How to report cyber-crime online:
Step 1: Go to https://www.cybercrime.gov.in/Accept.aspx.
Step 2: Click on ‘Report Other Cyber Crimes’ on the menu.
Step 3: Create ‘Citizen login’.
Step 4: Click on ‘File a Complaint’.
Step 4: Read the conditions and accept them.
Step 5: Register your mobile number and fill in your name and State.
Step 6: Fill in the relevant details about the offence.
One can report a cyber-crime by:
• Filing a written complaint in nearest, any Cyber Cell
• Lodging an F.I.R (First Information Report)
• Filing a complaint at https://www.cybercrime.gov.in/Accept.aspx
Who conducts cybercrime investigation:
1. Criminal Justice Agencies and law enforcement agencies: Criminal Justice agencies require knowledge, skills, and abilities beyond those required to investigate, prosecute, adjudicate criminal cases. Law enforcement agencies are police officers, agents, and investigators.
2. National Security Agencies: In National Security Agencies, cybercrime investigations are done mainly by military only if the criminals have connectivity with them.
3. Private Sector: Private organizations also conduct investigations to the reported cybercrime. Persons involved in investigation include private companies, industry bodies, trade organizations. To collect and preserve digital evidence private organizations use IT professionals, digital forensic experts.
4. Public- Private Partnerships (PPPs) and Task forces: Greater number of public-private partnerships are developed nationally and internationally to increase countries capabilities to investigate cybercrime. National task forces have been created to assist in cybercrime investigations.
What are the techniques used during investigation:
Based on the type of cybercrime being investigated and on who is doing investigation, investigation, techniques may vary.
1. Performing background check
2. Gathering information
3. Running digital forensics
4. Tracking the authors of a cyber-crime
Cyber-crime forensic tools:
1. SIFT Workstation: It supports different type of file systems like FAT 12/16/32 also as NTFS, HFS+. EXT2/3/4 RAM dta and data. It works perfectly with single raw image files, Advanced Forensic Format (AFF), expert witness format (EWF), etc
2. The Sleuth kit: It is an open-source collection of Unix and Windows based forensic tools, helps to analyse disk images, and recover files from devices. It supports file systems like FAT/ ExFAT, NTFS, Ext2/3/4, HFS, ISO 9660, to analyse image or disk for windows-, linux-, unix- based operating system
3. X-ways forensics: It is supported with nearly all versions of windows supporting both 32 Bit/ 64 Bit. It also offers advanced detection of deleted partitions on FAT12, FAT16, FAT32, exFAT, TFAT, NTFS, Ext2, Ext3, Ext4, etc
4. CAINE: It works from live CD and it assist to extract data created on multiple operating systems like Linux, Unix and Windows.
5. Digital Forensics Framework (DFF): Researchers can access local and remote devices, local drives, remote server file systems. It can extract data from FAT 12/16/32, EXT 2/3/4 and NTFS on both active and deleted files
6. Oxygen forensic detective: Used by security researchers and forensic professionals to get all data in single place. It is used to extract data from mobile devices, drones, computer OS, which include hacking passwords, bypassing screen lock on android, drone data., information from Linux, MacOS and windows.
7. Open Computer forensic architecture (OCFA): This is developed to speed up digital crime investigation, allowing research to access data from a unifies and UX-friendly interface and integrated into many other popular cybercrime investigation tools like Sleuth Kit, Scalpel, PhotoRec etc
8. Bulk extractor: It is used to extract features like URLs, emails addresses, Mastercard numbers and also for analysis and collection.
9. EXIF tool: It is command-line-based utility which will read, write, and manipulate metadata from different media files like images and videos.
10. Surface browser: It is for detecting complete online infrastructure of any company and getting data from DNS records, domain names and historical WHOIS records, SSL certificates data etc.
Written By:
Akhila Penugondla
[3rd Year, BBA.LLB(Hons.)] under the guidance of Dr. Nagalatha Bathina, Associate Professor, Vignan Institute of Law.
Editorial Director:
Dr. Nagalatha Bathina, Associate Professor, Vignan Institute of Law.
Editors:
Dr. Praveen Kumar, Director, Vignan Institute of Law
Mr. L. Ashish Kumar, Assistant Professor, Vignan Institute of Law
Blog Managed By:
Taj Mahamood Baig [2nd Year, BA.LLB(Hons.)]