SlideShare a Scribd company logo
1 of 10
ARTIFICIAL INTELLIGENCE BASED
CYBER FORENSICS TOOLS: RELEVANCY
AND ADMISSIBILITY
Submitted to: Prof. (Dr) Yogendra Kumar Srivastava
CYBER FORENSICS AND CYBER CRIME
Submitted by: Anadi Tewari
Master of Laws-LLM (Technology and Law)
Hidayatullah National Law University, Raipur
INTRODUCTION
‘Digital Forensics’ is referred to as “the use of scientifically derived
and proven methods toward the preservation, collection,
validation, identification, analysis, interpretation, documentation
and presentation of digital evidence derived from digital sources
for the purpose of facilitating or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorized
actions shown to be disruptive to planned operations.
o M/s PPK NewsClick Private Limited v. UOI & Others (2023)
o Foundation for Media Professionals v. Union of India &
Others
o Technology plays a major role: its usage by offenders &
investigators [identification of digital evidence, preservation
and analysis and presentation before the court
o History & Advancement of Digital Forensic: India & Global level
CYBER FORENSICS AND CYBER CRIME
METHODOLOGY OF DIGITAL FORENSICS
CYBER FORENSICS AND CYBER CRIME
o Information Technology Act, 2000 (incl. 2008 amendment), Evidence Act, EUGDPR, Electronic
Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya
Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023.
o Lack of any standardization in the data collected also creates a nuisance when it comes to drawing
an analysis, which seems very complex for human beings but is equally on the same footing for the
digital forensic tools as well.
o When advanced tools are being used for extraction of digital evidence, emphasis must also be put
that individual rights are not compromised; focus should remain on the justice delivery and
ensuring realization of rights.
ADVANCEMENT OF DIGITAL FORENSICS: INDIA & GLOBAL
CYBER FORENSICS AND CYBER CRIME
o Enactment of new forensic technologies vis-à-vis Rule of Law.
o AI and Machine Learning based techniques: advanced and faster than
traditional means; creating another human to assist human in a more
accurate way [ISRAEL COLLECTING DIGITAL EVIDENCE FOR WAR
CRIMES CASES AGAINST HAMAS]
o Faster and quick-paced investigations; machine learning helps in automatic
analysis of data without requirement of any additional programming. (easy
analysis of Big data)
o Traditional method of forensic investigation majorly emphasises on search
and analysis of digital devices which is also manually and could be prone to
certain errors. However, with AI-based tools, results are seen in terms of
how automation process of collecting evidence is there by mitigating the
time and effort that was originally being put.
o DEEP LEARNING: Combination of neural networks for probable pattern
detection and could be regarded as the advanced version of segregating the
important pieces of evidence that is needed by the investigator to reach to a
probable conclusion.
TOOLS OF DIGITAL FORENSICS: AI & MACHINE LEARNING
SAFE STORAGE TECHNOLOGIES FOR DIGITAL EVIDENCE
HASHING TECHNIQUE (DIGITAL
FOOTPRINT)
LONG TERM STORAGE (DISTRIBUTED
LEDGER)
CYBER FORENSICS AND CYBER CRIME
o Australia: Uniform Evidence Acts, 1985; United Kingdom: United
Kingdom Police and Criminal Evidence Act, 1984; Section 20 and
Section 69; USA: The wiretap act, the pen registers and trap an trace
devices statute, and the stored wired and telecommunication act and
4th amendment.
o Shreya Singhal v. UOI (2015): SC called for cyber-crime’s systematic
regulation and has also emphasised on the lack of procedural checks
that persists.
o Information Technology Act, 2000 (incl. 2008 amendment), SECTION
65B(4) of Evidence Act, EUGDPR, Electronic Communications and
Privacy Act, 1986 and Federal Rules of Civil Procedure of USA.
Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya
Adhiniyam, 2023.
o BSA 2023: Section 61: electronic evidence is being treated at par with
the primary evidence; Section 63(4)(c): introduces Format of creation of
Certificate for creation of electronic or digital records.
DIGITAL EVIDENCE: RELEVANCY AND ADMISSIBILITY
ADMISSIBILITY OF ELECTRONIC EVIDENCE: JUDICIARY AT
FOREFRONT
Requirement of Certificate under Section 65B:
o NCT of Delhi v. Navjot Sandhu (2005)
o Anwar PV v. PK Basheer (2014): Can be produced at any stage if trial is not over.
o Tomaso Bruno v. State of UP (2015): requirement of certificate not mandatory.
o Shafhi Mohammed v. State of Himachal Pradesh (2018): requirement of certificate could be
relaxed by courts.
o Arjun Khotkar v. KK Gorantyal and Others (2020): View in Anwar upheld.
o State of Karnataka v. T Naseer (2023): Certificate can be produced at any stage of trial.
o Virendra Khanna v. State of Karnataka (2021; KHC): Guidelines issued for search of
smartphones, laptops, electronic gadgets, email accounts etc.
o Rakesh Shetty v. State of Karnataka (2020; KHC): Investigating agency cannot retain
username/password of accused person’s social media platform.
o XXX v. State of Kerala (2023; KeHC): Guidelines issued on handling of digital evidences
containing sexually explicit materials.
KEY FINDINGS AND FUTURE SUGGESTIVE DIRECTIONS
Effectiveness; improvement in comparison to traditional tools; challenges arising in
admissibility of electronic evidences; ethical and legal concerns to privacy.
KEY FINDINGS
Future Suggestions
Establishing industry-wide norms and guidelines for the usage of AI-powered
cyber forensics technologies; Ethical guidelines should be developed to govern
the use of AI in cyber forensics, ensuring that investigations prioritize privacy
and adhere to ethical standards while effectively combating cybercrime [Refer
to SC and KHC and KeHC guidelines]
CREDITS: This presentation template was created by Slidesgo, including icons by
Flaticon, and infographics & images by Freepik
THANKS!
Do you have any questions?
anadi.23727@hnlu.ac.in
+91 8299338062
CYBER FORENSICS AND CYBER CRIME

More Related Content

Similar to ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx

Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Bilingual Publishing Group
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 

Similar to ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx (20)

Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020Journal of Computer Science Research | Vol.2, Iss.4 October 2020
Journal of Computer Science Research | Vol.2, Iss.4 October 2020
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 

Recently uploaded

Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 

Recently uploaded (20)

Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 

ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibility.pptx

  • 1. ARTIFICIAL INTELLIGENCE BASED CYBER FORENSICS TOOLS: RELEVANCY AND ADMISSIBILITY Submitted to: Prof. (Dr) Yogendra Kumar Srivastava CYBER FORENSICS AND CYBER CRIME Submitted by: Anadi Tewari Master of Laws-LLM (Technology and Law) Hidayatullah National Law University, Raipur
  • 2. INTRODUCTION ‘Digital Forensics’ is referred to as “the use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations. o M/s PPK NewsClick Private Limited v. UOI & Others (2023) o Foundation for Media Professionals v. Union of India & Others o Technology plays a major role: its usage by offenders & investigators [identification of digital evidence, preservation and analysis and presentation before the court o History & Advancement of Digital Forensic: India & Global level CYBER FORENSICS AND CYBER CRIME
  • 3. METHODOLOGY OF DIGITAL FORENSICS CYBER FORENSICS AND CYBER CRIME
  • 4. o Information Technology Act, 2000 (incl. 2008 amendment), Evidence Act, EUGDPR, Electronic Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023. o Lack of any standardization in the data collected also creates a nuisance when it comes to drawing an analysis, which seems very complex for human beings but is equally on the same footing for the digital forensic tools as well. o When advanced tools are being used for extraction of digital evidence, emphasis must also be put that individual rights are not compromised; focus should remain on the justice delivery and ensuring realization of rights. ADVANCEMENT OF DIGITAL FORENSICS: INDIA & GLOBAL CYBER FORENSICS AND CYBER CRIME
  • 5. o Enactment of new forensic technologies vis-à-vis Rule of Law. o AI and Machine Learning based techniques: advanced and faster than traditional means; creating another human to assist human in a more accurate way [ISRAEL COLLECTING DIGITAL EVIDENCE FOR WAR CRIMES CASES AGAINST HAMAS] o Faster and quick-paced investigations; machine learning helps in automatic analysis of data without requirement of any additional programming. (easy analysis of Big data) o Traditional method of forensic investigation majorly emphasises on search and analysis of digital devices which is also manually and could be prone to certain errors. However, with AI-based tools, results are seen in terms of how automation process of collecting evidence is there by mitigating the time and effort that was originally being put. o DEEP LEARNING: Combination of neural networks for probable pattern detection and could be regarded as the advanced version of segregating the important pieces of evidence that is needed by the investigator to reach to a probable conclusion. TOOLS OF DIGITAL FORENSICS: AI & MACHINE LEARNING
  • 6. SAFE STORAGE TECHNOLOGIES FOR DIGITAL EVIDENCE HASHING TECHNIQUE (DIGITAL FOOTPRINT) LONG TERM STORAGE (DISTRIBUTED LEDGER) CYBER FORENSICS AND CYBER CRIME
  • 7. o Australia: Uniform Evidence Acts, 1985; United Kingdom: United Kingdom Police and Criminal Evidence Act, 1984; Section 20 and Section 69; USA: The wiretap act, the pen registers and trap an trace devices statute, and the stored wired and telecommunication act and 4th amendment. o Shreya Singhal v. UOI (2015): SC called for cyber-crime’s systematic regulation and has also emphasised on the lack of procedural checks that persists. o Information Technology Act, 2000 (incl. 2008 amendment), SECTION 65B(4) of Evidence Act, EUGDPR, Electronic Communications and Privacy Act, 1986 and Federal Rules of Civil Procedure of USA. Bhartiya Nagrika Suraksha Sanhita, 2023 and Bhartiya Sakshya Adhiniyam, 2023. o BSA 2023: Section 61: electronic evidence is being treated at par with the primary evidence; Section 63(4)(c): introduces Format of creation of Certificate for creation of electronic or digital records. DIGITAL EVIDENCE: RELEVANCY AND ADMISSIBILITY
  • 8. ADMISSIBILITY OF ELECTRONIC EVIDENCE: JUDICIARY AT FOREFRONT Requirement of Certificate under Section 65B: o NCT of Delhi v. Navjot Sandhu (2005) o Anwar PV v. PK Basheer (2014): Can be produced at any stage if trial is not over. o Tomaso Bruno v. State of UP (2015): requirement of certificate not mandatory. o Shafhi Mohammed v. State of Himachal Pradesh (2018): requirement of certificate could be relaxed by courts. o Arjun Khotkar v. KK Gorantyal and Others (2020): View in Anwar upheld. o State of Karnataka v. T Naseer (2023): Certificate can be produced at any stage of trial. o Virendra Khanna v. State of Karnataka (2021; KHC): Guidelines issued for search of smartphones, laptops, electronic gadgets, email accounts etc. o Rakesh Shetty v. State of Karnataka (2020; KHC): Investigating agency cannot retain username/password of accused person’s social media platform. o XXX v. State of Kerala (2023; KeHC): Guidelines issued on handling of digital evidences containing sexually explicit materials.
  • 9. KEY FINDINGS AND FUTURE SUGGESTIVE DIRECTIONS Effectiveness; improvement in comparison to traditional tools; challenges arising in admissibility of electronic evidences; ethical and legal concerns to privacy. KEY FINDINGS Future Suggestions Establishing industry-wide norms and guidelines for the usage of AI-powered cyber forensics technologies; Ethical guidelines should be developed to govern the use of AI in cyber forensics, ensuring that investigations prioritize privacy and adhere to ethical standards while effectively combating cybercrime [Refer to SC and KHC and KeHC guidelines]
  • 10. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik THANKS! Do you have any questions? anadi.23727@hnlu.ac.in +91 8299338062 CYBER FORENSICS AND CYBER CRIME