the weakest link in any security
infrastructure, and employees can
inadvertently create security risks by
falling for phishing scams, using weak
passwords, or failing to follow best
practices. 76
Lastly, insufficient data protection 2. Preserving the Integrity of Evidence: To
measures, like inadequate encryption, ensure that the evidence remains
can result in breaches where sensitive untouched and intact, I use forensic tools
information is compromised. that allow for a bit-by-bit copy of the
Organizations need to ensure that all original data. This way, the original evidence
critical data is properly encrypted both in is never altered, and I work only with the
transit and at rest, and that secure duplicate. This process helps ensure the
backup practices are in place to protect integrity of the evidence, which is a key
against data loss or ransomware attacks. factor in its admissibility in court.
In summary, to prevent security 3. Documentation of the Process: Detailed
breaches, organizations must not only documentation is critical. I keep a thorough
invest in technical defenses but also log of every action taken during the forensic
focus on educating staff, updating investigation—from the moment evidence is
software regularly, enforcing strict collected to the point of analysis and
access controls, having a robust incident storage. This includes documenting the
response plan, and implementing strong tools used, the steps followed, and the
data protection strategies. Security individuals involved in handling the
needs to be a continuous, organization- evidence. A clear and well-documented trail
wide effort, not just an afterthought. will support the authenticity of the evidence
when it is presented in court.
What is the most memorable case you 4. Using Industry-Recognized Forensic
have solved in your career? Why does it Tools: I always use industry-standard
stand out? forensic tools and techniques that are
There are many memorable cases in my widely accepted in the legal community.
decade long career. he game of thrones These tools are vetted for their accuracy
leaked case would be one of my and reliability, ensuring that the results I
favourite. present can be trusted. Courts are more
likely to accept evidence obtained using
How do you ensure your evidence is such recognized tools because they are
admissible and stands up to scrutiny in proven to be scientifically valid.
court?
1. Adherence to Legal and Ethical
Guidelines: First and foremost, it’s
essential to follow legal and ethical
standards throughout the investigation.
This includes adhering to the chain of
custody, ensuring that evidence is
collected, stored, and documented
properly. Any breach of this chain can
render evidence inadmissible. I always
ensure that all actions taken during the
investigation are in compliance with
applicable laws and regulations,
including those related to privacy and
data protection. 77
50
5. Expert Testimony and Clear What advice would you give organizations
Explanation: In court, it’s crucial to not to enhance their cybersecurity and digital
only present evidence but to explain forensics preparedness?
how it was obtained and why it is To enhance their cybersecurity and digital
reliable. I make sure I can clearly forensics preparedness, organizations
articulate the forensic methods used, should focus on several key areas:
the tools involved, and the reasoning 1. Be Proactive and Prepared: Cyber
behind each step of the investigation. As threats are constantly evolving, so it's
an expert witness, I must be able to important for organizations to adopt a
break down complex technical concepts proactive approach to security. This means
in a way that the judge and jury can not only implementing robust
understand. cybersecurity measures but also regularly
6. Preserving Evidence in the Right assessing and updating security policies
Format: The evidence must be and procedures to stay ahead of potential
presented in a format that is both threats. Having a comprehensive incident
secure and usable in a legal context. For response plan in place will ensure a quick,
example, ensuring that any digital effective reaction to security breaches
evidence is presented in an unaltered when they occur.
format, such as a write-protected disk 2. Stay Vigilant and Monitor Continuously:
or an immutable cloud storage solution, Continuous monitoring of systems and
is important for maintaining its integrity. networks is essential to detect threats in
Additionally, I ensure that all necessary real-time. Organizations should invest in
metadata, timestamps, and other security monitoring tools and practices
supporting information are included to that provide ongoing visibility into their
authenticate the evidence. digital environment. Early detection is
By following these rigorous standards crucial to prevent potential damage and to
and practices, I can ensure that the respond quickly to minimize risk.
evidence I present will be admissible in 3. Regular Training and Awareness
court and will stand up to legal scrutiny. Programs: Employees are often the first
It's about maintaining the highest line of defense against cyber threats. It’s
standards of professionalism, technical critical to keep staff regularly trained on
expertise, and attention to detail security best practices and to raise
throughout the entire investigative awareness about common threats such as
process. phishing, social engineering, and password
management. This helps reduce the
What are some of your professional likelihood of human error, which is often
achievements or recognitions in the the weakest link in cybersecurity.
field?
5078
4. Conduct Practical Drills and ensure they are ready to respond
Simulations: effectively to any incident.
It’s one thing to have a cybersecurity plan
on paper, but it’s equally important to test
its effectiveness through practical
exercises and simulations. Conducting
regular incident response drills,
penetration testing, and table-top
exercises will ensure that both the staff
and the systems are ready to handle
actual security incidents. These exercises
help identify potential gaps in the plan
and provide hands-on experience for
employees.
79
50
What are the latest trends and 2. Cloud Security
technologies transforming the field of As organizations increasingly adopt cloud
ethical hacking and digital forensics? services, ethical hackers and digital
forensics experts are focusing more on
The field of ethical hacking and digital
cloud security. Cloud environments
forensics is rapidly evolving due to
present unique challenges, such as
advancements in technology and the
complex multi-tenant infrastructures and
increasing sophistication of cyber threats.
the use of shared resources, which can
Some of the latest trends and
make detecting security breaches more
technologies transforming the field
difficult. New tools and methodologies are
include:
being developed to address cloud-specific
1. Artificial Intelligence and Machine
security concerns, such as securing APIs,
Learning
monitoring cloud configurations, and
AI and machine learning are playing a
ensuring that data stored in the cloud is
significant role in both ethical hacking
properly encrypted and protected.
and digital forensics. In ethical hacking,
3. Blockchain and Cryptocurrency
AI-driven tools can automate threat
Investigations
detection and vulnerability scanning,
The rise of blockchain technology and
allowing ethical hackers to identify
cryptocurrencies has introduced new
weaknesses more quickly and efficiently.
challenges and opportunities for digital
In digital forensics, AI can assist in
forensics. Blockchain’s decentralized
analyzing large datasets, automating data
nature can make it difficult to trace
classification, and identifying patterns in
transactions, but digital forensics
cybercrimes that might otherwise go
professionals are now developing more
unnoticed. AI-driven anomaly detection is
advanced techniques to track
particularly useful for identifying
cryptocurrency movements and
previously unknown threats or
investigate blockchain-based crimes like
sophisticated attack techniques.
money laundering or ransomware
payments. Specialized tools for blockchain
analysis are becoming more common,
enabling experts to trace, analyze, and
recover cryptocurrency-related evidence.
4. IoT Security and Forensics
With the rapid growth of Internet of Things
(IoT) devices, ethical hackers and digital
forensics professionals are focusing on
securing these devices, which often have
weak security features. In forensic
investigations, IoT devices can provide
valuable evidence, but they also present
challenges due to their diverse nature and
the vast
80
amounts of data they generate. 6. Automation and Orchestration in
Investigators need specialized tools to Cybersecurity
collect and analyze data from a wide Automation is becoming a key trend in both
range of IoT devices, from smart home ethical hacking and digital forensics. In
devices to industrial control systems. ethical hacking, automation tools can
5. Ransomware and Advanced quickly identify vulnerabilities, run
Persistent Threats (APTs) penetration tests, and analyze system
The rise of ransomware attacks and configurations. In digital forensics,
Advanced Persistent Threats (APTs) has automation is being used to streamline the
led to a greater emphasis on detecting analysis of large volumes of data, enabling
and responding to these sophisticated quicker identification of evidence and more
threats. efficient investigations. Forensic
investigators are using automated tools to
handle routine tasks, allowing them to focus
on higher-level analysis and critical thinking.
7. Advanced Encryption and Privacy
Concerns
With the increasing focus on privacy, there
is a growing need for digital forensics
experts to develop methods to analyze
encrypted data while respecting privacy
laws. Techniques for breaking or bypassing
encryption are evolving, but there is also a
focus on enhancing encryption methods to
secure sensitive data. Ethical hackers are
increasingly tasked with testing the
effectiveness of encryption mechanisms
and finding ways to break weak encryption
systems to improve security.
8. Threat Intelligence and Collaboration
Tools
Threat intelligence platforms that
Ethical hackers are focusing on aggregate and analyze data from multiple
developing more effective techniques sources are becoming more common in
to defend against ransomware, while cybersecurity. These platforms help ethical
digital forensics experts are constantly hackers and digital forensics experts stay
refining their methods for tracing the informed about emerging threats, trends,
origins of ransomware attacks, and attack vectors. Collaboration tools that
recovering encrypted data, and allow security professionals to share
identifying the actors behind these findings, collaborate on investigations, and
attacks. New tools are emerging to help respond to incidents in real-time are also
analyze ransomware payloads and growing
understand their encryption methods.
81
in importance, enabling faster and more 1. Enhanced Threat Detection and
coordinated responses to security Prevention
breaches. AI and machine learning can process vast
9. Data Privacy Regulations and amounts of data and identify patterns far
Compliance faster than traditional methods. In
With the implementation of stricter data cybersecurity, this ability is critical for
privacy regulations like GDPR and CCPA, detecting anomalies and potential
ethical hacking and digital forensics are threats in real-time. AI-driven systems
now deeply intertwined with compliance can continuously monitor network traffic,
requirements. Cybersecurity professionals system logs, and user behavior to flag
must ensure that their activities, from unusual activities that could indicate a
penetration testing to evidence collection, breach or an impending attack. Over
comply with these laws. Digital forensics time, these systems can learn to identify
professionals must also ensure that any new attack vectors and adapt to evolving
data they handle during investigations is cyber threats, significantly improving
processed and stored in compliance with detection rates while reducing false
relevant privacy regulations. positives.
10. Quantum Computing and Post- In digital investigations, AI can assist in
Quantum Cryptography combing through large volumes of data
Although still in its early stages, quantum to find indicators of compromise or other
computing has the potential to signs of malicious activity, which would
revolutionize both cybersecurity and be far too time-consuming for human
digital forensics. While quantum investigators. By analyzing trends and
computers could break traditional identifying correlations within the data, AI
encryption algorithms, they could also can help pinpoint the source of an attack
offer new opportunities for creating more quickly and efficiently.
unbreakable encryption methods. Ethical
hackers are beginning to explore quantum 2. Automated Incident Response
computing’s potential impact on security, One of the most exciting applications of
and digital forensics professionals are AI and machine learning in cybersecurity
considering how quantum technologies is their ability to automate incident
may affect their ability to decrypt and response. With pre-programmed
analyze data in the future. response protocols, AI systems can
quickly take action in response to a
How do you see AI and machine learning
detected threat—such as isolating
shaping the future of cybersecurity and
compromised systems, blocking
digital investigations?
malicious traffic, or initiating an
AI and machine learning are already having investigation. This automation reduces
a significant impact on cybersecurity and the time between detection and
digital investigations, and their influence mitigation, which is crucial in minimizing
will only continue to grow as the damage during an attack.
technology evolves. Here’s how I see them Machine learning also allows these
shaping the future of both fields: systems to improve their responses over
time.
82
As AI learns from each incident, it Finally, what message or piece of advice
becomes better at making decisions and would you like to leave for readers and
responding to new types of threats, young professionals entering this field?
enhancing the overall effectiveness of the For those entering the field of
response. cybersecurity and digital forensics, my
advice is simple yet powerful: never stop
3. Predictive Analytics for Threat learning and stay curious.
Intelligence This field is dynamic and ever-evolving.
AI and machine learning are powerful What’s relevant today might be outdated
tools for predictive analytics, enabling tomorrow, so it’s essential to
cybersecurity teams to anticipate and continuously update your skills, stay on
prepare for potential threats before they top of emerging trends, and adapt to
occur. By analyzing historical data, new challenges. Whether it’s through
current attack patterns, and emerging certifications, hands-on experience, or
trends, AI systems can predict the following industry developments, always
likelihood of specific types of attacks and keep pushing yourself to learn.
recommend proactive security measures. Another key point is embrace the
This foresight can help organizations challenges. Cybersecurity and digital
strengthen their defenses and stay ahead forensics can be complex, but it’s
of cybercriminals who are constantly through tackling these challenges that
developing new methods to bypass you’ll grow and make a meaningful
traditional security mechanisms. impact. Think creatively, solve problems,
In digital forensics, predictive analytics and never underestimate the power of
can help identify which systems or data persistence. Sometimes, the path to
points are most likely to contain useful uncovering the truth or solving a security
evidence, allowing investigators to focus issue isn't straightforward, but with the
their resources on the most promising right mindset and a willingness to think
leads. outside the box, you'll find solutions.
Finally, remember the importance of
ethics and responsibility in this field.
You’ll be handling sensitive data,
investigating breaches, and protecting
organizations from cyber threats. Always
act with integrity, stay aware of privacy
concerns, and ensure that your work
supports a safer digital environment for
everyone. Cybersecurity isn't just about
technology; it’s about safeguarding
trust, data, and privacy. To young
professionals: You have the power to
make a difference. The skills and
knowledge you develop today will shape
the future of this industry. Stay curious,
stay ethical, and always be prepared for
the next challenge! 83
50
About the Interviewee
He holds certifications like CISA, CEH, CEI, and ISO 27001 Lead
Auditor and is an expert in penetration testing, vulnerability
assessments, and cybersecurity audits. His company, Skynet
Secure Solutions, provides services like ethical hacking training,
digital forensics, and IT security solutions.
Interviewed by B V S S UDAYNADH
( HOD & Asst. Professor- Forensic Science)
Aditya Degree & P.G. College, Surampalem
84
The Impact of AI on
Cybersecurity and Digital
Forensics
Author: Aashtha Tiwari
INTRODUCTION
AI-powered systems use machine
In today's digital world, where data learning (ML) algorithms to
breaches, ransomware attacks, and Detect anomalies: AI models can
advanced persistent threats are becoming identify unusual behavior in networks
more widespread, solid cybersecurity and and systems, flagging potential
competent digital forensics are more threats before they escalate.
important than ever. Artificial intelligence Combat zero-day vulnerabilities: By
(AI) has emerged as a game-changing analyzing patterns and behaviours, AI
technology, altering various industries by can predict and mitigate zero-day
giving sophisticated tools and attacks that traditional systems
methodologies for detecting, preventing, might miss.
and investigating cybercrime. This article Identify advanced persistent threats
investigates AI's transformative role in (APTs): AI tools can uncover stealthy
improving cybersecurity and digital and sophisticated attacks that often
forensics, including its applications, go unnoticed by traditional methods
benefits, and limitations.
Automated Incident Response
AI-driven automation speeds up incident
AI in Cybersecurity: A Proactive Defence
response by isolating affected systems,
Mechanism
generating detailed reports for security
teams, and enabling real-time threat
Artificial intelligence has transformed
neutralization to reduce downtime and
cybersecurity by allowing firms to take a
impact on operations. Additionally, AI can
proactive rather than reactive approach to
profile user behavior to detect insider
threats. AI, with its ability to handle
threats and unauthorized access, such as
massive amounts of data and discover
sudden changes in login locations.
patterns, is changing the way we defend
Behavioural Analytics
against cyberattacks.
AI can profile user behavior to detect
Threat Detection and Prevention
insider threats and unauthorized access.
Traditional security systems rely primarily
For instance, sudden deviations in login
on predetermined criteria to detect
locations or access patterns can trigger
threats, rendering them useless against
alerts, minimizing the risk of data
novel and developing attacks
breaches.
85
Predictive Threat Intelligence
AI enhances threat intelligence by
predicting potential attack vectors and
recommending proactive measures. It
analyses data from previous attacks and
global threat databases to identify trends,
helping organizations stay ahead of cyber
adversaries.
AI in Digital Forensics: Enhancing
Investigative Capabilities
In digital forensics, AI plays a pivotal role
in speeding up investigations and
uncovering hidden evidence. The vast
volume of digital data generated daily · Classification and Attribution: Finding
requires advanced tools for efficient known correlations with other existing
analysis, and AI steps in to meet this malware to establish its genealogy.
demand. · Predicting the change of malware:
Finding potential patterns of change for
Data Evaluation and Pattern Recognition: the TTP of a malware.
Artificial Intelligence has the capability of Natural Language Processing (NLP)
searching through vast amounts of data, NLP is a branch of AI that helps
retrieving comprehensible information investigators to process text data with
and finding trends. In the context of ease. This involveS.
digital forensics this means: . Performing text-based communications
· File and metadata analysis: Computers analysis: AI technology is able to identify
are capable of searching for certain missing links or break into coded
keywords emails or logs with specific messages.
timestamps and correlations that make · Monitoring social media: Information
them relevant, rather than the users about online activities and conversations
having to do so. related to crime can be done with the help
· Image and video analysis: Multimedia of a nlp software.
and other AI tools can scan and interpret ·Comprehensiveness in Translations:
video material assisting in the locating of Investigations can be expanded because
people, objects and locations relevant to artificial translation software can translate
the case. in many languages.
· Timeline reconstruction: AI can piece
together data, events and activities and
form an accurate timeline.
Malware Analysis:
The study of malware is important during
forensic investigations; hence AI helps in:
· Dynamic analysis: Executing malware in
a virtual environment in order to observe
what it does.
86
Network Traffic Analysis
Targeted Attacks -There exist cyber
AI gives the capability to monitor network
criminals that are able to undermine an AI
traffic in real-time to identify unusual
system by supplying false information
activities or patterns that could indicate
called adversarial input. An AI model that
an attack. This feature is critical in
can resist against such input is under
establishing proof of ill-intended
development.
penetration, data breaches, and other
· Confidentiality and Privacy -AI systems
criminal activities over the internet.
are capable of working with an enormous
Benefits of AI in Cybersecurity and
amount of data which raises concern on
Digital Forensics Investigations
the appropriation and safekeeping of
sensitive data. Following and considering
·Time and accuracy -AI cuts down
the GDPR is a must.
significantly the period of threat and
·Dependency and Skill Gap -Over
forensic investigation, hence faster
dependance on AI can create a history of
responses and decisions. Activities that
absence of Cyber Security and Forensic
would require human analysts’ days or
Intelligence. This needs them to be
weeks to accomplish can now be carried
trained and upskilled consistently.
out within hours or even minutes.
· Bias in AI Models -The training sets of AI
·Precision -AI improves the accuracy of
models may introduce specific biases
threat detection and evidence analysis by
that the AI is not adjusted for in the final
reducing the chances of human errors
phases, leading to some false
hence guaranteeing that no crucial
conclusions. These concerns must be
information gets missed out. In particular
mitigated through proper strategy on
when very sensitive information or data is
data set improvement and regular
being discussed and involved in the case
modeling strategies
these details matter.
·Size and Scope -AI solution can perform
datat analysis on multiple levels hence
can be used by organizations that are
large and have large and complex data
sets. This type of scope gives the
assurance that regardless of the amount
of data, their performance will always
remain intact.
·Resource Efficient -The first phase of
setting up these AI systems can be costly
to an organization, but most importantly
in the long run cost will be minimized as
spending cost in hire employees will be
reduced and productivity will be high.
·Difficulties and Ethical Factors -One has
to seek the alternatives to challenges
while availing the opportunities that AI
has to offer.
87
The Future of AI in Cybersecurity and Conclusion
Digital Forensics By bringing previously unheard-of
capabilities for detection, prevention, and
With AI technology advancing rapidly, its inquiry, artificial intelligence is
application in cyberspace and forensic revolutionizing the fields of cybersecurity
systems will be much more advanced in and digital forensics. Even though there
nature. Emerging trends include : are still difficulties, incorporating AI into
these domains has far more advantages
.Explainable AI (XAI): Greater scrutiny over than disadvantages. Adopting AI-driven
AI’s decision-making capabilities to solutions will be essential to preventing
enhance mutual understanding and cyberattacks and protecting our
increase trust. globalized society as the digital landscape
·AI-powered threat intelligence: Exploiting changes. A more secure digital future will
worldwide threat data to assist in the be made possible for both individuals and
prediction of attacks and even prevention. companies by investing in AI technology
·Real-time forensic analysis: Applying AI and developing expertise in their use. To
capabilities to perform live forensic fully realize the potential of these
analysis and active decision making during revolutionary technologies, human
cyber incidents in progress. expertise and AI-driven tools must work in
·Integration with blockchain: Preserving harmony.
data with forensic evidence and logs in a
system that cannot be modified or
destroyed due to the nature of blockchain
respectively.
·Quantum-safe AI: Development of
quantum-resistant AI algorithms in
anticipation of the ramifications of
quantum computing on encryption and
security.
88
Comparative analysis of ML
and DL. Models for Cyber
Threat Detection
Author: Pusapati Viswa Jyothi
ABSTRACT
With the raise in cyber threats, LITERATURE SURVEY
organizations are now trying for better T. Kim, S. C. Suh, H. Kim, J. Kim,“An
techniques in order to analyze the security encoding technique for CNN-based
logs and to ensure effective and network anomaly detection”[1]
automated cyber threat detection. In the discussed that the important challenge
present work our objective is to achieve an in this is identification of network
automated and effective cyber-threat anomalies and problem is data breach
detection framework using Deep Learning which is often caused by malicious
(DL). DL uses self-taught learning to be activities. For this they introduce new
promising in detecting unknown network encoding technique that enhance the
intrusions and it assists the security performance for identification of
analysts to rapidly respond to cyber suspicious events using CNN structure.
threats over a large number of security Sometimes this CNN Structure may or
events. The classification accuracy was may not work better, for this
improved using PSO, it ranks all the theyexamine other CNN Structure such
attributes and select the features. In these as ResNet and VGGNet to compare with
selected features the SVM algorithm is GoggleNet. Recently it has been given a
employed for classifying the data. The greater attention to deal with the
experimental results on different size of growing complexity of datawith higher
dataset shows the effective performance dimensions and non-linearity. Jonghoon
of the proposed data model. Lee,Kim, Ikkyun Kim; Kijun Han “Cyber
Threat Detection Based on Artificial
INTRODUCTION Neural Networks Using Event Profiles”
The increasing integration of the Internet [2] The originality of this work lies in
into daily life has led to more Cyber condensing large data into event
Threats, including new, unseen network profiles for improved cyber threat
attacks. .Detecting these attacks, detection, addressing future cyber
particularly intelligent ones, remains attack challenges. It focuses on
challenging due to high false positives and enhancing threat predictions using
the vast amount of security data. This work multiple deep learning approaches and
aims to develop an automated cyber threat reducing false positive alerts, helping
detection framework using Deep Learning security analysts respond faster. The
(DL) to learn normal and attack patterns method is based on attack signatures.
from data, minimizing false alerts and
improving response times
89
According to Y. Shen et al. in "Tiresias: SYSTEM ANALYSIS
Predicting security events through deep 3.1 Existing
learning," the convolution layer extracts Here we have applied some algorithms
key features by applying filters, (SVM ,KNN, LSTM, CNN) and observed the
calculating scalar products with input evaluation metrics and found some
data, and creating feature maps. These limitations those are as
feature maps are aggregated to generate ·SVM is not suitable for large datasets.
output data. ·KNN depends on quality of data and
MujahidH. Khalifa; Marwa Ammar; Wael prediction stage also might be slow.
Ouarda “Particle swarm optimization for ·LSTM doesn’t have a ability to extract
deep learning of convolution neural features from raw data and it is slow
network” [4] A Deep-learning architecture when more neurons present in hidden
is arepresentation learning methodwith layers.
multiple levels of abstraction. It finds out ·CNN cannot encode the position and
complex structure of nonlinear orientation of object .
processing layer in large datasets for 3.2 Proposed
pattern recognition. From the earliest Building a deep learning model to detect
uses of deep learning, Convolution Neural the potential threats based on features
Network (CNN) can be trained by simple for the
mathematical method based gradient provided dataset is our objective.
descent. One of the most promising In this project Particle Swarm
improvement of CNN is the integration of Optimization (PSO) algorithm is used to
intelligent heuristic algorithms for optimize parameters and for selecting
learning optimization. In this paper, we important features. This method
use the seven layer CNN, named ConvNet, optimizes a problem by continuous trial to
for handwriting digit classification. The improve a solution with respect to a given
Particle Swarm Optimization algorithm measure of quality. It ranks all the
(PSO) is adapted to evolve the internal attributes, defines the parameters and
parameters of processing layers. select the features then SVM is employed
Mohammed Harun Babu R, Vinayakumar R, and then trains the pso selected features
Soman KP “A short review on applications to classify data. The aim of this is to
of deep learning for cyber security “[5] improve classification accuracy by using
discussed that deep Learning is advanced PSO algorithm.
model of traditional Machine Learning. It Merits:
is considered as robust way to solve ·Used in both research and engineering
problems. In this most DL algorithms fields.
come up with best accuracy rate, which ·Simple implementation and
help in building real time applications. computational efficiency
This has been applied towards various use Dataset:
cases in cyber security such as intrusion In this we have used NSL KDD a
detection, malware classification, android benchmark dataset which is taken for
malware detection, spam and phishing Kaggle The NSL KDD dataset, a variant of
detection and binary analysis. This has the the KDDCUP-99, is used for anomaly
capability to extract optimal feature detection.
representation from raw input samples.
90
Fig 1.0 Dataset
It includes 125,973 training instances and ·System Design:
22,543 testing samples with 41 features and PSO (Particle Swarm Optimization): The
5 classes. The features are categorized as goal of this is to find values of variables
follows: 6 binary (Features: 7, 12, 14, 20, 21,
that minimize or maximize the functions
22), 4 categorical (Features: 2, 3, 4, 42), 23while satisfying the constraints. It is an
discrete (Features: 8, 9, 15, 23-41, 43), and 10
artificial intelligence that can be used to
continuous (Features: 1, 5, 6, 10, 11, 13, 16, 17,
find approximate to extreme numeric
18, 19). Data files include KDD Train+ARFF, problems. It applies the concept of social
KDD Test+ARFF, KDD Train+TXT, KDD interaction to problem solving.
Test+TXT, and KDD Test-21.ARFF. Data Pre-processing: It cleans all
3.3 Software Requirements: duplicate values, redundant data and
3.3.1 Python missing values.
In this python language is used which can Generate event vectors and TF-IDF (Text
be used on any operating system. It is an Frequency Inverse Document Frequency)
interpreted language, which means is not values : Generates all unique events in
converted to computer readable code dataset and tf-idf compute each word and
before the program is running. Before these identify important terms in document.
type of languages are know as scripting ·Training and Testing: Data is spilted into
language. 80% training and 20% testing. Here
training is used to create model and
3.3.2 Libraries used in this are testing is used to test the accuracy of the
·Pandas: To read data (csv files ) model.
·Matplotlib: Used for ploting graphs ·Feature extraction: Reduces the number
·Numpy: For numerical operations of features in a dataset by generating new
·Keras: Used to define and train neural features. There are two types of feature
networks models in just a few lines of code extraction i.e, one supervised and other
·Tensorflow: Open source library which is unsupervised. The main aim of this is that
used for data preprocessing fewer features will be required to capture
·Sklearn: Used for clustering, classification the same information. It uses a object
and to build machine learningmode based approach.
91
Fig 2.0 Accuracy, Precision, Recall and Measure graphs
References
1.Kim, Taejoon, Sang C Suh, Hyunjoo Kim, Jonghyun Kim, and Jinoh Kim. “An Encoding
Technique for CNN-Based Network Anomaly Detection.” Proceedings - 2018 IEEE
International Conference on Big Data, Big Data 2018, 2019, 2960–65.
https://doi.org/10.1109/BIGDATA.2018.8622568.
2.Lee, Jonghoon, Jonghyun Kim, Ikkyun Kim, and Kijun Han. “Cyber Threat Detection
Based on Artificial Neural Networks Using Event Profiles.” IEEE Access 7 (2019): 165607–
26. https://doi.org/10.1109/ACCESS.2019.2953095.
3.Shen, Yun, Enrico Mariconti, Pierre Antoine Vervier, and Gianluca Stringhini. “Tiresias:
Predicting Security Events through Deep Learning.” Proceedings of the ACM
Conference on Computer and Communications Security, 2018, 592–605.
https://doi.org/10.1145/3243734.3243811.
4.Khalifa, Mujahid H, Marwa Ammar, Wael Ouarda, and Adel M Alimi. “Particle Swarm
Optimization for Deep Learning of Convolution Neural Network.” Proceedings of: 2017
Sudan Conference on Computer Science and Information Technology, SCCSIT 2017-
November (2018): 1–5. https://doi.org/10.1109/SCCSIT.2017.8293059.
5.R, Mohammed Harun Babu, Vinayakumar R, and Soman KP. “A Short Review on
Applications of Deep Learning for Cyber Security,” 2018.
https://arxiv.org/abs/1812.06292v2.
6.Chen, Jeng Fung, Quang Hung Do, and Ho Nien Hsieh. “Training Artificial Neural
Networks by a Hybrid PSO-CS Algorithm.” Algorithms 2015, Vol. 8, Pages 292-308 8, no.
2 (2015): 292–308. https://doi.org/10.3390/A8020292.
93
"Dowry laws must protect women, but safeguards for men are equally vital to prevent misuse."
"The tragic case of Atul Subhash highlights the urgent need for balanced gender-neutral laws."
"Justice demands that no gender be falsely targeted under the guise of protection."
"Creating special laws for men ensures fairness and deters misuse of dowry legislation."
"Both genders deserve equal legal safeguards to uphold the true spirit of justice."
Atul Subhash, originally from Uttar Pradesh, was As of January, 2025, the legal proceedings are
employed at a private firm in Bengaluru. In 2019, he ongoing. Singhania's bail application is
married Nikita Singhania, but the relationship soon scheduled for a hearing in the Bengaluru court on
deteriorated, leading to prolonged estrangement. January 4. The counsel representing Subhash has
During this period, Subhash was reportedly denied argued that Singhania should not be allowed to
access to their four-year-old son. Singhania filed use their child as a means to secure bail,
multiple legal complaints against Subhash, alleging referencing Subhash's suicide video, where he
cruelty and dowry harassment. explicitly mentioned not to let the child be used
as a tool.
The Incident
Social Media Reaction
On December 9, 2024, Subhash was found dead in
his Bengaluru residence, having died by suicide. He The incident sparked widespread debate on
left behind a 24-page note and an 81-minute video, social media, with hashtags like
in which he accused his estranged wife, her mother, #JusticeForAtulSubhash and #MenToo trending
and her brother of sustained harassment and on platforms such as X (formerly Twitter). Many
extortion. Subhash claimed they demanded users expressed support for Subhash, highlighting
significant sums to settle the disputes and grant the challenges men face in alleged false dowry
him visitation rights. He also alleged judicial cases and harassment. Conversely, some
harassment during the legal proceedings. cautioned against drawing conclusions without a
thorough investigation, emphasizing the
importance of addressing genuine cases of
dowry-related violence.
Media Coverage
The death of Atul Subhash underscores the complexities of matrimonial disputes in India and the
challenges in balancing legal protections to prevent both dowry-related violence and the potential
misuse of laws intended to combat it. This case highlights the need for a nuanced approach to legal
reforms, ensuring justice and protection for all parties involved.
References
BBC News: "Bengaluru techie Subhash Atul suicide sparks debate on dowry laws"
[https://www.bbc.com/news/articles/c33d6161z3yo]
Times of India "Atul Subhash suicide case: Wife Nikita Singhania shouldn't use child as tool for bail,
says counsel." https://tinyurl.com/ynd5jvwe
NDTV- "Justice for Atul Subhash: Suicide triggers men's rights movement" -
https://tinyurl.com/4ujzh78b
Newslaundry- "How Atul Subhash's suicide became a battleground for men's and women's rights
groups" - https://tinyurl.com/8vnn58hf
YouTube Video- "Atul's Wife Shouldn't Be Allowed To Use Child As Tool To Secure Bail | Expert's
Legal-Analysis"- (https://www.youtube.com/watch?v=4avT7jrnqSU)
ABP News- "Justice for Atul Subhash trends on social media as netizens debate misuse of dowry
laws" -https://tinyurl.com/2ra7emjx
Varshini H
Assistant Professor (Department of Forensic Science)
ADPGC - Surampalem.
96
COLOUR
FORENSICS
E x p l o r i n g C o l o u r s F o r e n s i c a l l y
BLACK FORENSICS
Forensics is often seen as a field of stark contrasts—light against
dark, truth against deception. Within this realm lies a compelling
niche often referred to as "Black Forensics," a domain that delves
into the underpinnings of shadowy worlds like digital crime, forensic
anthropology, and criminal psychology. In this article, we explore the
multifaceted dimensions of Black Forensics, where science meets the
enigmatic.
Whether it’s the subtle art of piecing together skeletal remains or the
high-tech pursuit of cybercriminals, Black Forensics remains an
enthralling field where mystery and mastery collide.
RED FORENSICS
The color red evokes powerful imagery—passion, danger, and
sometimes, violence. In the world of forensics, red often represents
blood, the most telling evidence at a crime scene. But how much do we
truly understand about the science and stories hidden within this
crimson hue?
99
For instance, a perfectly round drop indicates a vertical fall, while
elongated stains suggest movement. High-velocity spatters, often seen
in gunshot cases, create a mist-like effect. This evidence can
corroborate or contradict witness statements, bringing clarity to murky
situations.
WHITE FORENSICS
Forensics has always been a fascinating intersection of science,
technology, and mystery-solving. But within this vast field lies a
lesser-explored niche: White Forensics. This specialized area focuses
on the study of substances, materials, and patterns that are invisible
or obscure against white or light-colored backgrounds. From crime
scene investigations to counterfeit detection, White Forensics plays a
critical role in solving some of the most perplexing cases.
2. Latent Fingerprints
For example:
Conclusion
104
Know what’s in the trend
INTRODUCTION
Environmental Protection Agency (EPA)
Per- and polyfluoroalkyl substances (PFAS) are a
developed Method 1633, a performance-based
significant environmental and forensic concern
protocol for PFAS analysis in various matrices.
due to their persistence, bioaccumulation, and
However, traditional manual extraction methods
health risks. This article explores the CEM EDGE
prescribed by this protocol are time-intensive and
PFAS™ automated extraction system, a
prone to variability. The EDGE PFAS™ system
groundbreaking tool designed for the rapid and
addresses these challenges by automating the
efficient extraction of PFAS compounds from
extraction process, reducing sample preparation
various solid matrices, adhering to EPA Method
time to under 10 minutes while ensuring robust
1633. By automating traditionally labor-intensive
quality control.
processes, the EDGE PFAS system ensures high
precision, minimal sample contamination, and
adaptability across complex sample types,
making it an indispensable asset in forensic
laboratories.
CONCLUSION
The EDGE PFAS™ automated extraction system represents a paradigm shift in PFAS analysis, offering
unmatched speed, precision, and versatility. Its adoption in forensic and environmental laboratories
underscores the importance of innovation in addressing contemporary analytical challenges. By
integrating advanced automation and contamination control, the EDGE PFAS™ system sets a new
standard for extracting and analyzing persistent environmental pollutants.
107
Prepare Yourself
UGC NET & FACT QUESTION BANK
1. HPLC technique is NOT used for the analysis of .....
a. Benzodiazepine
b. LSD
c. Ethyl alcohol and methyl alcohol
d. Opium alkaloids
2. ..... is the small quantity for Charas as per NDPS Act.
a.25 grams
b.100 grams
c.250 grams
d.10 grams
6. State the Indian Standards for “Methods of Physical Tests for Hydraulic
Cement” ?
a.IS: 4031-1988
b.IS: 4032-1985
c.IS: 650-1966
IS: 8042-1985
108
7. In synthetic fibers, the regular arrangement of polymers produces double
refraction. The value of Birefringence of polyester fiber is .....
a.0.005
b. 0.053
c.0.175
d.0.032
8. The most suitable forensic technique for polymer fibre content analysis is .....
a.X-Ray Diffraction
b. Mass Spectrometry
c.Emission Spectrography
d. FT-IR
9. The linkage of fired cartridge cases / bullets with suspected rifled firearms is
carried out with the help of which of the following?
a.All individual characteristics present on firearm.
b.Class-characteristics of rifled bore
c.Class characteristics of rifled bore and all individual characteristics present on
firearm
d.Class characteristics of rifled bore and individual characteristics present on
some
10. A fired cartridge case fired from pistol bearing two firing-pin impressions
was recovered from scene of crime. In order to resolve the issue as to which of
the two given pistols has fired it, which one of the following is most appropriate
statement?
a.The most distinct firing pin impression out of these two had fired this cartridge
case. Like this, it can be resolved
b.Examination for the presence of breech-face / chamber / ejector marks on
evidence and test cartridge cases may resolve the issue otherwise, it is not
possible
c.Matching of extractor marks on evidence and test cartridge cases may resolve
the issue
d.Matching of firing pin drag marks on evidence and test cartridge cases may
resolve the issue
109
11. Cephalic index is used to identify .....
a.Age
b. Sex
c.Race
d.Stature
15. Which Instrument is widely used for solving various problems in questioned
document examination?
a. Comparison Microscope
b.Spectral Comparator
c.Scanning Electron Microscope
Mass Spectrophotometer
110
17. “To concentrate too much with writings/signature is the basic fact often a
forger does NOT forgets”—this statement is relevant for:
a.Obliteration of writings or signatures
b.Eraser of writings or signatures
c.Retouching/patching of ink strokes
d.Forging a writing of a known person
20. ..…. judge’s written order for a Police Officer to search a specified place and
to seize evidence.
a.Bail
b.Search Warrant
c.FIR
d. Probable cause
11.C 12.C 13. A 14.A 15.B 16.A 17.D 18.C 19.C 20.B
ANSWERS: 1.C 2.B 3.D 4.D 5.D 6.A 7.C 8.D 9.D 10.B
111
Prepare Yourself
UGC-NET PAPER 1: REASONING APTITUDE
(1) MATHEMATICAL APTITUDE:
Aptitude is the ability to use logical thinking and reasoning to analyse, interpret, and solve
mathematical problems. It involves applying mathematical concepts like arithmetic, algebra,
geometry, and statistics to real-world situations.
Mathematical aptitude is an essential skill in many fields, including: science, engineering, finance,
technology, and everyday life.
1. Fractions
A digit which can be represented in p/q form, where q ≠ 0 is called fractions
To compare a/b and c/d; cross multiply: a X d and c X b if a X d > c X b then a/b > c/d.
To simplify fractions, divide the numerator and denominator with greatest common devisor (GCD).
For Adding and Subtracting Fractions Convert fractions to a common denominator (LCD) before
adding or subtracting. To multiply fraction, multiply numerator together and denominator together
a/b X c/d = (a X c)/ (b X d)
To divide fractions, Multiply the first fraction by the reciprocal of the second fraction
Converting Percentages to Fractions Divide the percentage by 100 and simplify.
Q. A tank is 3/5full. If 20 Liters of water are added, it becomes full. What is the capacity of the tank?
Sol. The remaining 2/5of the tank is filled with 20 Liters.
2/5 of capacity = 20 Liter
Capacity = 20 X 5/2 è 50Liters
2. Averages
The average (also called arithmetic mean) is a measure that represents the central or typical value of a
set of numbers.
Average= Sum of all observations/Number of observations
Sum of Observations= average X Number of observations
When new value is added; new average =
old average + difference in total / New count
when a value is removed ; new average =
old average + difference in total / New count
if a value is replaced;
change in total = new value – old value
Update the total and divide by the number of observations.
If two groups have different averages:
Combined Average= [(n1Xavg1)+(n2Xavg2)]/(n1+n2) (n1,n2 are size of the group).
Average of consecutive numbers
Average=Middle Number (if odd count)
Average=sum of middle numbers/2 (if even count)
Q. The average salary of 8 men is $15,000, and the average salary of 12 women is $12,000. Find the
combined average salary.
Combined Average=SumMen+SumWomen/total count=(120,000+144,000)/20è264,000/20=13,200
112
3. Speed and Distance
Conversion: km/h è5/18 m/s ; m/s è 18/5 km/h
Relative speed Problems on same directions
Relative speed = speed1 – speed 2
Relative speed problems on opposite directions
Relative speed = speed1 + speed2
When two objects start at different points and move towards each other
Time to Meet = Distance Between Them/ relative speed
Downstream and Upstream:
SpeedDownstream: SpeedBoat+ SpeedStream
Speed Upstream: Speed Boat – Speed Stream
Time taken for a round trip: [distance / speed downstream] + [distance / speed upstream]
Time to pass a platform; time =[ length of the train + length of platform] / speed
Q. A train 200 m long is running at 72 km/h. How much time will it take to cross a platform 100 m long?
Time = [200 + 100]/20 è 15 sec
5.Percentages
A percentage is a fraction expressed as a part of 100. It is denoted using the symbol %.
To find
10% keep point after 1 digit from left
1% è keep point after 2 digits
50% è half of 100%
5% è half of 10% or 20
0.5% è half of 1%
For example, to find 15% of a 450
10% + 5% è 15%; 45 + 22.5 è 67.5
Or
113
To find number of given Percentage è (given % / total number) X 100
Percentage of given number è (given num / total %) X total number
If % increases or decreases new value
Increases=[(new value –old value)/old value]X100
decreases=[(old value –new value)/old value]X100
If two successive percentage changes are x% and y%:
Net percentage change = [x+ y (x X y)/100]
If x% of a number is y, the original number is
Original number = (y X 100) / x
Q. After a 15% increase, the price of a product becomes $575. Find the original price.
Let the original price x
è x + (15/100) X x = 575
1.15x = 575
X = 575/ 1.15 è 500
6. Partnership
A partnership is a business arrangement where two or more individuals come together to contribute
capital, labour, or skill to run a business and share the profits or losses. The distribution of profits
and losses depends on the agreement among the partners, which is often proportional to their
contributions of capital and time.
Simple Partnership:
All partners invest their money for the same duration.
Profit is shared in the ratio of their investments.
Compound Partnership:
Partners invest money for different durations.
Profit is shared in the ratio of their effective investments:
Effective Investment= Investment ×Time Period
Profit Sharing Ratio
If A and B invest PAand PB for TAand TByears:
Profit Ratio=(PAX TA)/(PB X TB)
If a new partner joins after some time:
Calculate the effective duration for each partner before dividing profits.
If partners change their investments during the business:
Divide the investment into separate periods and calculate accordingly.
If the profits are to be equally divided irrespective of investments:
Subtract the equal share from the profit before redistributing the remaining portion based on
investments.
Q. A invests $6,000 for 4 months, then reduces it to $4,000 for 8 months. BBB invests $5,000 for 12
months. Find the profit ratio.
Calculate A′s total investment:
For 4 months: 6000×4=24000
For 8 months: 4000×8=32000
Total A: 24000+32000=56000
Calculate B′s total investment:
5000×12=60000
Profit Ratio:
Ratio=56000:60000=28:30
Answer: 14:15.
114
7. Profit and Loss
Cost Price (CP):
The price at which an item is purchased.
Selling Price (SP):
The price at which an item is sold.
Profit:
If SP>CP, the difference is profit.
Formula: Profit=SP−CP
Loss:
If CP>SP, the difference is loss.
Formula: Loss=CP−SP
Gain% = (gain/cp) X 100
Loss% = (loss/cp) X 100
Sp = [(100 + gain%)/100] X cp
sp = [(100 – loss%) /100] X cp
cp = [100/(100 + gain%)] X sp
cp = [100/(100 – loss%)] X sp
A person sells an item at a 10% loss. If the cost price was $200, what is the selling price?
Solution:
Selling price = Cost price × (1 - Loss Percentage)
Selling price = 200 × (1 - 0.10) = $180
Answer: Selling price is $180.
8. Simple interest
Simple Interest (SI) is the interest calculated only on the initial amount of money (the principal) that
is invested or borrowed
SI = PTR / 100
P = principal
T = time period
R = rate of interest
SI = simple interest
P = (SI X 100) / (T X R)
T = (SI X 100) / (P X R)
R = (SI X 100) / (P X T)
The total amount (A) after time T is given by:
A = P+SI = P[1+(R×T)/100]
To convert months into year divide by 12
To convert days into year ; divide by 365
Q. A sum of $12,000 is lent out in two parts: one at 5% per annum and the other at 8% per annum,
both under simple interest. The total interest received after 3 years is $2,340. Find the amount lent at
each rate.
Let x be the amount lent at 5%. Then, amount at 8% = 12000−x
Total interest:
0.15x+0.24(12000−x) =2340
−0.09x=−540⇒x=6000
Answer:
At 5%: $6,000
At 8%: $6,000
115
9. Compound interest
Compound interest is nothing but interest on interest.
The interest will be calculated yearly, half yearly and quarterly.
They may give same rate of interest for whole time period or different rate of interests for every
individual time period like for 1st year x%, 2nd year y%, 3rd year z% likewise, but the process will be
same as given below.
For first year the interest will be calculated same as simple interest; (PTR)/100
For second year interest (I)
previous year I + given % of previous year I
for 3rd year interest (I);
previous year I + given % of previous year I
likewise, we can calculate.
Total amount (TA) = P + CI
Principal = TA – CI
Q. A sum of $8,000 is invested at 8% per annum compounded semi-annually for 1.5 years. Find the
compound interest.
Semi-annually means half-yearly
For first half 320
For second half, 320 + 4% of 320 è 332.8
For 3rd half 332.8 + 4% of 332.8 è 346.112
Add all these interests
compound interest = $998.912.
116
117
118
119
120
121
122
123
124
Thank
You Note
Dr. N. Suguna Reddy
Secretary
Aditya Degree and PG Colleges,
Andhra Pradesh
Dear Readers,
125
Aditya College of
Forensics & Cyber Security
UG Courses PG Courses
B.Sc. Forensic Science M.Sc. Forensic Science
B.Sc. Cyber Security M.Sc Cyber Security
Contact Us:
principalforensic@aditya.ac.in
adminforensic@aditya.ac.in
forensicmagazine@aditya.ac.in
89782 96668
97015 76663
TOP