#cyber

POSH Investigations Ensuring Fairness, Compliance & a Safe Workplace

POSH Investigations: Ensuring Fairness, Compliance & a Safe Workplace

Ensuring a safe and inclusive workplace is not just a moral obligation but also a legal necessity under the POSH Act (Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal) Act, 2013).  While the POSH Act primarily safeguards women, companies are encouraged to implement inclusive policies that protect all employees from workplace harassment regardless of gender identity. Organizations that integrate forensic methodologies in their Internal Complaints Committees (ICCs) investigations can reinforce their commitment to a safe, unbiased, and compliant workplace, enhancing the credibility and fairness of investigations while addressing workplace harassment. A few key steps are listed below:

1. Evidence gathering

Data gathering using forensic practices, and forensic interviews provide fact-based, unbiased evidence that aligns with legal compliance and ethical standards.  In the digital era, communications happen across multiple platforms – emails, chats, social media, cloud storage and others. Data gathering conforming to the IT Act and Indian Evidence Act plays a key role in investigations by

– recovering deleted messages, emails, and other data relevant to the case.

– Ensuring a tamper-proof chain of custody for the admissibility of evidence

– Conduct forensic interviews using methods that prevent leading questions

– Ensuring adherence to the POSH Act’s procedural fairness in collecting statements

2. Data Preservation and Authentication

Data preservation and authentication of evidence strengthens employee rights and ensures unbiased investigations.

3. Confidentiality & Legal Compliance

Investigation methods are tailored to safeguard the identities of complainants and respondents, adhering to the legal mandate under Section 16 of the POSH Act   and prevent unauthorized access to evidence, ensuring GDPR and IT compliance.

4. Comprehensive documentation and reporting of findings.

Benefits of Integrating Forensics in POSH Investigations

  • Enhances credibility: Objective digital evidence strengthens decision-making
  • Reduces bias: Ensures fact-based investigations, free from personal opinions
  • Supports Internal Complaints Committees (ICCs): Empowers them with forensic-backed findings
  • Ensures legal compliance: Aligns with POSH Act, IT Act, and Indian Evidence Act to avoid legal repercussions
  • Encourages inclusivity: Supports workplaces in implementing gender-neutral policies that protect all employees
  • Improves workplace harassment policy adherence: Helps companies implement effective reporting mechanisms

Forensics in Investigations are not an option but an a critical enabler of fair, legally sound, and comprehensive POSH investigations.

Need expert insights or forensic support for your POSH investigations? Contact us today!

Questioned Documents: The crucial role of light in the examination of documents

Questioned Documents: The crucial role of light in the examination of documents

Questioned document examination involves intricate study of documents to determine their authenticity, origin, or any alterations that may have undergone, and among the myriad techniques employed in this process, one factor stands out for its profound impact: light.

Light, often considered a fundamental aspect of existence, takes on a whole new significance when it comes to scrutinizing documents under the lens of forensic analysis.

One of the primary ways light aids in document examination is through the use of various lighting sources and techniques. Forensic examiners utilize a range of lighting conditions, such as oblique lighting, transmitted light, ultraviolet (UV) light, and infrared (IR) light, to highlight different aspects of a document. These techniques can reveal alterations, indentations, watermarks, and other subtle features that may not be visible under normal illumination.

Oblique lighting, for instance, involves casting light at an angle to the surface of the document, thereby enhancing surface texture and revealing any irregularities or alterations. Transmitted light, on the other hand, involves passing light through the document to detect watermarks, alterations, or variations in thickness that may indicate tampering. UV and IR light sources unveil invisible inks, alterations, and even chemical treatments that might have been applied to the document.

The choice of lighting technique depends on the specific characteristics of the document under examination and the type of information sought. By carefully selecting and manipulating light sources, forensic experts can uncover crucial evidence that may have remained hidden to the unaided eye.

Moreover, the interaction of light with different materials provides valuable insights into the composition of documents. Paper, ink, printing methods, and even the age of a document can influence how it responds to light. For instance, variations in fluorescence under UV light can indicate different types of ink or paper, while the aging process may manifest as discoloration or degradation patterns visible under certain lighting conditions.

In addition to direct examination, digital imaging techniques further enhance the role of light in questioned document analysis. High-resolution photography, combined with various lighting setups, allows for detailed documentation and analysis of documents. Advanced imaging software can then process these images to enhance contrast, reveal hidden features, and even create three-dimensional reconstructions for further scrutiny.

The significance of light in questioned document analysis cannot be overstated. From uncovering forgeries and alterations to providing insights into the history and authenticity of documents, light serves as a powerful tool in the hands of forensic experts. By harnessing its illuminating properties, thes forensic professionals shed light on the secrets concealed within the written word, ensuring that justice and truth prevail.

Truth Labs experts use tools such as Electronic Microscope and Visual Spectral Comparator (VSC) to conduct light based questioned document examinations.

In the sensational case of national importance involving Electoral Bonds, Truth Labs report unveiled the hidden code in the SBI bond certificate allowing to conclude that an official bond was a unique number and is used for audit purposes.  Read the story here:  Unique Numbers in SBI Electoral Bonds

Cyber crime is an evolving form of transnational crime

Cyber crime is an evolving form of transnational crime

What is cyber crime?

Cyber crime today includes traditional, real world offline crimes, (fraud, forgery, organised crime, money laundering, theft etc.) perpetrated in cyber space that are hybrid or cyber-enabled crimes, as well as ‘new cyber dependent’ that have been made possible with the advent of the internet and internet enabled technologies.  Cyber Forensics is a means to detect crime using cyber devices.

For these reasons many countries have amended or enacted laws that are specifically designed to deal with cybercrime along with the advent of newer types of cybercrimes like supply chain attacks. AI and IOT based crimes, crypto jacking, targeted attacks, bitcoin crimes, RDP attacks and so on require the existing laws to be tweaked to meet the legal requirements. India is still in the process of formulating more laws on bitcoin, crypto and fintech laws.
The complex nature of the crime as one that takes place in the border-less realm of cyberspace is compounded by the increasing involvement of organized crime groups. Perpetrators of cybercrime and their victims can be located in different regions, and its effects can ripple through societies around the world, highlighting the need to mount an urgent, dynamic and international response.

Law in a modern society has been defined as “the discipline that deals with how our legal system can and must adjust to accommodate the problems created by the ever more urgent and ubiquitous impact of technology on society.” With the growth of the internet technology, genomics, telecommunications, etc. legal scholars and law schools emphasized on the intersection of the law with science and technology.
This intersection also extends to the regulation and accessibility of medical treatments. For example, as technology advances, more solutions are becoming available for issues like sexual health. Female Viagra is one such option, offering help to those in need. To explore how to buy Female Viagra in this website, click the link provided.

Scientific issues now permeate the law. There has been a growing awareness of the importance of scientific and technological developments amongst legal scholars and practitioners.  At Truth Labs, we have a separate division dedicated to cases relating to cyber crime and cyber forensics.

 

Proportionality of cyber crime vulnerability to our Digital footprint

Proportionality of cyber crime vulnerability to our Digital footprint

Cyber safety and data tracking

Oblivious to the breadcrumbs of personal information being left behind in the online data sources, individuals fall prey to various online data theft. Such sources include social media profiles.

Commonly, data tracking is made possible by cookies on websites and default permissions setup for mobile applications installed. Website associated cookies may be required for its basic functioning and for quick subsequent access by remembering user details, but often they also have third party cookies for user tracking to improve experience. While third party cookies help deliver relevant content, they also gather personal data and preferences. Unnecessary permissions to access data on phones may provide certain mobile applications free access to user’s data.

Data breaches (e.g.- Twitter data breach in December 2021) have been a regular event despite the increased vigilance against cyber-attacks and have caused large databases vulnerable to theft and sale to interested unauthorised parties who then can misuse such data for stalking, misinformation and other targeted attacks on individuals and companies.

 
Truth Labs has examined cases involving hacking, blackmail by falsification or manipulation of data procured with unconsented access from devices of individuals, not surprisingly by persons very close to them with intentions of misuse.Truth Labs has examined cases of email phishing in organizations that suffer significant loss due to bank transaction frauds where money was transferred to foreign accounts by way of data and communication manipulation.Truth Labs has also examined cases of ransom-ware attacks, where root cause analysis indicated email phishing and weak password hacking resulting in network compromise
Future of Cyber Crimes

Future of Cyber Crimes

Can cyber forensics tackle cyber crime?

How to stop criminal activities whose returns far outweigh any fear of punitive actions which all the international law enforcement agencies have in place? The efforts to cut down cyber crimes is approaching hopeless proportions, with a 15% annual growth rate. At that rate, these clever cybercrooks are even bound to increase their bounties by around $10.5 trillion by 2025.

Broadly the cyber crimes causing concern to the society today are listed below:

  • Pandemic-related Phishing

  • Ransomware Attacks

  • Increase in Business Email Compromise (BEC) Attacks

  • Mobile Malware

  • Cyberoptimism

  • AI to IoT in Cybercrime

  • Supply Chain Attacks

  • Data Breaches

  • Crypto jacking

  • Targeted Attacks

  • Encrypted Communication Platform

  • Raising usage of Bitcoins

  • DDoS Attacks

  • Outdated and Open-Source Vulnerabilities

  • Social Engineering

  • RDP (Remote Desk Protocol) Attacks

Some of the cyber crime trends to watch for are worth mentioning

As it is with the proverbial two sides for every coin, there are two sides to cyberspace. Cyberspace is a great place for commerce, societal advancement, and innovation. However, the same place harbors crooks who are ready to pounce any chance they get. Advanced technology and systems give an edge to businesses and organizations, but it means newer and more advanced methods for cybercriminals to attack too, leading to a marked increase in dangerous cybercrime trends.

Cyber crime presents the trickiest types of criminals to deal with. Armed with sophisticated tools of the trade, they are getting more audacious every day, threatening businesses of all sizes. Bigger organizations have deeper pockets for more advanced security tools to face cyber threats, but small business enterprises are not always so lucky. Thus, staying aware and vigilant at all times can go a long way in preventing these cyber attacks from occurring, and it is also helpful to know what IT security solutions are perfect to protect your site

Economic offences and organised crime

Economic offences and organised crime

Online business transactions and financial fraud

Economic offences and organised crime landscape across the globe including India has changed drastically in the past decade -in large part due to advancements in technology. Criminals quickly adopt and integrate new technologies into their modus operandi or self styled novel business models are woven around them. The use of new technologies by organised crime groups (OCGs) has an impact on criminal activities across the spectrum of white-collar crime and organised crime. This includes expansion of online trade and widespread availability of encrypted communication channels, as well as other aspects of technological innovation such as more accessible and cheaper drone technology, and advanced 3D printing technologies.

Today technology has become a key component of most of the organized crimes, if not all, and criminal activities carried   out by organized crime groups in India has afforded an unprecedented degree of flexibility to carry out phishing/ vishing/ online seams within and across border. Economic offences and organised crime has become a key threat to the national security and public safety in India. Criminal groups and individual criminals continue to generate large turnover in terms of cash profits from their activities each year. Some aspects of the organised  crime landscape have changed drastically in recent years

—In large part due to advancements in technology that have had a profound impact on the involvement of criminal gangs spreading across wider society and economy.

In a recent survey based study by the Association of Certified Fraud Examiners (ACFE) and SAS (statistical analysis system) among its members worldwide, it was revealed that Data Analytics Apps proved indispensable in helping businesses across industries control/ effectively deal with pandemic-driven fraud. The benefits were particularly evident in banking and financial services. Almost half (45%) of banking and financial sector survey respondents reported that the COVID-19 pandemic accelerated their organizations’ use of data analytics to combat fraud. Nearly all (99%) indicated their analytics capabilities helped them boost the volume of transactions involving suspected fraudulent cases identified.

Cyber Crime : Current and Emerging Threats

Cyber Crime : Current and Emerging Threats

Protecting your identity online from cyber crime

All over the world, societies are increasingly reliant on the identification information. Identity-related information about individuals is used e.g. for banking, shopping, traveling, and collecting social assistance. Increasingly, such information also includes biometric information. The more our society becomes computerized, the more avenues are open for cyber crime to exploit the vulnerabilities of those systems to commit identity-related crimes, which generate significant profits for criminals each year, with a far-reaching impact not only on economies and online commerce but also on individuals who fall victim to it. Where identity-related information is obtained by criminals, it can be abused to launder money,  commit fraud and enable illicit activities for organized crime purposes, including acts of corruption, human trafficking, migrant smuggling, and even terrorism.

Millions of dollars can be stolen using false identification either in highly sophisticated single events or through millions of smaller incidents. In the hands of unscrupulous criminals, these illegally derived profits can be used to commit further crimes.

Law enforcement agencies and cybersecurity professionals are constantly working to develop innovative solutions to prevent and mitigate cybercrime. However, it’s a collective responsibility to stay vigilant and protect our personal information to minimize the risks.

Remember, by staying informed, practicing good cybersecurity hygiene, and seeking assistance from experts when needed, we can all contribute to creating a safer online environment.

Growing trend of cyber enabled financial crimes

Growing trend of cyber enabled financial crimes

The Internet is a hunting ground for cyber criminals

Crime has also moved online, and cyber-enabled financial crimes, such as business email compromise, CEO fraud (where cybercriminals impersonate executives), e-commerce scams and investment fraud, have escalated in nearly every region. Today’s ransomware attacks target ‘big game’ targets, including major corporations, governments and critical infrastructure. To maximize harm and illicit profit, strategies have shifted to techniques like double extortion, where victims’ data or files are both encrypted and threatened with public exposure, compounding the risks of business disruption and reputational damage.

While world governments have their hands full dealing with the COVID-19 pandemic, shady cyber heist operators are busy working the other way creating a vast fortune, to the tune of $6 trillion by 2021 end alone.

If that total amount is a country’s GDP, it’s next only to the income of the US and China as all of us know India is at $3 trillion mark and planning to touch $5 trillion in next 5 years after crossing the economic indicators of Britain.

Technology keeps evolving at a rapid pace, so do cybercrooks. Apart from newer forms of cyber threats, even the oldest tricks in the book are not completely useless for these cybercriminals. They take these tricks out of the box and make modifications and updates to bypass security measures especially created for them.

Truth Labs has performed a number of forensic investigations of financial fraud and accounting for public sector and corporate clients.

Scroll to Top

WhatsApp Us