360477_634055450599150000

Upload: akash-bharihoke

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 360477_634055450599150000

    1/60

    Electronic Surveillance

  • 8/2/2019 360477_634055450599150000

    2/60

    Organized crime around the globe lived up toits sophisticated methods by using wireless

    communications to cover tracks ofillegalgambling, kidnappings, moneylaundering and other crimes.

    Babloo Srivastava used a cellular phone tocontinue kidnappings and extortion from thesafety of his cell in Tihar Jail.

    Terrorists are also unpopular benefactors ofwireless communication.

  • 8/2/2019 360477_634055450599150000

    3/60

    Today the scenario has completelychanged. On the one hand, the

    scope of criminal activities hasattained tremendous proportionand on the other, a number of

    electronic gadgets are availablefor communication. These may bebroadly classified as under

    Telephone Mobile Phone

    Internet

  • 8/2/2019 360477_634055450599150000

    4/60

    Primary duty of Police: prevention and detectionof crime

    For this various methods of surveillance over

    suspects/known criminals are used Interception of written and voice communication

    one of the oldest methods of surveillance In the cyber age electronic forms of

    communication Criminals and terrorists are using SMS, E-mail,

    chatting and VOIP Also using encryption techniques to avoid

    interception. Terrorists orgs. Like Al-Qaeda, Hamas and

    Hezbollah are using computer communicationusing encryption tools like steganography

  • 8/2/2019 360477_634055450599150000

    5/60

    Task of Police becoming difficult with usage of

    computers and availability of encryption tools Demand for e-surveillance i.e. surveillance over

    internet traffic

    Base Trans Receiver Station

  • 8/2/2019 360477_634055450599150000

    6/60

    Global System of MobileCommunication

    HLRMobile

    SwitchingCentre

    (MSC)

    PublicSwitchedTelephoneNetwork

    PSTN

    VLR

    EIRAUC

    Base StationController (BSC)BTS

    BTS BTS

    BTS

  • 8/2/2019 360477_634055450599150000

    7/60

    Division of A City in Cells

    Concept : Mean Reuse Distance (MRD)4.6 x Radius of the cell

    Cell Radius : 1.6 Kms. Cities16 Kms. Rural Areas

    Cell Radius depends on the number of users

    as well as topography of cell area

    This concept of MRD can be extended to wholeCountry. Ultimately whole world.

    Every Cellular Operator typically gets 840 frequenciesin a city. Normally 800 are used for voiceCommunication and 40 are used for control channels.

  • 8/2/2019 360477_634055450599150000

    8/60

    Grid Map of the City andCell ID

    1. Km.

    MORADABAD

    Tower Based On- Number of Subscribers

    - Density of Population

    * Omni Antenna in smaller city

    0o Cell Direction

    240o 120o

  • 8/2/2019 360477_634055450599150000

    9/60

    APPLICATIONS

    CRIMINAL TRACKING

    CRIME INVESTIGATION

    ELECTRONIC SUVEILLANCE INTELLIGENCE COLLECTION

    ANTI CORRUPTION INVESTIGATIONS

  • 8/2/2019 360477_634055450599150000

    10/60

    CELLULAR PHONE

    MONITORING COMPUTERISED PRINT OUT

    CELLULAR TRACKING DEVICES

    IMPLEMENTATION OF LICENCECONDITIONS IN THE SELLING OF PREPAID CARDS

    SPECIALIZATION AND DISSEMINATION

    OF CELLULAR INVESTIGATIVETECHNIQUES

    http://surveillance%20equipments.ppt/http://surveillance%20equipments.ppt/
  • 8/2/2019 360477_634055450599150000

    11/60

    Cell Phone Tracking

    CDR gives us IMEI

    Mobile number Date of call

    Duration of talk

    Time of call

    Number called/calling Incoming/outgoing

    Cell number

  • 8/2/2019 360477_634055450599150000

    12/60

    Further Insights in the Analysis

    IF WE KNOW TARGETS IMEI AND HE IS ELOPED:IMEI can be run on the same cellular operator or

    probable operators to get the new SIM number. IF TARGET HAS CHANGED BOTH SIM AND

    HANDSET(IMEI):Targets base contact numbers P&T/MOBILE can be run on all probable cellular operators toget his new no.

    IF TARGET PURCHASES A NEW SIM: Cellularoperator would provide the application form,identityproof provided by the subscriber/target and the vendersaddress from where the SIM is sold. This is veryimportant piece of information. Probably the same

    identity proof would be used for purchasing a newSIM.Therefore, such name and address can be run insubscribers data base of the probable cellular operatorsand targets new SIM no. can be traced.

  • 8/2/2019 360477_634055450599150000

    13/60

    New Trends A Criminal takes a Hutch SIM from Delhi. Uses

    this SIM in roaming in Bihar. Now what happens to its Incoming & Outgoing

    calls?

    Incoming call route through the mother network

    so a police party can listen from Hutch, Delhiswitch room

    But voice of outgoing calls can only be get fromthe switch room where the SIM isroaming/attached.

    Sharing of Info through SMS

    Called/calling no. along with the SMS text can beretrieved by the cellular operator.

  • 8/2/2019 360477_634055450599150000

    14/60

    Cell Id Location within the cell known

    Lets us know the possible hideouts need surveillance andintelligence collection to zero in

    Can know if the person is static or mobile if on the highway, it canbe understood

    If the cell number doesnt change from night to early morning, it

    means that the criminal is staying put at one place

    Frequency of cell id during specific period

    With cell number and time of call analysis, we can estimate hismovement pattern

    Even when the cell phone is not in use, the cell in which the mobileis currently available is also known in the HLR

    Last cell where the mobile was switched off is also known in HLR

    Hence should have cell chart of all mobile operators

  • 8/2/2019 360477_634055450599150000

    15/60

    Tower

    Makes sense to check all communicationfrom the tower before, during and after thecommission of crime

    From the mobile numbers found, check andeliminate all innocent numbers by checkingon the addressesget a print out of a towercommunication and understand

    Can monitor communication from a towerwhensome criminals are expected to arriveat a particular place

  • 8/2/2019 360477_634055450599150000

    16/60

    Numbers called/calling

    Know all friends/accomplices check onaddresses on land lines and mobile numbers

    Can put them on surveillance

    Analysis: Frequency of call

    Time of particular calls

    Calls made during the commission of the offence

    Pattern of calling calls made after receiving callfrom someone

    Daytime/nighttime calls

  • 8/2/2019 360477_634055450599150000

    17/60

    IMEI Number

    Remains unchanged for a particular set

    Run the IMEI number and one can get

    the mobile number of the criminal; thenget the CDR

  • 8/2/2019 360477_634055450599150000

    18/60

    Timeofcalls

    Day time/ night time calls

    Night stay at any place

  • 8/2/2019 360477_634055450599150000

    19/60

    If criminal changes mobileset..

    Assumption is that he will still call thesame numbers his friends would still

    be the same Check on CDRs of the land lines and

    mobiles of his friends and estimate the

    mobile number of the criminal

  • 8/2/2019 360477_634055450599150000

    20/60

    When we geta criminalsMobile..

    His mobile number

    IMEI number

    His address if not fake

    Can get his address book Get numbers of his accomplices/friends

    Analyse his CDR

    Look for calls made just before thecommission of the crime

    Missed calls

    Divert lines

  • 8/2/2019 360477_634055450599150000

    21/60

    Electronic Surveillance

    Legal Provisions

    Diversion of PhoneCalls

    Organizational Issues

    Scientific Analysis ofCall Details

    Formalization ofEvidence

    Case Studies

  • 8/2/2019 360477_634055450599150000

    22/60

    Legal Provisions

    h li

  • 8/2/2019 360477_634055450599150000

    23/60

    The UP.PoliceRegulation/VCNB

    Surveillance of the activities of badcharacters well defined in U.P. PoliceRegulation Chap- 20 Sec. 223-276.

    Village crime note book (VCNB) divided onto5 parts.

    Part-V deals with History-sheets of convicted,

    acquitted or habitual criminals. It was expected of Police to keep a

    surveillance on these categories of criminals.

  • 8/2/2019 360477_634055450599150000

    24/60

    The Telegraph Act

    Definition

    Telegraph:

    Any appliance, instrument, material or apparatus

    used or capable of use fortransmission or reception of

    signs, signals, writing, images and sounds or

    intelligence of any natureby wire, visual or other electro-magnetic emissions,Radio waves or Hertzian waves, galvanic, electric

    or magnetic means

  • 8/2/2019 360477_634055450599150000

    25/60

    Interception of messages

    Any officer specially authorized by the CentralGovernment or a State Government may, inthe interest of

    sovereignty and integrity of India the security of the State

    friendly relations with foreign states

    public order

    for preventing incitement to the commission ofan offence,

    continued...

  • 8/2/2019 360477_634055450599150000

    26/60

    may order that

    any message or class of messages

    to or from any person or class of persons, or

    relating to any particular subject,

    brought for transmission or

    transmitted orreceived by any telegraph,

    shall not be transmitted, or

    shall be intercepted or detained, or shall be disclosed to the officer mentioned in

    the order.

    (Sec 5(2))

    http://sec-5%20indian%20telegraph%20act%201885.doc/http://sec-5%20indian%20telegraph%20act%201885.doc/
  • 8/2/2019 360477_634055450599150000

    27/60

    THE IT ACT, 2000Definitions: Computer resource : means computer, computer

    system, computer network, data, computer database orsoftware. (Sec 2(k)

    Electronic form: with reference to information meansany information generated, sent, received or stored inmedia: magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device.(Sec. 2 (r)

    Electronic record :means data or record generated,image or sound stored, received or sent in an electronicform or micro film or computer generated micro fiche.(Sec. 2 (t)

  • 8/2/2019 360477_634055450599150000

    28/60

  • 8/2/2019 360477_634055450599150000

    29/60

    AMENDMENTS TO IPC

    Document to mean document orelectronic record in the following sections:

    167 : Public servant framing incorrectdocument.

    172,173,175 : Production of documentsbefore courts or public servants.

    192,204 : Fabrication of false evidence 463,464,466,468,469,470,471,474,476,47

    7A : Offences relating to documents.

  • 8/2/2019 360477_634055450599150000

    30/60

    AMENDMENTS TOTHE EVIDENCE ACT

    E-records to be admissible as documentaryevidence. (Sections 3, 65A, 65B)

    Provisions relating to proving ofdigitalsignatures. (Section 67A)

    Presumptions as to e-agreements; e-records

    and digital signatures; DSCs; e-messages;e-records 5 years old.(Sections 85A,85B,85C,88A,90A)

  • 8/2/2019 360477_634055450599150000

    31/60

    Admissibilityof Electronic Records

    1) Any information contained in an electronicrecordwhich is

    printed on a paper, stored, recorded or copied in optical or

    magnetic media produced by a computer

    (hereinafter referred to as the computer

    output)shall be deemed to be also a document.

    Section -65B

  • 8/2/2019 360477_634055450599150000

    32/60

  • 8/2/2019 360477_634055450599150000

    33/60

    Diversion Of Phone Calls

  • 8/2/2019 360477_634055450599150000

    34/60

    Diversion of Phone Calls1. Identify the suspect number to be taken on

    parallel monitoring

    Exercise discretion

    2. Collect ownership details and address from

    the Service Provider3. Request Home Secretary for permission for

    parallel listening under Sec 5(2) of IndianTelegraph Act

    4. Once permission is received, request theService Provider todivert the number on apre-identified police number

  • 8/2/2019 360477_634055450599150000

    35/60

    5. Assign police personnel by name forlistening

    For quick responses based on call content

    For evidence

    6. Record all conversations On single line recorders Voice logger systems : Computer based

    automatic systems for recording and retrievalof voice calls on multiple channels

    7. Simultaneous transcription ofconversations

  • 8/2/2019 360477_634055450599150000

    36/60

  • 8/2/2019 360477_634055450599150000

    37/60

    Organizational Issues

  • 8/2/2019 360477_634055450599150000

    38/60

  • 8/2/2019 360477_634055450599150000

    39/60

    Call Data Records Contents

    Call Type: Incoming or Outgoing "IN" or "MTC": Mobile Terminating Call

    "OUT" or "MOC" : Mobile Outgoing Call

    MSISDN Mobile Station International Integrated Services

    Digital Network Number, or simply, themobilenumberdialed to reach a subscriber

    Ten Digits 91981001234591 : 2 digit Country Code

    98 : 2 digit National Destination Code

    10012345 :8 digit Subscriber Number

    B Number

  • 8/2/2019 360477_634055450599150000

    40/60

    B Number

    Called/Calling number: may be any othernetwork number

    Start Time

    Starting time of the call in hh:mm:ss, with date

    Duration

    In seconds

    Cell Id

    Code of the terminatingcell: where call ended.

    Some operators give originating and terminatingcell-ids

    Charged Party

    Number to which call charges are billed

  • 8/2/2019 360477_634055450599150000

    41/60

    IMEI International Mobile Equipment Identity, a

    uniquenumber given to every single mobile

    phone, typically found behind the battery. IMEI numbers of cellular phones connected

    to a GSM network are stored in a database,Equipment Identity Register, containing all

    valid mobile phone equipment. It is a 15 digit number:

    234567-56-456654-0

    : 6 digit Type Approval Code: 2 digit Manufacturer Code

    : 6 digit Serial Number

    : 1Additional digit, usually 0

  • 8/2/2019 360477_634055450599150000

    42/60

    IMSI

    International Mobile Subscriber Identity

    Each GSM mobile subscriber's SIM is assigned a unique15 digit IMSI.

    404152800227727

    3 digit Mobile Country Code

    2 digit Mobile Network Code10 digit Mobile Subscriber IdentityNumber

    IMSI allows any mobile network to know the home

    country and network of the subscriber Required to locate numbers roaming in other networks

    In case of'duplicate' mobile number, IMSI will bedifferent

    l i f

  • 8/2/2019 360477_634055450599150000

    43/60

    Analysis ofCall Data Records

    Objective:

    To locate the suspect PHYSICALLY

    To collect information about his activities

    Call details highlight contacts of the

    suspect. Numbers may point to suspect'sassociates, relatives or victims.

  • 8/2/2019 360477_634055450599150000

    44/60

    Geographical Area wise Grouping

    ISD code wise

    STD code wise Frequency of calls

    Duration of calls

    These indicate intimacy with suspect. Shouldbe verified with field information.

    First and Last call in a day

    Some suspects call particular people Night Calls

    May indicate place of stay

  • 8/2/2019 360477_634055450599150000

    45/60

    IMEI wise groupings

    Indicate the number of handsets being used. Many SIM cards may be used on the same

    handset.

    As handsets are costly, they are not disposedoff easily. There are instances where oldIMEI number has figured after 7 months.

    Some suspects use different handsets to talk

    to different types of contacts. From one IMEI,all family members may be contacted, andfrom another all associates.

  • 8/2/2019 360477_634055450599150000

    46/60

    Cell Id wise groupings

    Most frequent cell-id indicates place of stay. Late night and early morning calls invariably

    indicate place of stay.

    Cell Id is indicated only when the user is withinthe home networkfrom Home Location Register.While roaming, cell-id is not indicated in CDR.

    During roaming, cell-id is provided by the

    current service provider network from theirVisitor Location Register. IMSI is needed tolocate a roamer.

  • 8/2/2019 360477_634055450599150000

    47/60

    Call Diverts

    Commonly used by criminals to avoidinterception

    Details required from the Service Provider

    Call Conferencing Check: Start Time < Start Time+ Duration

  • 8/2/2019 360477_634055450599150000

    48/60

    Don't Ignore Single Calls !

    Invariably, the first call after purchase of anew SIM card is made from the currenthandset. The handset may be changed

    afterwards, but the CDR of this new SIMwill give new IMEI number.

    First outgoing to a landline/mobile

    First incoming from a landline/mobile

  • 8/2/2019 360477_634055450599150000

    49/60

    Service Provider Interface

    Diversion of phone calls

    Details ofCall Diverts

    IMEI runs on different networks

    Telephone number runs in CDRs

    Physical area identification by Cell Id

    Cell Id location, even while roaming, byIMSI

    Any other information.

  • 8/2/2019 360477_634055450599150000

    50/60

    The PCO Drill

    Collect following details from the PCO:

    Calls made by suspects to any other numbers :

    Precedingandsucceedingcalls - from all

    linesof the PCO Bill paid by the caller - toidentify other

    dialed numbers

    Physical description of callers

    Any vehicle used by callers

    Mount Physical Surveillance on frequently usedPCOs

  • 8/2/2019 360477_634055450599150000

    51/60

    Formalising The Evidence

  • 8/2/2019 360477_634055450599150000

    52/60

    While writing the case diaries the following must beincluded:

    1. Letter to Home Secretary requesting permissionfor parallel monitoring

    2. Permission of the Government

    3. Letter to Service Provider requesting diversion

    4. Names of police personnel entrusted the job ofhearing, recording and transcripting theconversations

    5. Date and time of conversation

    6. Transcript of conversation

    7. Certificate of responsible official in charge of theprocess

  • 8/2/2019 360477_634055450599150000

    53/60

  • 8/2/2019 360477_634055450599150000

    54/60

    Case Studies

  • 8/2/2019 360477_634055450599150000

    55/60

    Pratek Deevan, a student of Class 11, studyingin Dehradun was kidnapped on 01November,2002 while traveling from Dehradunto Delhi by a Qualis.

    Dead body of the driver laden with bullet injurieswas recovered from the highway next day.

    For the first two weeks the kidnappers maderansom calls using different mobile numbers

    from Ludhiyana, Amritsar, Delhi, Jodhpur,Baroda and Meerut. A ransom of Rs. 2.5 Crorewas demanded.

    Prateek Deewan Kidnapping Case

  • 8/2/2019 360477_634055450599150000

    56/60

    An email from rediffmail account was

    received demanding ransom. ISP was requested to provide details of the IP

    address of the originating email. Physicaladdress was located to be in Bombay.

    A team was sent to Bombay. Kidnappers created a different email-id on

    yahoo.com and instructed the family of thevictim to chat on yahoo!chat.

  • 8/2/2019 360477_634055450599150000

    57/60

  • 8/2/2019 360477_634055450599150000

    58/60

    Electronic Surveillanceneeds to be

    complemented appropriatelyby matching field work

    and

    physical surveillance

    for

    achieving the targetsphysically.

  • 8/2/2019 360477_634055450599150000

    59/60

    QUESTIONS

  • 8/2/2019 360477_634055450599150000

    60/60