User:Lakers248/sandbox

Mobile Devices Forensics:

Phone Logs: Phone companies usually keep logs of calls received, which can be useful when creating timelines and gathering the locations of people when the crime occurred.

Contacts: Contacts help narrow down the suspect list due to their connections with the victim or suspect.

Text messages: Messages contain timestamps and remain in company servers indefinitely, even if deleted from the original device. Because of this, messages act as crucial records of communication that can be used to convict suspects.

Photos: Photos can be critical in either supporting or disproving alibis by displaying a location or scene along with a timestamp of when the photo was taken.

Audio Recordings: Some victims might have been able to record pivotal moments of the struggle, like the voice of their attacker or extensive context of the situation.

https://www.proquest.com/docview/1816335831?accountid=14515

Laws Related to Computer Forensics (India) :

Indian Laws Sections 65-77 relate to computer crimes. All the laws are enforced by evidence left digitally and remotely on the computer due to the permanent tracking of our actions on databases.

Section 66: Law preventing the hacking of computers. The crime is punishable by three years in prison or 5 lakhs rupee fine.

Section 66F: Law focused on cyber-terrorism such as malware, phishing, unauthorized access, identity theft etc. If caught it usually leads to life sentence.

Section 67B: Law to prevent the spread and publishing of child porn. It could lead to up to 7 years in prison and a 10 lakhs rupee fine.

Computer Related Crimes:

Computer Forensics are used to convict people who performed physical and digital crimes. Some of these computer related crimes include Interruption, Interception, Copyright Infringement, and Fabrication. Interruption relates to the destruction and stealing of computer parts and digital files. Interception is the unauthorized access of files and information stored on technological devices. Copyright Infringement is using, reproducing and distributing copyrighted information including software piracy. Fabrication is accursing someone using false data and information that was put in the system through an unauthorized source. Examples of Interceptions is The Bank NSP Case, Sony.Sambandh.com Case, and Business Emails Compromise Scams. The Bank NSP Case is a bank's management employee's ex-girlfriend create fraudulent emails, which was sent to the bank client to gain money. The Sony.Sambandh.com Case is a call center worker using a foreigner's credit card information to buy a TV and headphones. The Business Emails Compromise Scams is hackers gaining access to the CEO/CFO email and using it to gain money from their employees.