

| Item type | Current library | Status | Barcode | |
|---|---|---|---|---|
|
|
. | Not for loan | LLM516 |
TABLE OF CONTENTS INTRODUCTION ; 1 LEGAL INTERPRETATIONAL ISSUES ; 1.1 TYPES OF EVIDENCE ; 1.2 DOCUMENT ; 1.3 WRITING ; 1.4 PRIMARY OR SECONDARY EVIDENCE ; 1.5 ADMISSIBILITY ; 2 APPLICABILITY OF OLD EVIDENTIARY RULES ; 2.1 RULE AGAINST HEARSAY EVIDENCE ; 2.1.1 The United States ; 2.1.2 The United Kingdom ; 2.1.3 India ; 2.2 BEST EVIDENCE RULE/SECONDARY EVIDENCE RULE ; 3 PROOF, AUTHENTICITY AND AUTHORSHIP ; 3.1 PROOF ; 3.1.1 Proof of Electronic Signature ; 3.1.2 Proof of Electronic Mail ; 3.1.3 Proof of Computer Processes ; 3.2 AUTHENTICITY ; 3.3 AUTHORSHIP ; 4 SOME STANDARDS OF COLLECTION PROCESS UNDER E-EVIDENCES ; 4.1 PRESENCE OF COMPUTER/IT EXPERT(S) IN THE INVESTIGATIVE TEAM: 4.2 TASK ASSIGNMENT: 4.3 PLANNING THE SEARCH AND SEIZURE OPERATION: 4.4 SECURING THE PLACE OF SEARCH AND ELEMENT OF SURPRISE: 4.5 DOCUMENTING THE PLACE OF SEARCH: 4.6 ENQUIRIES FROM THE OCCUPANTS: 4.7 SEIZING THE COMPUTER SYSTEM ITSELF MAY NOT BE PRACTICAL IN MANY CASES: 4.8 REMOVAL OF THE HARD-DISK: 4.9 APPLY THE 'WRITE BLOCKING' SOFTWARE: 4.10 NEED FOR FORENSIC SOFTWARE ON SUSPECT MEDIA: 4.11 PREVENTIVE MEASURES: 4.12 PACKAGING AND TRANSPORTATION OF ELECTRONIC EVIDENCE: 4.13 STORING ELECTRONIC EVIDENCE: 4.14 CHAIN OF CUSTODY: 4.15 PRESERVING THE ORIGINAL: 4.16 "DELETION" MYTHS AND DIGITAL FORENSIC: 5 CYBER FORENSICS RECOVERY AND PRESERVATION PROCESS; 5.1 UNDERSTAND THE SUSPECTS; 5.2 ELECTRONIC EVIDENCE CONSIDERATIONS ; 5.3 SECURE THE MACHINE AND THE DATA; 5.3.1 Examine the machine's surroundings ; 5.3.2 Examine the Live System and record open applications ; 5.3.3 Power down carefully ; 5.3.4 Fully document hardware configuration ; 5.3.5 Duplicate the electronic media (evidence) ; 5.4 E-MAIL REVIEW ; 5.5 E-MAIL HEADERS; 5.6 SORTING THROUGH THE MASSES; 5.7 COMPUTER FORENSIC EXAMPLES; 6 CYBER FORENSIC INITIATIVES AND SOME FORENSIC TOOLS ; 6.1 STRATEGIC APPROACH BY DEITY ; 6.2 HI-TECH CYBER CRIME INVESTIGATION CENTER AT CHI ACADEMY IN COLLABORATION WITH ERNET : 6.3 C-DAC ; 6.3.1 True Back -Disk Imaging Tool ; 6.3.2 Cyber Check-Data Recovery and Analysis Tool.; 6.3.3 Email Tracer-S/W tool for tracing sender of an email ; 6.3.4 Cyber Investigator ; 6.3.5 NeSA (Network Session Analyzer) ; 6.3.6 PDA Imager & Analyzer; 6.3.7 SIM Card Imager & Analyzer ; 6.3.8 Truelmager; 6.3.9 TrueLock; 7 CONCLUSION AND THE NEED FOR A CHANGE ; 8 BIBLIOGRAPHY.