Cyber Forensics & Crime Against Women
Total Page:16
File Type:pdf, Size:1020Kb
With Love Cyberlekh Publication’s CYBER FORENSICS & CRIME AGAINST WOMEN Another Contributions February 2019 Copyright 2019 © CYBERLEKH PUBLICATION’s All rights including copyrights of translation etc. reserved and vested exclusively with CYBERLEKH PUBLICATION’s (an imprint of cybertalkindia). No part of this publication may be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, or stored in any retrieval system of any nature without the permission of the copyright owner. Price : ₹ 500.00 /- (Including All Taxes) Edition : First 2019 ISBN :- 978-17-3131-881-7 Published By : CYBERLEKH PUBLICATION’s Printed in India Printed at New Delhi Disclaimer : Due care & diligence has been taken while editing and publishing this book. Publisher has taken all care & amp; effort to make this book. However, neither the author nor publisher of the book holds any responsibility for any mistake that may have inadvertently crept in. The publisher shall not be liable for any direct, consequential, or any incidental damages, arising out of use of this book. DEDICATED TO “Ms.Pushpita Tripathi” Founder’s Sister Message from the Founder’s Desk To all the Readers and Contributors of this book: Bringing innovative strategies to the attention of policy makers and hence empowering the youth towards the digitalization has always been a highly essential part of the working of “CYBERTALKINDIA”. This book based on the Different papers, is a culmination of different insights which highlight alternative viewpoints, development approaches and innovative technologies backed by analysis and information from various experts across the globe. This book is geared to the needs of practitioners. Through this book, we have tried to bridge the gap between new ideas and theories and field trials. However, this masterpiece would not have been possible without the valuable contribution from our avid writers. I wish to express my deepest gratitude to all our contributors for their incessant support and for making this entire event a huge success. The authors in this book have harvested to the core problem and have cohesively voiced their opinion in the best possible way. Kudos to all authors and Netizens! Mr. Akash Kamal Mishra Founder & CEO CYBERTALKINDIA ABOUT CYBERTALKINDIA “An ISO 9001: 2015 Certified and registered Firm in Indore, Madhya Pradesh, India which aims to focus on cybersecurity training and skill development about digital citizenship and internet safety. With the cashless economy boom, there is a pressing need to create a cyber-aware generation. We have an experience of working over with the School Kids, College Students, Professionals, Law Enforcement Agencies and Senior Citizens on the lines of Cyber Security Awareness. We also offer dedicated courseware on Cyber Security, Cyber Law, and Internet Maturity Education and there are many more things which we offer. Our founder is one such great personality and has been working day and night for the cyber safety he has completed more over 100+ schools of different cities for the cyber safety awareness and has spoken more than 20k+ students about their safety rights. CYBERTALKINDIA – Netizens Choice is working day and night for the protection of the Netizens with a positive blessing of the net users available in our country. We also believe that publication is one such mode to express our views in a different part of the country with this thought we started CYBERLEKH PUBLICATION’S (an imprint of cybertalkindia) our own publication wing to make awareness through our writings and also by the writings of the young Netizens. We are being recognized by many governments, nonprofit organizations, advocates firms, corporates and also with many educational institutions. www.cybertalkindia.com PREFACE Every second, one woman in India gets tricked to be a victim of cyber crimes and the online platform is now the new platform where a woman’s dignity, privacy and security is increasingly being challenged every moment. Trolling, abusing, threatening, stalking, voyeurism, body-shaming, defaming, surveillance, revenge porn and other forms of indecent representation of women are rampant in the cyber world. In cyber crimes against women, the effect is more mental than physical while the focus of the laws ensuring women’s security is more on physical than mental harm. It is true that the National Crime Records Bureau (NCRB) of India does not maintain any separate record of cyber-crimes against women. Technology is the resource used by some perpetrators who target to defame women by sending obscene WhatsApp messages, e-mail, stalking women by using chat rooms, websites, and worst of all by developing pornographic videos, mostly created without their consent, spoofing e-mails, morphing of images for pornographic content by using various softwares available online. Indian women are not able to report cyber crimes immediately as they are not really aware as to where to report such crimes or are not serious about reporting the same due to social embarrassment they don’t want to face. Their mindset needs to broaden and they must be the whip to curb down by taking derring-do against such perpetrators, that is to go ahead and lodge an immediate complaint. Most of the problems can be solved if women report the crime immediately and warn the abuser about taking strong legal action. Through this book I take this opportunity to clear the various types of cyber crime against women take place as well as the functioning part of the forensics in the digitalization word. I take this opportunity to congratulate all authors and contributors and everyone who have put in extra efforts to make this book a grand success. Happy reading! INDEX S. No. Title of Paper Page No. 1 CYBER FORENSIC SCIENCE 01-47 Ms. Pooja Verma , School of Law, Galgotias University, Greater Noida, U.P. CYBER CRIMES AGAINST WOMEN 2 48-59 Ms. Priyanshi Chandrawat , Indore Institute of Law, Indore, Madhya Pradesh. 3 DIGITAL FORENSIC SCIENCE 60-114 Mr. Hitanshu Arora, School of Law, Galgotias University, Greater Noida, U.P. 4 115-118 CRIMES ON SOCIAL MEDIA Ms. Aastha Agrawal, Indore Institute of Law,Indore, Madhya Pradesh. 5 119-126 JUDICIARY ON CYBER SECURITY Ms. Shivani Choudhary, Prestige Institute of Law , Indore, Madhya Pradesh. I CYBER FORENSIC SCIENCE Ms. Pooja Verma School of Law, Galgotias University, Greater Noida, U.P. I.I. INTRODUCTION Computer forensics is the application of investigation &analysis techniques to gather &preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device &who was responsible for it.1 Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media. Once the original media has been copied, it is locked in a safe or other secure facility to maintain its pristine condition. All investigation is done on the digital copy. Investigators use a variety of techniques &proprietary software forensic applications to examine the copy, searching hidden folders &unallocated disk space for copies of deleted, encrypted, or damaged files. Any evidence found on the digital copy is carefully documented in a "finding report" &verified with the original in preparation for legal proceedings that involve discovery, depositions, or actual litigation. Computer forensics has become its own area of scientific expertise, with accompanying coursework &certification.2 Computers are used for committing crime, and, thanks to the burgeoning science of digital evidence forensics, law enforcement now uses computers to fight crime. 1 Margaret Rouse, computer forensic (Oct 15, 2018, 14:06) https://searchsecurity.techtarget.com/definition/computer-forensics. 2Id. 1 Digital evidence is information stored or transmitted in binary form that may be relied on in court. It can be found on a computer hard drive, a mobile phone, a personal digital assistant (PDA), a CD, &a flash card in a digital camera, among other places. Digital evidence is commonly associated with electronic crime, or e-crime, such as child pornography or credit card fraud. However, digital evidence is now used to prosecute all types of crimes, not just e-crime. For example, suspect’s e-mail or mobile phone files might contain critical evidence regarding their intent, their whereabouts at the time of a crime &their relationship with other suspects. In 2005, for example, a floppy disk led investigators to the BTK serial killer who had eluded police capture since 1974 &claimed the lives of at least 10 victims. In an effort to fight e-crime &to collect relevant digital evidence for all crimes, law enforcement agencies are incorporating the collection &analysis of digital evidence, also known as computer forensics, into their infrastructure. Law enforcement agencies are challenged by the need to train officers to collect digital evidence &keep up with rapidly evolving technologies such as computer operating systems.3 DEFINITION The simple definition of computer forensics is the art &science of applying computer science to aid the legal process. With the rapid advance in technology it quickly became more than just an art thou, &nowadays you can even get a cyber forensics specialization degree on the subject. Although plenty of science is attributable to computer forensics, most successful investigators possess a nose for investigations &a skill for solving puzzles, which is where the art comes in. it is more than the technological, systematic inspection of the computer system &its contents for evidence or supportive evidence of a civil wrong or a criminal act. Computer forensics requires specialized expertise &tools that goes above &beyond the normal data collection &preservation techniques available to end-users or system support personnel.