Monthly Archives: February 2016

Challenges in Cyber Forensics and Cyber Crime Investigation

The cyber forensic ultimately helps in the evidence management to prove a crime. The ultimate aim is to prove that the evidence provided to the court is the evidence collected from the place of commissioning of the crime. Challenges in Cyber Forensic Investigations can be divided in to two classes:

  1. Technical
  2. Human Factor

Technical Limitations

  1. Documentation of all action is required
  2. Preservation of evidence is expensive
  3. Swift action to collect electronic audit trails
  4. Resources are required such as software and hard ware
  5. Time – hard drives are getting
  6. Authenticity of the evidences is highly questionable
  7. The process is time consuming
  8. There are no standards of the forensic examination
  9. Misconceptions and lack of awareness
  10. Maintain the secrecy and the integrity of the data is very difficult
  11. The software are very costly
  12. Difficult to identify the originality of the hardware and software as each device is combination of multi-technologies.

Human Factor:

  1. There is scarcity of the experts in this field
  2. There is a need of consist work for long hours which is difficult
  3. Training of the software is not readily available
  4. Lack of awareness of maintaining the evidences on the crime scene and or in public domain

Legal issues in cyber forensics:

  1. Deciding the jurisdiction is one of the most important issues in computer forensic.
  2. Maintaining the integrity of the evidences is very difficult as it has to pass though through a chain of authorities.
  3. The crimes are mostly cross border hence it is very difficult to initiate the action against the criminals.
  4. There is integration of various laws for example, IPC, CPC, Evidence Act, IP laws and Cyber laws in cyber forensics
  5. The laws in various countries are different and there is no harmony.
  6. The police has limited language of the cyber law hence there is almost no cooperation from them for search and seizure from the crime scene.
  7. There is involvement of constitutional law when comes to privacy, search and seizure
  8. There is application of property laws when it comes to IPR issues
  9. Identity management in the form of digital signatures the the contract act is also involved in the cyber forensics
  10. When there are issues related to torts such as tresspass, negligence and defamation etc then the cyber forensic is again a task.
  11. As far as evidences are concerned the accuracy of presentation, and preserving the evidence in the best more and presenting to the court is one important legal issue