0% found this document useful (0 votes)
19 views30 pages

Module 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views30 pages

Module 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

MODULE 4

T IO N R E Q U E S T, W A R R A N TS
PRES E R V A
S S U A N CE S F O R C O M P U T E R
AN D O T H E R I
IE S O F L AW E N F O RC E M E N T
DATA; AN D D U T
AGENCY
STEPS IN THE IDENTIFICATION AND PRESERVATION OF DIGITAL EVIDENCE
FROM LOCAL AND INTERNATIONAL 3RD PARTY PROVIDERS.
IDENTIFICATION OF EVIDENCE

• RECOGNIZE POTENTIAL DIGITAL EVIDENCE RELEVANT TO THE


INVESTIGATION.
• DETERMINE THE TYPES OF DATA REQUIRED (E.G., EMAILS, LOGS, FILES).
LEGAL AUTHORIZATION
• OBTAIN THE NECESSARY LEGAL DOCUMENTS (E.G., SUBPOENAS,
WARRANTS) TO REQUEST EVIDENCE.
• ENSURE COMPLIANCE WITH LOCAL AND INTERNATIONAL LEGAL
STANDARDS.
ENGAGEMENT WITH 3RD PARTY PROVIDERS

• IDENTIFY THE APPROPRIATE POINT OF CONTACT AT THE 3RD PARTY


PROVIDER.
• FORMALLY REQUEST THE PRESERVATION OF DATA THROUGH APPROPRIATE
LEGAL CHANNELS.
• SPECIFY THE DATA TO BE PRESERVED, INCLUDING TIME FRAMES AND DATA
TYPES.
COLLECTION OF EVIDENCE

• ENSURE SECURE TRANSFER OF PRESERVED DATA.


• USE ENCRYPTION AND SECURE PROTOCOLS TO MAINTAIN DATA INTEGRITY.
DOCUMENTATION

• MAINTAIN A DETAILED CHAIN OF CUSTODY LOG.


• DOCUMENT ALL INTERACTIONS AND TRANSACTIONS WITH THE 3RD PARTY
PROVIDER.
ANALYSIS AND STORAGE

• ANALYZE THE DATA WHILE MAINTAINING ITS INTEGRITY.


• STORE EVIDENCE IN A SECURE, CONTROLLED ENVIRONMENT.
PRESERVATION RULES UNDER THE BUDAPEST
CONVENTION AND G7 24/7 HIGH TECH CRIMES NETWORK.
BUDAPEST CONVENTION
• ARTICLE 29: EXPEDITED PRESERVATION OF STORED COMPUTER DATA.
• ARTICLE 30: EXPEDITED PRESERVATION AND PARTIAL DISCLOSURE OF
TRAFFIC DATA.
• REQUIREMENTS: TIMELY ACTION AND INTERNATIONAL COOPERATION TO
PREVENT DATA LOSS.
G7 24/7 HIGH TECH CRIMES NETWORK
• PURPOSE: FACILITATE IMMEDIATE ASSISTANCE AMONG MEMBER STATES
FOR PRESERVING DIGITAL EVIDENCE.
• PROCESS: QUICK RESPONSE FRAMEWORK, ALLOWING RAPID REQUEST AND
ACTION FOR DATA PRESERVATION.
• COORDINATION: INVOLVES DIRECT COMMUNICATION CHANNELS AMONG
NETWORK CONTACT POINTS.
PRESERVATION REQUEST THROUGH LAW ENFORCEMENT PORTALS
ACCESS AND REGISTRATION
• LAW ENFORCEMENT AGENCIES MUST REGISTER AND GAIN ACCESS TO
SPECIFIC PORTALS PROVIDED BY 3RD PARTY PROVIDERS.
• VERIFY CREDENTIALS AND OBTAIN NECESSARY AUTHORIZATIONS.
SUBMISSION OF REQUESTS

• SUBMIT DETAILED PRESERVATION REQUESTS THROUGH THE PORTAL.


• INCLUDE RELEVANT CASE DETAILS, TYPES OF DATA, AND SPECIFIC TIME
PERIODS FOR PRESERVATION.
FOLLOW-UP AND COMPLIANCE

• MONITOR THE STATUS OF REQUESTS THROUGH THE PORTAL.


• ENSURE THE PROVIDER COMPLIES WITH THE PRESERVATION REQUEST.
SECURE DATA TRANSFER
• ARRANGE FOR THE SECURE TRANSFER OF PRESERVED DATA ONCE
AVAILABLE.
• USE ENCRYPTION AND VERIFICATION METHODS TO MAINTAIN DATA
INTEGRITY.
WARRANTS AND OTHER ISSUANCES FOR COMPUTER
DATA
WARRANT TO DISCLOSE COMPUTER DATA

• AUTHORIZES THE DISCLOSURE OF SPECIFIC DATA HELD BY A 3RD PARTY


PROVIDER.
• USED TO OBTAIN RELEVANT INFORMATION FOR ONGOING INVESTIGATIONS.
WARRANT TO INTERCEPT COMPUTER DATA

• ALLOWS REAL-TIME INTERCEPTION OF DATA TRANSMISSIONS.


• TYPICALLY USED IN CASES REQUIRING MONITORING OF ONGOING
COMMUNICATION.
WARRANT TO SEARCH, SEIZE AND EXAMINE
COMPUTER DATA

• AUTHORIZES THE PHYSICAL OR DIGITAL SEARCH AND SEIZURE OF DEVICES


OR DATA.
• PERMITS EXAMINATION AND ANALYSIS OF THE SEIZED DATA.
WARRANT TO EXAMINER COMPUTER DATA

• SPECIFICALLY AUTHORIZES THE DETAILED EXAMINATION OF STORED DATA.


• FOCUSES ON FORENSIC ANALYSIS TO UNCOVER EVIDENCE.
WARRANT TO DESTROY COMPUTER DATA

• AUTHORIZES THE DESTRUCTION OF DATA DEEMED ILLEGAL OR HARMFUL.


• ENSURES THAT THE DATA CANNOT BE RECOVERED OR MISUSED IN THE
FUTURE.
RA 10175, SEC 11 - DUTIES OF LAW ENFORCEMENT
AGENCIES
• RA 10175 - CYBERCRIME PREVENTION ACT OF 2012
ENFORCEMENT AND IMPLEMENTATION

• LAW ENFORCEMENT AGENCIES ARE TASKED WITH IMPLEMENTING


MEASURES TO DETECT, PREVENT, AND INVESTIGATE CYBERCRIMES.
COORDINATION WITH OTHER AGENCIES

• AGENCIES MUST COORDINATE WITH OTHER NATIONAL AND INTERNATIONAL


BODIES TO ENHANCE CYBERSECURITY EFFORTS.
CAPACITY BUILDING

• CONTINUOUS TRAINING AND DEVELOPMENT PROGRAMS FOR PERSONNEL.


• ADOPTION OF ADVANCED TOOLS AND TECHNOLOGIES FOR
CYBERCRIME INVESTIGATION.
PUBLIC AWARENESS AND EDUCATION
• PROMOTING PUBLIC AWARENESS ABOUT CYBERCRIME AND PROTECTIVE
MEASURES.
• COLLABORATION WITH EDUCATIONAL INSTITUTIONS AND PRIVATE SECTOR
ENTITIES.
RESOURCE ALLOCATION

• ENSURING SUFFICIENT RESOURCES ARE ALLOCATED FOR EFFECTIVE


CYBERCRIME INVESTIGATION AND ENFORCEMENT.
REPORTING AND ACCOUNTABILITY

• REGULAR REPORTING ON THE STATUS AND PROGRESS OF CYBERCRIME


PREVENTION AND ENFORCEMENT EFFORTS.
• MAINTAINING TRANSPARENCY AND ACCOUNTABILITY IN OPERATIONS.
END OF
PRESENTATION
THANK YOU!

You might also like