Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.

[1]  Y. Soh,et al.  Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks , 2023, IEEE Transactions on Fuzzy Systems.

[2]  S. Zhong,et al.  Quantized Sampled-Data Control Tactic for T-S Fuzzy NCS Under Stochastic Cyber-Attacks and Its Application to Truck-Trailer System , 2022, IEEE Transactions on Vehicular Technology.

[3]  From few to many: main trends in the internationalization of business R&D , 2022, Transnational Corporations.

[4]  Y. Ali,et al.  Analysing role of businesses’ investment in digital literacy: A case of Pakistan , 2022, Technological Forecasting and Social Change.

[5]  R. A. Ramadhan,et al.  Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework , 2022, IT Journal Research and Development.

[6]  V. Basdeo,et al.  The Need for Harmonised and Specialised Global Legislation to Address the Growing Spectre of Cybercrime , 2022, Southern African Public Law.

[7]  Nina Sunde,et al.  Unboxing the digital forensic investigation process. , 2022, Science & justice : journal of the Forensic Science Society.

[8]  Waqas Ahmad,et al.  Critical Analysis of Cybercrimes in Pakistan: Legislative Measures and Reforms , 2022, International Journal of Business and Economic Affairs.

[9]  Kaukab Jamal Zuberi The Attacks on the Critical Infrastructure of Pakistan , 2021, International Journal for Electronic Crime Investigation.

[10]  S. Kazmi,et al.  Growing Digital Vulnerability: A Case Study of Threats to Pakistans National Assets , 2021, 2021 International Conference on Communication Technologies (ComTech).

[11]  Zarina Ilduzovna Khisamova,et al.  Investigation and Seizure of Electronic Media in the Production of Investigative Actions , 2021, Law, State and Telecommunications Review.

[12]  Marco Bolpagni Cyber risk index: a socio-technical composite index for assessing risk of cyber attacks with negative outcome , 2021, Quality & Quantity.

[13]  Amjad M. Hussain,et al.  Studying the Causes of Delay in Criminal Trials under the Criminal Justice System of Pakistan , 2021, Global Sociological Review.

[14]  Naghma Afridi The Current Status of Forensic Science and its Impact on Administration of Criminal Justice System in Pakistan: An Analytical Study , 2021 .

[15]  K. Shaukat,et al.  Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective , 2020, 2020 International Conference on Cyber Warfare and Security (ICCWS).

[16]  Jonathan Lusthaus Cybercrime in Southeast Asia , 2020 .

[17]  T. Qureshi,et al.  A Study of Economic, Cultural, and Political Causes of Police Corruption in Pakistan , 2020, Policing: A Journal of Policy and Practice.

[18]  Paul Reedy,et al.  Interpol review of digital evidence 2016 - 2019 , 2020, Forensic science international. Synergy.

[19]  F. N. Koranteng,et al.  Impact of Cybercrime and Trust on the Use of E-Commerce Technologies: An Application of the Theory of Planned Behavior , 2020 .

[20]  T. Rehman International Cooperation and Legal Response to Cybercrime in Pakistan , 2020 .

[21]  M. Ayub,et al.  CYBER-WARFARE: IMPLICATIONS FOR THE NATIONAL SECURITY OF PAKISTAN , 2020 .

[22]  Kim-Kwang Raymond Choo,et al.  Categorization and Organization of Database Forensic Investigation Processes , 2020, IEEE Access.

[23]  Encyclopedia of Criminal Activities and the Deep Web , 2020 .

[24]  Jose de Arimatéia da Cruz The Legislative Framework of the European Union (EU) Convention on Cybercrime , 2019, The Palgrave Handbook of International Cybercrime and Cyberdeviance.

[25]  L. Chang Legislative Frameworks Against Cybercrime: The Budapest Convention and Asia , 2019, The Palgrave Handbook of International Cybercrime and Cyberdeviance.

[26]  Asma Tariq,et al.  Crime scene investigation in Pakistan: A perspective , 2019, Forensic Science International.

[27]  Pardis Moslemzadeh Tehrani,et al.  Impact of PECA-2016 Provisions on Freedom of Speech: A Case of Pakistan , 2019, Journal of Management Info.

[28]  Kim-Kwang Raymond Choo,et al.  On the importance of standardising the process of generating digital forensic reports , 2019, Forensic Science International: Reports.

[29]  Richard Hill,et al.  Next-Generation Digital Forensics: Challenges and Future Paradigms , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).

[30]  R. Montasari,et al.  A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics , 2019, Int. J. Electron. Secur. Digit. Forensics.

[31]  Qamar Atta Ul Haq,et al.  Cyber Security and Analysis of Cyber-Crime Laws to Restrict Cyber Crime in Pakistan , 2019, International Journal of Computer Network and Information Security.

[32]  C. McCartney,et al.  The UK forensic science regulator: A model for forensic science regulation? , 2018 .

[33]  Oludare Isaac Abiodun,et al.  Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence , 2018, J. Inf. Process. Syst..

[34]  Francis Kwabena Boachie ICT Infrastructure Required For Sustainable Library Services In The 21St Century Issues And Challenges From A Developing Country's Perspective , 2018, 2018 5th International Symposium on Emerging Trends and Technologies in Libraries and Information Services (ETTLIS).

[35]  A. Basit,et al.  Democratization in Pakistan: Role of Media in Civilian and Military Regimes , 2017 .

[36]  S. Cordner,et al.  Humanitarian forensic action - Its origins and future. , 2017, Forensic science international.

[37]  G. Tully Forensic science and forensic pathology: Quality standards and risks , 2017, The Medico-legal journal.

[38]  Kamran Shaukat,et al.  A Socio-Technological analysis of Cyber Crime and Cyber Security in Pakistan , 2017 .

[39]  J. Robertson Forensic science – it’s bigger than you think! , 2016 .

[40]  Javier Poncela,et al.  Research in Pakistan: Structure, Funding and Results , 2016 .

[41]  Eva A. Vincze,et al.  Challenges in Digital Forensics , 2017 .

[42]  Reza Montasari,et al.  A comprehensive digital forensic investigation process model , 2016, Int. J. Electron. Secur. Digit. Forensics.

[43]  Michael Trucano SABER-ICT framework paper for policy analysis : documenting national educational technology policies around the world and their evolution over time , 2016 .

[44]  Sultan Ullah,et al.  Pakistan and cyber crimes: Problems and preventions , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).

[45]  Elaine B. Barker,et al.  A Profile for U. S. Federal Cryptographic Key Management Systems , 2015 .

[46]  Aleksandar Valjarevic,et al.  A Comprehensive and Harmonized Digital Forensic Investigation Process Model , 2015, Journal of forensic sciences.

[47]  Adam Sedgewick,et al.  Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 , 2014 .

[48]  Valerie Hobbs,et al.  The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice , 2013, J. Digit. Forensics Secur. Law.

[49]  Halil Ibrahim Bulbul,et al.  Digital forensics: an analytical crime scene procedure model (ACSPM). , 2013, Forensic science international.

[50]  Paula Thomas,et al.  An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines , 2011, Digit. Investig..

[51]  Ankit Agarwal,et al.  Systematic Digital Forensic Investigation Model , 2011 .

[52]  David Preston,et al.  A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .

[53]  A. Kershaw Professional standards, public protection and the administration of justice , 2009 .

[54]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[55]  Alexander B. Downes Desperate Times, Desperate Measures: The Causes of Civilian Victimization in War , 2006, International Security.

[56]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[57]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[58]  Brian D. Carrier,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[59]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[60]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .