Cyber Forensics: Case Studies from India

Case Studies :: Case - 1: Blackmailing  
State
:
Maharashtra
City
:
Mumbai
Sections of Law
:
292, 389, 420, 465, 467, 468, 469, 471, 474 IPC
 
 
r/w 67 of IT Act 2000.
“The first faults are theirs that commit them; The second faults are theirs that permit them.” - Thomas Fuller

Background
The accused posed to be a young girl living in Kolkata and lured a non-resident Indian (NRI) working in Dubai (the complainant) to enter into an e-mail correspondence. Subsequently, the accused began corresponding with the complainant using different e-mail IDs, under the guise of different female names which made the complainant believe that he was corresponding with different girls.

Having won the confidence of the complainant, the accused asked him for money and gifts. The complainant complied with the requests in the hope of receiving sexual favours from the 'girls' he was corresponding with. However after a period of time, when these favours were not forthcoming the complainant stopped this correspondence.

The accused then resorted to blackmailing the complainant by referring to the e-mail exchanges that had taken place earlier. In addition, the accused led the complainant to believe that one of the girls had committed suicide and that the complainant was responsible for it. The accused also sent fake copies of the letters from CBI, High Court of Calcutta, New York Police and Punjab University etc.

The complainant lived in constant fear of being arrested in connection with the suicide over a year and a half. He paid the accused a sum of INR 12.5 million ostensibly to bribe the officials that were supposedly investigating the suicide and to compensate the victim's family for the loss of her income. The complainant was continuously under the threat of being arrested by the police. Given the huge strain upon his financial resources as well as the mental agony faced by him, the complainant himself contemplated suicide.

Investigation
The complainant handed over all the e-mail correspondence to the police. Many of them had masked headers and therefore the police could not investigate them any further. Moreover there was no e-mail that could be traced to Kolkata where the accused was staying as per the complainant's version. However the investigating team was able to trace some of these e-mails to the corporate office of a large cement company and a residence in Mumbai. A raid was conducted at these premises.

In the raid one computer, two laptops, seven mobile phones and a scanner were seized. The computer equipment that was recovered was sent to the office of the forensic examiner, who found all the evidences of e-mails, chatting details etc in the laptops and the computer.

During the investigation, property worth INR 0.9 million was seized, along with cash worth INR 0.3 million. The total flow of the extorted money was traced from the bank in Dubai to the account of the accused person.

Current status
Charge sheet is submitted in the court and the matter is subjudice.

This case won the first runner up position for the India Cyber Cop Award, for its investigating officer Mr Deepak Dhole, Inspector, Mumbai Police. This case was a classic example of social engineering when Internet was just beginning to take off in India. The police response was swift and the case investigation thorough and professional. 
 
Case-2: Credit Card Fraud  
State
:
Tamil Nadu
City
:
Chennai
Sections of Law
:
Section of Law: 66 of Information Technology Act
 
 
2000 & 120(B), 420,467,468,471 IPC.
“The environment that the organisation worries about is put there by the organisation.” - Weick

Background
The assistant manager (the complainant) with the fraud control unit of a large business process outsourcing (BPO) organization filed a complaint alleging that two of its employees had conspired with a credit card holder to manipulate the credit limit and as a result cheated the company of INR 0.72 million.

The BPO facility had about 350 employees. Their primary function was to issue the bank's credit cards as well as attend to customer and merchant queries. Each employee was assigned to a specific task and was only allowed to access the computer system for that specific task. The employees were not allowed to make any changes in the credit-card holder's account unless they received specific approvals.

Each of the employees was given a unique individual password. In case they entered an incorrect password three consecutive times then their password would get blocked and they would be issued a temporary password.

The company suspected that its employees conspired with the son (holding an add-on card) of one of the credit card holders. The modus operandi suspected by the client is as follows.

The BPO employee deliberately keyed in the wrong password three consecutive times (so that his password would get blocked) and obtained a temporary password to access the computer system. He manually reversed the transactions of the card so that it appeared that payment for the transaction has taken place. The suspect also changed the credit card holder's address so that the statement of account would never be delivered to the primary card holder.

Investigation
The investigating team visited the premises of the BPO and conducted detailed examination of various persons to understand the computer system used. They learnt that in certain situations the system allowed the user to increase the financial limits placed on a credit card. The system also allowed the user to change the customer's address, blocking and unblocking of the address, authorisations for cash transactions etc.

The team analysed the attendance register which showed that the accused was present at all the times when the fraudulent entries had been entered in the system. They also analysed the system logs that showed that the accuser's ID had been used to make the changes in the system.

The team also visited the merchant establishments from where some of the transactions had taken place. The owners of these establishments identified the holder of the add-on card.

Current status
The BPO was informed of the security lapse in the software utilised. Armed with this evidence the investigating team arrested all the accused and recovered, on their confession, six mobile phones, costly imported wrist watches, jewels, electronic items, leather accessories, credit cards, all worth INR 0. 3 million and cash INR 25000. The investigating team informed the company of the security lapses in their software so that instances like this could be avoided in the future.

This case won the second runner-up position for the India Cyber Cop Award, for its investigating officer Mr S. Balu, Assistant Commissioner of Police, Crime, Chennai Police. The case was remarkable for the excellent understanding displayed by the investigating team, of the business processes and its use in collecting digital evidence.

 Case-3: Hosting Obscene Profiles  
State
:
Tamil Nadu
City
:
Chennai
Sections of Law
:
67 of Information Technology
 
 
Act 2000 469, 509 of the Indian Penal code
“Nothing has really happened until it has been recorded.” - Virginia Woolf 

Background
The complainant stated that some unknown person had created an e-mail ID using her name and had used this ID to post messages on five Web pages describing her as a call-girl along with her contact numbers.

As a result she started receiving a lot of offending calls from men.

Investigation
After the complainant heard about the Web pages with her contact details, she created a username to access and view these pages.

Using the same log-in details, the investigating team accessed the Web pages where these profiles were uploaded. The message had been posted on five groups, one of which was a public group.
The investigating team obtained the access logs of the public group and the message to identify the IP addresses used to post the message. Two IP addresses were identified.

The ISP was identified with the help of publicly available Internet sites. A request was made to the ISPs to provide the details of the computer with the IP addresses at the time the messages were posted. They provided the names and addresses of two cyber cafes located in Mumbai to the police.

The investigating team scrutinised the registers maintained by the cyber cafes and found that in one case the complainant's name had been signed into the register.

The team also cross-examined the complainant in great detail. During one of the meetings she revealed that she had refused a former college mate who had proposed marriage.

In view of the above the former college mate became the prime suspect. Using this information the investigating team, with the help of Mumbai police, arrested the suspect and seized a mobile phone from him. After the forensic examination of the SIM card and the phone, it was observed that phone had the complainant’s telephone number that was posted on the internet. The owner of the cyber cafes also identified the suspect as the one who had visited the cyber cafes.

Based on the facts available with the police and the sustained interrogation the suspect confessed to the crime.

Current status
The suspect was convicted of the crime and sentenced to two years of imprisonment as well as a fine.


Case - 4: Illegal money transfer  
State
:
Maharashtra
City
:
Pune
Sections of Law
:
467,468, 471, 379,419, 420, 34 of IPC & 66 of IT ACT
“The present contains nothing more than the past, and what is found in the effect was already in the cause.” - Henri Bergson 

Background
The accused in the case were working in a BPO, that was handling the business of a multinational bank. The accused, during the course of their work had obtained the personal identification numbers (PIN) and other confidential information of the bank’s customers. Using these the accused and their accomplices, through different cyber cafes, transferred huge sums of money from the accounts of different customers to fake accounts.

Investigation
On receiving the complaint the entire business process of the complainant firm was studied and a systems analysis was conducted to establish the possible source of the data theft.

The investigators were successful in arresting two people as they laid a trap in a local bank where the accused had fake accounts for illegally transferring money.

During the investigation the system server logs of the BPO were collected. The IP addresses were traced to the Internet service provider and ultimately to the cyber cafes through which illegal transfers were made.

The registers maintained in cyber cafes and the owners of cyber cafes assisted in identifying the other accused in the case. The e-mail IDs and phone call print outs were also procured and studied to establish the identity of the accused. The e-mail accounts of the arrested accused were scanned which revealed vital information to identify the other accused. Some e-mail accounts of the accused contained swift codes, which were required for internet money transfer.

All the 17 accused in the case were arrested in a short span of time. The charge sheet was submitted in the court within the stipulated time. In the entire wire transfer scam, an amount to the tune of about INR 19 million was transferred, out of this INR 9 million was blocked in transit due to timely intimation by police, INR 2 million was held in balance in one of the bank accounts opened by the accused which was frozen. In addition the police recovered cash, ornaments, vehicles and other articles amounting to INR 3 million.

During the investigation the investigating officer learned the process of wire transfer, the banking procedures and weakness in the system. The investigating officer suggested measures to rectify the weakness in the present security systems of the call centre. This has helped the local BPO industry in taking appropriate security measures.

Current status
Pending trial in the court.

This case won the India Cyber Cop Award, for its investigating officer Mr Sanjay Jadhav, Assistant Commissioner of Police, Crime, Pune Police. The panel of judges felt that this case was the most significant one for the Indian IT industry during 2005 and was investigated in a professional manner, with substantial portion of the swindled funds being immobilised, a large number of persons were arrested and the case was sent to the court for trial within 90 days.


Case-5: Fake Travel Agent  
State
:
Maharashtra
City
:
Mumbai
Sections of Law
:
420, 465, 467, 468, 471, 34 of IPC r/w 143 of Indian Railway Act 1989.
“Today's problems come from yesterday's "solutions." - Senge 

Background
The accused in this case was posing to be a genuine railway ticket agent and had been purchasing tickets online by using stolen credit cards of non residents. The accused created fraudulent electronic records/ profiles, which he used to carry out the transactions.

The tickets so purchased were sold for cash to other passengers. Such events occurred for a period of about four months.

The online ticket booking service provider took notice of this and lodged a complaint with the cyber crime investigation cell.

Investigation
The service provider gave the IP addresses, which were used for the fraudulent online bookings, to the investigating team. IP addresses were traced to cyber cafes in two locations.

The investigating team visited the cyber cafŽs but was not able to get the desired logs as they were not maintained by the cyber cafŽ owners. The investigating team was able to short list the persons present at cyber cafes when the bookings were made. The respective owners of the cyber cafes were able to identify two persons who would regularly book railway tickets.

The investigating team then examined the passengers who had travelled on these tickets. They stated that they had received the tickets from the accused and identified the delivery boy who delivered the tickets to them. On the basis of this evidence the investigating team arrested two persons who were identified in an identification parade.

Current status
The charge sheet has been submitted in the court.


Case-6: Creating Fake Profile  
State
:
Andhra Pradesh
City
:
Hyderabad
Sections of Law
:
67 Information Technology Act 2000 507, 509 of the Indian Penal Code
“Life is the art of drawing sufficient conclusions from insufficient premises.” - Samuel Butler
Background

The complainant received an obscene e-mail from an unknown e-mail ID. The complainant also noticed that obscene profiles along with photographs of his daughter had been uploaded on matrimonial sites.

Investigation
The investigating officer examined and recorded the statements of the complainant and his daughter. The complainant stated that his daughter was divorced and her husband had developed a grudge against them due to the failure of the marriage.

The investigating officer took the original e-mail from the complainant and extracted the IP address of the same. From the IP address he could ascertain the Internet service provider.

The IP address was traced to a cable Internet service provider in the city area of Hyderabad. The said IP address was allotted to the former husband sometime back and his house was traced with the help of the staff of ISP.

A search warrant was obtained and the house of the accused was searched. During the search operation, a desktop computer and a handicam were seized from the premises. A forensic IT specialist assisted the investigation officer in recovering e-mails (which were sent to the complainant), using a specialised disk search tool as well as photographs (which had been posted on the Internet) from the computer and the handicam respectively. The seized computer and the handicam were sent to the forensic security laboratory for further analysis.

The experts of the forensic security laboratory analysed the material and issued a report stating that: the hard disk of the seized computer contained text that was identical to that of the obscene e-mail; the computer had been used to access the matrimonial websites on which the obscene profiles were posted; the computer had been used to access the e-mail account that was used to send the obscene e-mail; the handicam seized from the accused contained images identical to the ones posted on the matrimonial Websites. Based on the report of the FSL it was clearly established that the accused had: created a fictitious e-mail ID and had sent the obscene e-mail to the complainant; posted the profiles of the victim along with her photographs on the matrimonial sites.
Current status
Based on the material and oral evidence, a charge sheet has been filed against the accused and the case is currently pending trial.


Case-7: Intellectual Property Theft  
State
:
Karnataka
City
:
Bangalore
Sections of Law
:
65 and 66 of the Information Technology Act 2000


381, 420 of the Indian Penal Code
“Unfortunately, problems do not come to the administrator carefully wrapped in bundles with the value elements and the factual elements neatly sorted.” - Herbert Simon 

Background
The complainant (software company based in Bangalore) alleged that some of the company's former employees had accessed the company's IT system and tampered with the source code of the software under development.

Investigation
The investigating team visited the complainant's premises and scanned the logs of e-mails. They identified the IP address and using tracing software traced the ISP and the address of the place where the e-mails had been sent.
This address was of a Hyderabad based company. On visiting the company the investigating team found 13 computers and a server. Using specialised forensic tools the disks were imaged and analysed by the team. The analysis revealed that the original source code as well as its tampered version had been stored from these systems.

Current status
The investigating team arrested the accused in India and efforts are underway to arrest the others who are presently in the US.
The case is in its final stages awaiting the opinion report from C-DAC.


Case-8: Obscene E-mails  
State
:
Maharashtra
City
:
Mumbai
Sections of Law
:
67 of IT Act 2000 r/w sec 2 of Indecent


Representation of Women  (Prohibition) Act 1986.
“It requires a very unusual mind to undertake the analysis of the obvious.” - Alfred North Whitehead

Background
The complainant received an e-mail stating that the sender had in his possession some objectionable/ morphed/ obscene photographs of the complainant. The accused in this case demanded to meet the complainant. Failing to do so, the accused threatened to put these on the Internet and circulate these among her friends and relatives.

Investigation
On receiving the complaint, the investigating team extracted the e-mail header to trace the IP address. This IP address was tracked down to a company.
Using system logs, the exact computer used and its user were identified. The accused was arrested. The investigating team also seized the computer and some photographs of a look-alike of the victim from the accused. These evidences were sent to the forensic sciences laboratory, which confirmed that the seized computer contained evidence that implicated the accused in the incident.

Current status
The police filed a charge sheet on October 27, 2004 and the matter is presently subjudice.


Case-9: Online Railway Ticket Fraud-I  
State
:
Delhi
City
:
New Delhi
Sections of Law
:
420 IPC
“It isn't that they can't see the solution. It is that they can't see the problem.”
- G K Chesterton 

Background
The complainant, an online railway ticket booking Website, lodged a complaint that some unknown people had used the Internet ticket booking facility to book more than 50 railway tickets using stolen credit cards. They had taken the delivery of the tickets at different places. The company received chargeback from credit card companies for the transactions causing huge financial losses.

Investigation
During investigation a 'patch programme' was installed in the department's system to give an alert on any further booking done by the accused using existing user IDs, credit card details or place of delivery. The IP addresses retrieved from the computer server of the company handling Internet booking was traced to multiple locations. They all belonged to different cyber cafes.
In the mean time the patch programme installed in the department's system signalled an alert that the accused had used one of the existing twelve user-IDs again for booking of two more railway tickets and had sought the delivery at Hyderabad. The accused was arrested from Hyderabad while receiving the railway tickets by courier.

Stolen credit card details of various banks were found with the accused which he used to make fraudulent bookings. Also, more than 25 flight tickets were recovered during the search of his residence.

Current status
Charge sheet has been filed against the accused. The trial of the case is in progress.

 
Case-10: Obscene Phone Calls  
State
:
Karnataka
City
:
Bangalore City
Sections of Law
:
67 Of IT Act 2000.
“Nothing has the power to broaden the mind as the ability to investigate systematically and truly all that comes under thy observation in life.” - Marcus Aurelius

Background
A written complaint was submitted by the complainant stating that she had been receiving obscene phone calls on her mobile and landline numbers. The complainant learnt from the callers that a doctored profile of hers had been posted on a Website. The profile stated that the complainant loved sex and when the viewers were in Bangalore, they should contact her. The profile also gave out victim's landline and mobile phone numbers.

Investigation
The investigating officer obtained call details of the perpetrator's number from the cellular service provider and observed that the most frequent incoming and outgoing calls were from two other mobile numbers. The investigating officer also obtained the IMEI addresses for these numbers from the mobile service provider.

The investigating officer sent out letters to the Website on which the obscene profile of the complainant had been hosted to obtain details of the date, time of the profile creation, the IP address used for the creation, the access details for the profile and any other details that the Website would be able to provide regarding the profile and the e-mail ID.

The investigating officer then contacted the outlet from where the mobile connection had been purchased and learnt that one of the SIM cards used was a demo card which had been issued to a dealership. Upon further investigation it was found that the other SIM card was allotted to a college student and was being used by his friend. The investigating officer got suspicious and on further enquiry found that the college student was of dubious character.

The investigating officer obtained a search warrant and raided the residence of the college student. Using disk imaging and analysis tools, the team recovered the obscene profile that was posted on the internet from the student's computer. The partners of the accused were also examined in the presence of the complainant. The accused admitted that he was guilty.

It later transpired that the college student was a close family friend of the complainant and that he was suffering from a personality disorder, secondary depression and poor self-esteem.

Current status
The case has been finalised and a report of class “B” has been submitted.


Case-11: Data Theft  
State
:
Delhi
City
:
New Delhi
Sections of Law
:
420 / 408 / 120B IPC R/W 66 IT ACT
“Over-reliance on experience, intuition, and gut feeling is a surefire way of increasing waste.” - Hosotani 

Background
The complainant filed a case of fraud and cheating alleging theft and sale of proprietary data. The complainant had a subsidiary company in the United States which did business with its US partner. The US partner provided mortgage loans to US residents for residential premises. The business of the complainant was providing leads to their US partner. The data included the details of the loan seekers along with their telephone numbers. The complainant generated leads through arrangements with call centres in India who called from their database and shortlisted home owners who were interested in availing refinance facility on their existing mortgage loans.
The complainant realised that there was a sudden drop in the productivity of the call centres and therefore the production of leads, although the inputs meant to be given to various call centres by the employees of the company had remained the same as before. The concerned officials of the company got alarmed and made an in house enquiry. On a careful and meticulous scrutiny it was revealed that one of the employees of the complainant (company), in connivance with some other officers, had been deceiving and causing wrongful loss to the company by selling the data purchased by the company and in effect wrongful gain for themselves.

Investigation
Preliminary investigations revealed that the accused was holding the post of the senior programme manager and was the team leader for data management. During employment the accused along with his father had opened a partnership firm. It was found that raw data was sent as attachments from the e-mail ID of this(accused) firm's Website domain. The Website was traced and the e-mail ID address and registration details were recovered by the investigating officer using specialised softwares. It was revealed that the accused had passed data bought by and belonging to the complainant firm to various call centres (as if the same belonged to his firm), to make the calls on their behalf for generating leads.
The entire business process of the complainant firm was studied and a systems analysis was conducted to establish the possible source of data theft. The accused had opened a foreign currency account in the name of his firm. An analysis of the printout revealed that payments had been made to two call centres. The call centres were contacted and the raw data sent as attachments were collected. The data was comprised of six separate files and it was compared with the data purchased by the complainant company in the US. This was done by writing and executing SQL queries.
Analysis of the e-mail headers of the mails sent by the accused through his ID were carried out. The originating IP address was found and information was obtained from VSNL. Accordingly it was found that the range of IP was allotted to the complainant company. It was thus established that the accused has sent the stolen data from the office of the complainant company using the e-mail ID of his (accused) firm.

An analysis of the bank account of the accused showed that payments were being made to two people. It was found that they were also ex-employees of the complainant company who had resigned after the accused left the company. On interrogation he revealed that he had roped in two of his colleagues who actively assisted him in his clandestine activities. One of them, while still an employee of the complainant company, coordinated with various call centres on behalf of the accused. The other facilitated the installation of proprietary sequencing software in the personal computer of the accused. In order to have a clientele base in US, the accused had sought the assistance of one more person. The two accused were arrested.

The modus operandi has been diagrammatically explained below.

Current status
The case is presently under investigation and the accused are in judicial custody.


Case-12: Hacking  
State
:
Karnataka
City
:
Bangalore
Sections of Law
:
66 & 67 of IT Act 2000.
“True problem solving is impossible with the type of the behaviour that tries to shift the responsibility on to others.” - Hosotani 
Background
The complainant approached the police stating that she had been receiving obscene and pornographic material at her e-mail address and mobile phone. She stated that this person appeared to know a lot about her and her family and believed that her e-mail account had been hacked.

Investigation
The investigating team using a different e-mail ID tried to chat with the accused using the complainant’s e-mail ID. Subsequently the investigating team was able to identify the ISP address of the computer system being used and it was tracked to an organisation in Delhi.

The investigating team visited the company and through its server logs was able to identify the system from which the obscene material was sent. Using forensic disk imaging and analysis tools the e-mails were retrieved from the system. The residence of the accused was located and the hard disk of his personal computer was seized. On the basis of the evidence gathered the accused was arrested.

Current status
The case has been finalised and is currently pending administrative approval.


Case-13: Online Stock Exchange Fraud  
State
:
Delhi
City
:
New Delhi
Sections of Law
:
420/120B IPC
“The systems perspective tells us that we must look beyond individual mistakes or bad luck to understand important problems.” - Senge 

Background
A complaint was received from the director of a securities firm stating that there was an unauthorised execution of a call option resulting in a loss to the complainant. The complainant company was dealing in sale and purchase of shares on behalf of clients. As a broker of the stock exchange they were providing trading facilities of the equity and futures and options markets to their sub-brokers/ high net worth individual clients. This was done at the clients’ premises through ISDN lines/ normal telephone lines/ VPN with predefined passwords and user IDs on their trading terminals. As per the complaint a fraudulent trade was executed by selling a call option by using the user ID and password provided to one of the complainant’s client. An interesting aspect was that this call option was the most inactive for trading purposes and no trade had taken place except for the fraudulent trade.

The said call option was compulsorily exercised by the exchange thus resulting in a loss of INR 0.05 million to the complainant and wrongful gain to the culprits.

Investigation
The stock exchange provided the details of the trade log for call option of buyer and seller. The user ID that was used to book the order could be traced from the information provided. Some of the information that was provided was:

Date - Buy Client Name/Address
  • Trade Number - Sell Member Code
  • Trade Time - Sell Trading Member Name
  • Trade Quantity - Sell Client Code/Name/Address
  • Buy Time - Buy Order Number
  • Buy Name - Sell Order Number
  • Buy Client Code
The complainant’s client was examined who stated that they had not executed this trade. The data of the computer installed at their premises was scrutinised for system error log, access log, event log and broadcast server log. The analysis of the logs revealed that the computer system of the client was not logged during the days when the fraudulent trades were executed. The configuration indicated that for executing the transaction through the internet, access to the network was imperative. Such access was authorised by the firewall installed at the network of the complainant.

The firewall (which generated the log details) provided the IP address used to logon to the system to execute the transaction. The firewall details as well as the server of the complainant were taken to the police computer lab and analysed using forensic tools. The transactions logs could not be recovered from the firewall server as the same was designed to be emailed to a specific email ID. However, the information collected from a securities firm revealed the details of an account through which the fraudulent transaction was executed.

The ownership details and logs for the email ID were collected from a web host company and were found to be belonging to the very person who had designed the firewall for the complainant company. Thereafter, the mobile phone details of the accused were collected which revealed that he was in contact with the co-accused (the person who had designed the firewall for the complainant company). This gave the first indication that a conspiracy existed between the accused persons.

Based on this information simultaneous raids were conducted and the accused were arrested. The interrogation of the accused revealed the modus operandi on how the fraudulent transaction had been executed. The accused had provided the copy of the programme (which had access, firewall file, password and other details that were required for configuring the computer system) to the co-accused.
The Central Processing Unit was configured by the co-accused and the same was taken to cyber cafe and on the pretext of downloading software. The accused downloaded the software from the attachment in his e-mail account and executed the transaction by installing the software on the computer.

Current status
Under investigation, the accused are in judicial custody.


Case-14: Online Railway Ticket Fraud-II  
State
:
Delhi
City
:
New Delhi
Sections of Law
:
420 IPC
“I keep six honest serving men (they taught me all I knew); Their names are What and Why and When and How and Where and Who.” - Rudyard Kipling 

Background
An online railway ticket booking service provider lodged a complaint that some unknown people had used the Internet ticket booking facility to book 44 railway tickets using stolen credit card details. The department received chargeback from the credit card companies for all the 44 transactions causing huge financial losses.

Investigation
The investigation of the case revealed that the accused had booked more than 44 tickets in the name of different persons through the department's Website and managed to get it delivered at different locations in Mumbai. The scrutiny of the IP addresses used for booking the tickets, analysis of the different places where tickets were delivered and the user-IDs created on the Web led to the arrest of the accused. In all three cases user-IDs created by the accused on the Website were recovered.
During the course of the interrogation, passwords to all the user IDs created by the accused were obtained and the contents of the user accounts were recovered. Details of stolen credit cards of various banks were also recovered from the accused during the arrest.

The investigation of this case was completed within nine months of its registration.

Current status
Charge sheets have been filed against the accused and the accused is still in judicial custody. Trial of the case is in progress.


Case-15: Morphed Photographs  
State
:
Delhi
City
:
New Delhi
Sections of Law
:
67 of IT Act, 120-B, 506, 509 IPC
“It is capital mistake to theorize before you have all the evidence. It biases the judgment.”
- Sir Arthur Conan Doyle 

Background
The complainant was receiving threatening and obscene e-mails from unknown people. The e-mails contained the complainant's obscene morphed photographs. The accused threatened to post these on pornographic Websites and alleged that one such photograph was posted on a popular Website.

Investigation
The IP address used for posting the obscene photograph(s) on the Website and the mails sent to the complainant were retrieved and traced to a company in Delhi.

A search of the computer terminals located in the company's premises was conducted. The log records and cookies were examined. During the process the morphed photograph of the complainant was found in one of the terminals used by the accused. The e-mail accounts mentioned were also accessed after disclosure by the accused. The central processing unit of the computer was seized and sent for a forensic analysis to the central forensic science laboratory. Using disk imaging and analysis tools, the mirror image of the hard disk was taken and analysed which led to the recovery of all the incriminating data/files required for the case.

During the investigation it was learnt that the accused was an ex-colleague of the complainant.

Current status
Charge sheet has been filed against the accused.


Case-16: Sexual Harassment  
State
:
West Bengal
City
:
Kolkata
Sections of Law
:
419/501/507/509 IPC and 67 IT Act 2000.
“You cannot compel people to comply with the standards; compliance must be a voluntary decision.” - Allan Sayle 
Background
A lady (the complainant) lodged a complaint that she was being harassed by a flood of telephone calls from unknown men with sexual intention at all odd hours and from various places around the world. As she was a working lady, most of the calls were received by her aged in-laws. When she had her telephone number changed, and requested the new number to be kept private, her neighbours started receiving the same kind of calls asking for her by name. This was thoroughly harassing her aged in-laws, her husband and also her neighbours. Some men also visited her house, seeking her by name.

Investigation
A caller ID was installed at the house of the complainant and a few of the local callers were interrogated. During interrogation it was found that the callers had obtained her e-mail ID in one of the chat rooms. All those who sent the mail to her got an auto response giving her residence telephone number and urging them to call during office hours on working days as her husband is away during those hours. On receiving such e-mails these people contacted her on the phone numbers given in the e-mail.

Police requested for IP addresses of the e-mail IDs from the Website hosting company. In addition they asked for IP logs and registration profiles of the respective e-mail ID's. The logs revealed the service provider (ISP), who subsequently provided the telephone number and the address of the user.
The ISP provided the details of the IP and addresses/ information connected to it. Raids were conducted at the residential address of the accused. It was found that on the two computers temporary files (of the accused) had been deleted. However using forensic software, few of these deleted files could be re-created. The PC of the accused also had incriminating evidence against him. He confessed to his guilt and was arrested.

During investigation it was learnt that the complainant was employed as a temporary executive engineer in the same company with the accused. The accused felt that though she was junior to him, she was not giving him proper respect. He started sending auto generated e-mails in her name, giving her telephone numbers and asking males to contact her during office hours.

Current status
It is the first registered cyber crime case in West Bengal.


Glossary  

Charge sheet: The report of investigation to be submitted to the court by the police station, which presents the conclusion of investigation and which precedes a formal trial and indictment. It is a formal charge of having committed a criminal offense.

IT Act: An act in India to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication commonly referred to as “electronic commerce”

Subjudice: A matter that is still under consideration by a court.

ISP: Internet Service Provider

Examination: The crime scene examination and subsequent search

IP: Short for Internet protocol it specifies the format of packets, also called datagrams,
and the addressing scheme.

Packet: A piece of a message transmitted over a packet-switching network.

Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Once all the packets forming a message arrive at the destination, they are recompiled into the original message.

Node: In networks, a processing location. A node can be a computer or some other device, such as a printer.

Log: To record an action. For example, to enter a record into a log file.

Report of Class B: Report of the investigating officer submitted to the concerned magistrate showing the case not being established under section 173 of the CRPC.

15 comments:

  1. y aren't the case names provided?

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. is there any case related to IT ACT 2000 SECTION 40-42
    pLEASE LET ME KNOW ?

    ReplyDelete
  4. Why the year of case is not mention and why all the cases are pending

    ReplyDelete
    Replies
    1. I havent had the time to go and find out the results of the cases. If you do find the result, you can post it here.

      Delete
  5. is there any of case study of digital forensic which forensic tools are used like autospy or ftk imager tool

    ReplyDelete
  6. Thank you for providing us with such valuable knowledge.

    ReplyDelete
  7. Is it possible for the name and the year of the 2nd case be listed

    ReplyDelete
  8. Looking for affordable Refurbished Laptops in Delhi? Explore a wide range of reliable and quality-certified refurbished laptops at great prices. Upgrade your tech without breaking the bank. Shop now for the best deals on refurbished laptops in Delhi.

    ReplyDelete
  9. Can you please provide the timeline of the 3rd case?

    ReplyDelete
  10. Your content is quite helpful but it would be better to post verdict cases with timeline (dates in chronological order) and Name of the case

    ReplyDelete