Digital Investigations Guide
Digital Investigations Guide
Second Edition
Version 2.1 Jan 2009
www.iaac.org.uk
The Information Assurance Advisory Council (IAAC) is a private sector led, cross-
industry forum dedicated to promoting a safe and secure Information Society. IAAC
brings together corporate leaders, public policy makers, law enforcement and the
research community to address the security challenges of the Information Age.
IAAC is engaged with Government and corporate leaders at the highest levels; it
produces innovative policy advice based on professional analysis and global best
practice.
Corporate Sponsors
Disclaimer
IAAC’s recommendations do not necessarily represent the views of all of its members or
sponsors, whether private sector or Government. Strategic interaction with Government is
through a Government Liaison Panel.
The most widely publicised, recent, data losses have involved government
departments and their private sector partners. Less well publicised, but significant,
data losses continue to occur in the private sector. These failures threaten reputation,
trust, business and operational effectiveness, and personal and corporate security.
They constitute significant business risks and are, therefore, of direct interest to
executive board members and the respective audit committees. Data losses may arise
from incompetence or from criminal activity. In either case, failures in process,
culture, behaviour, management oversight and overall governance are likely to be
contributory factors. This may well be because executives at board level have not
fully understood and managed two of their principal business assets – their people and
their data – and the risks related to them.
This useful guide highlights the potential risks for enterprises that do not have a
detailed planned response to typical risk scenarios. It points out that the ‘Low
Frequency/High Impact’ events are disruptive and emphasises that ‘High
Frequency/Low Impact’ events are also disruptive and must be addressed by
contingency plans and preventative measures.
In commending Professor Peter Sommer’s clear and informative guide to its readers, I
seek to highlight the crucial importance of timely and sound decision making by
senior management, taking due notice of the advice given by their technical experts.
Acknowledgements
The purpose of this Guide is to make directors, managers and their professional
advisors aware of the issues involved in collecting, analysing and presenting digital
evidence. The first third deals with the main management problems and the
remainder provides detail of some of the practicalities of implementation.
Since the early 1990s and in particular in the wake of the IRA-inspired bombing
campaigns, prudent organisations have felt the need to have a Disaster Recovery or
Business Contingency Plan. The events anticipated are usually characterised as high
impact/low frequency; they don’t happen very often but when they do they threaten
the continued existence of the organisation.
The purpose of such plans is to reduce the panic, to know in advance who should be
doing what to speed recovery, to set up procedures, to buy in external resources and
facilities. Even though it is impossible to predict the form and direction of any
specific catastrophe, the existence of generic plans is now regarded as essential to
survival.
But much more common than the catastrophic event is the one where there is a
threatened legal outcome. Examples include disputed transactions, suspected fraud,
employee problems, complaints of negligence, “smaller” cyber attacks, theft of data.
These may be comparatively low impact but they are also high frequency events;
most organisations will experience some form of them over the period of just a few
months and some may expect them daily.
Common to all of them is the need for evidence, usually in digital form, to support the
organisation’s position. Hence the need for a Forensic Readiness Plan, a sibling of
the Disaster Recovery Plan.
A few figures from National Statistics tell us the extent to which businesses and
individuals depend on ICT: in 2005, 93 per cent of businesses in the UK with ten or
more employees reported using personal computers or similar devices; in 2006 70 per
cent of UK businesses had a website, just over 50% interacted with central and local
government over the Internet, just under 15% sold over the Internet and 57% made
purchases. 57% of all UK households had internet connectivity and 70% of those did
so over broadband. By June 2008, broadband connections were up to 93% of the
total. In the middle of 2008 a well-specified personal computer could be bought for
the equivalent of 3 days’ earnings of some-one earning £30,000 pa. Costs of personal
digital storage, a key indicator of how much data is easily retained (or covertly stolen)
had dropped to 10p/GB for external hard-disks. 1 GB of hard-disk could be 100,000
items of correspondence or 20,000 medium resolution pictures. The document you
are reading occupies 0.002 GB on a hard-disk.
The detail of the problems that arise when an organisation needs to produce evidence
may be “techie”, but the implications for the continued smooth running of the
organisation require proper control from, and the full understanding of, the
organisation’s most senior decision-makers.
• in disputed transactions;
• in allegations of employee misbehaviour;
• to show compliance with legal and regulatory rules;
• to avoid charges of negligence or breach of contract;
• to assist law enforcement in criminal and anti-terrorist investigations;
• to meet disclosure requirements in civil claims;
• to support insurance claims after a loss.
“Forensic Computing” is now an established set of disciplines and the very high
standards now in place for preserving material from personal computers create high
expectations of other forms of digital evidence, including those from large corporate
systems and networks, across the Internet and the families of personal digital
assistants (PDAs), mobile phones and portable media units.
Unless the organisation has developed a detailed planned response to typical risk
scenarios, much potential evidence will never be collected or will become worthless
as a result of contamination. Moreover, during an investigation, the organisation will
be constantly faced with a dilemma: lose business when essential systems are
switched off so that evidence can be properly preserved; or be profoundly
handicapped and incur losses because evidence cannot be produced.
What is needed is a forensic readiness plan.
Throughout this guide background and more technical detail is omitted from the main
narrative but appears in the second half as a series of appendices. The guide cannot
give more than an overview of the issues as they apply to a wide range of generic
organisations. Success will depend on the extent to which directors and senior
managers take these ideas forward and adapt them to the specific needs and features
of their own organisations.
Lawyers called upon to provide detailed guidance will also find some of the technical
material on types of evidence and methodologies for acquisition helpful.
-----------------------------oooo------------------------
In the three years since this guide first appeared there has been a radical alteration in
the way in which UK law enforcement agencies respond to “hi-tech” crime. There is
no longer a National High Tech Crime Unit (NHTCU) but the Serious and Organised
Crime Agency (SOCA) has an E-Crime Unit and arrangements within the various
police forces are having to be changed as well. From Spring 2009 onwards there
should be a Police Central e-crime unit (PCeU). One of the minor consequences is
that the old NHTCU website, a source of useful advice and documents and upon
which the first edition of this guide had rather relied, ceased to exist in April 2006.
For those organisations which are part of the Critical National Infrastructure, NISCC
has been absorbed in the Centre for the Protection of the National Infrastructure,
CPNI. Information and Communications Technology (ICT) has continued its rapid
evolution and this is having an impact on how investigations involving digital
evidence are carried out. Increasingly closed circuit television (cctv), a vital resource
of physical security and which used to be archived to video tape, is now digitally
stored and hence capable of digital examination. Telephony based on internet
protocols (VOIP) is no longer a mere geeky experiment but a substantial and growing
alternative for businesses and private individuals – there are many problems of how
evidence from VOIP may be collected and handled. More and more companies are
routinely recording telephone traffic, but there are both technical and legal problems
associated with its use in court. Mobile telephones and PDAs are converging in
functionality so that the day of “ubiquitous computing” – any information anywhere –
is upon us. There have been some important amendments to relevant law. We now
have in place measures which require businesses, in particular circumstances, to assist
law enforcement agencies in the handling of encrypted material. There are also
extensions to the law involving pornographic material.
All of these reasons have persuaded us to issue a substantial new version of the guide
at this point rather than simply carry on updating the downloadable file that has been
available on the IAAC website. We have also taken the opportunity to add some new
features, including appendices on the powers of civilian investigators, cctv and
handling encrypted material.
But digital evidence is often highly volatile and easily compromised by poor handling.
The chances of success in litigation or successful criminal prosecution by law
enforcement agencies depend heavily on the availability of strong evidence. Failure
in civil litigation means financial loss, including legal expenses; a failed criminal
prosecution can also generate reputational damage to a victim. While many sensible
organisations have arrangements in the event of fire, flood, failure of electricity and
telecommunications services or acts of terrorism, very few have thought-through
plans to identify, collect and preserve digital evidence in forms which will prove
robust against testing in legal proceedings.
Yet demands for digital evidence are far more common than any of the subjects of
conventional disaster contingency planning. Very few organisations have the
management structures in place to enable them to carry out an efficient, cost-effective
and low-impact digital investigation.
Following some of the major financial scandals of the late 1990s and early 2000s, new
strands of legislation and regulation impose on businesses the requirement to produce
and preserve a wide variety of business records. In the best known of these, the US
Sarbanes-Oxley Act of 2002, there are explicit penalties for deliberate destruction of
certain essential files. The Basel Committee on Banking Supervision Revised
International Capital Framework of 2004 (“Basel II”) requires companies in the
financial services industry to conduct a broad risk assessment of those to whom it
makes loans or in which investments are made1. The UK Combined Code of
Corporate Governance applies to quoted companies and lists a wide range of
compliance requirements, including operation issues and risk management2. An
undercurrent to these and similar items of legislation and regulation is that material
produced in electronic form is reliable. Forensic compliance services are already
being set up to maintain reliable archives of essential business documents and emails,
but their remit is limited. In the UK, the Freedom of Information Act 2000 states that
all public sector bodies must supply requested information within 20 working days,
and that such information has to be “reliable”.
1
Http://brief.weburb.dk/frame.php?loc=archive/00000141/
2
Http://brief.weburb.dk/frame.php?loc=archive/00000147/
3
http://www.hm-treasury.gov.uk/media/0/1/poynter_review250608.pdf
4
http://www.mod.uk/DefenceInternet/AboutDefence/CorporatePublications/PolicyStrategyandPlanning/
ReportIntoTheLossOfModPersonalData.htm
This guide aims to help directors, senior managers and their legal advisers to
understand the key strategic and management issues. It is designed to anticipate the
need for provision of digital evidence and investigations by setting up management
procedures, acquiring appropriate resources and identifying third-party sources of
emergency assistance. For lawyers, it provides an overview of the types of digital
evidence and the associated problems of probative value, admissibility and disclosure.
But it is only a starting point – other, more specialist publications will need to be
consulted while a detailed plan is formulated.
While the detail of collecting and analysing digital evidence is substantially a matter
of deploying technical skills, success in doing so depends heavily on the level of
careful pre-planning. As we will see, in the middle of an incident there are often
important choices to be made between the proper preservation of evidence – which
may involve shutting down central computer services for the duration – and the
continuity of the business. These are decisions for the business’s most senior
managers, not computer technicians or hurriedly-hired external consultants. Again, if
planning is poor, key personnel may find themselves being diverted into supporting
investigatory and legal processes instead of running the business. The text and
appendices to this guide will help to start the process of establishing a proper
corporate strategy.
5
http://www.justice.gov.uk/docs/data-sharing-review.pdf
6
http://www.cabinetoffice.gov.uk/~/media/assets/www.cabinetoffice.gov.uk/csia/dhr/dhr080625%20pdf.
ashx
Third, the likely risk scenarios that might face a specific organisation are identified.
This process has something in common with traditional security and contingency
planning analysis. The aim here is not to develop preventative or detective measures,
but to elucidate the kinds of digital evidence that are likely to be required for each
scenario.
With this groundwork, directors and senior managers should be in a position to devise
a corporate plan of action that is specific to their organisation. This has to cover risk
analysis, management aims, management structures (including appropriate reporting),
core procedures and resourcing.
As can be seen, the value of evidence in the overall recovery plan is towards the end
of the process, after all the more immediate actions have been taken. But to be truly
effective, evidence identification and collection needs to commence at a very stage
within an event.
Detection
Reporting
Diagnosis – Initial
Management Actions -
Initial
Evidence Collection
Diagnosis – Mature
Management Actions –
Secondary and Mature
Business / Asset
Recovery Activities
Remedial Activity
Time Line
Up to a point all crises, however set-off, have common features and can be handled
through a common business continuity plan. So it may not matter whether a business
interruption is caused by a fire, flood, terrorist action or telecommunications service
failure – individual detailed business continuity plans for each of these scenarios
would be very similar.
The first duty of an organisation is to survive so that it can continue to serve its
customers and clients, meet its obligations to debtors, bankers, employees, the public
at large and the state. In addition, commercial organisations are expected to generate
profits for shareholders. Typical top-level aims during a crisis include:
So, an organisation needs a management and executive framework within which crisis
decisions can be made. Some key questions for consideration are as follows.
Further, the organisation will need an executive resource. This may be an existing
security or contingency planning unit or extensions thereof, perhaps even a
completely new unit. Each organisation will need to make its own decisions
according to its needs. Finally, there is the question of how extensive that resource
should be: does it require its own in-house forensic computing expertise, or can it rely
on third parties, or should there be a combination of the two?
All prudent organisations develop their security policies on the basis of risk analysis.
They collect data on the threats that their type of business might face and try to rate
each hazard in terms of the frequency and cost of each potential incident. In regular
security analysis, the outcome is usually a set of preventative and detective measures.
In some instances, measures to mitigate damage and recover losses are added to these.
The types of measures selected will include administrative changes, audit controls, the
deployment of appropriate technologies, contracts for disaster recovery sites and
insurance.7 Usually it is not possible to produce risk analysis against precise financial
metrics because of the lack of accurate actuarial data – and beyond a certain point, too
much effort in risk analysis is counterproductive. However, informed approximations
are extremely helpful. For example, the estimated annual costs of likely breaches of
security can give a strong pointer to a prudent annual budget for security measures.
Risk analysis is the essential precursor to sound, panic-free risk management.
But, as it is usually practised, regular risk analysis often fails to identify the types of
evidence that could and should be captured. In addition, various lower level situations
– for example, disputes about transactions or employment – fall below the horizon of
conventional security analysis. So, it is desirable to review all the threat scenarios
from the evidence perspective and consider how it will be collected and preserved to a
sufficient degree. A scenario consists of starting with a likely triggering event and
then playing out, as a paper exercise, all the likely consequences and possible
reactions.
Existing risk scenarios as well as others need to be examined from the evidence
perspective. This means being able to relate activities of potential interest to the
computer resources on which the activities are being carried out, and developing an
understanding of the files that are being created. For each plausible risk scenario an
organisation should create documentation identifying the computer resources and
associated files which are likely to be of interest. For example, most businesses are
vulnerable to fraud, both from employees and third parties. To prove what has
happened an organisation will need at the very least the main transaction records,
even if the modus operandi is not explicitly via a computer. If the activity is
computer-mediated, access control logs, web logs and intrusion detection logs will be
7
See for, example, Risk Management and Accreditation of Information Systems, published by the
Centre for the Protection of the National Infrastructure (CPNI)
http://www.cpni.gov.uk/Products/bestpractice/3016.aspx
It is beyond the scope of this guide to provide an exhaustive list of all the potential
sources of evidence and their importance in every conceivable type of business
operation. However, it is possible to identify certain baseline capabilities which the
organisation needs to be able to develop. Many of these are existing records and logs,
but the organisation needs to know precisely how to turn them into evidence which is
unimpeachable in terms of reliability (see Table 5.1).
For each item of desirable evidence, an organisation’s evaluation and procedures need
to reflect answers to the following.
The situations where these questions produce disappointing answers should prompt
anticipatory action to be able to “cover” the position with more reliable sources of
evidence. (Appendix 2 provides some detail on how various classes of digital
evidence may be reliably acquired and preserved. Some of the legal issues are
discussed in the next section.)
real – an object which can be brought to court and examined on the spot;
testimonial – the eyewitness observations of someone who was present and whose
recollections can be tested before the court;
documentary – a business or other record in any form which, once its authenticity has
been proved, can be examined for content;
technical – where a forensic technician has carried out some procedures on original
“real” evidence and has produced some results. Technical evidence, in the eyes of the
court, is not the same as expert evidence, which also includes giving opinions;
expert – the opinions of someone who is expert in a particular field and/or the
conclusions of that expert after carrying out a specific investigation;
derived – a chart, video, etc. created from primary evidence to illustrate how certain
conclusions might be drawn.
Evidence presented in court has to satisfy tests which fall into two main categories,
admissibility and weight.
6.1 Admissibility
For evidence to be admissible, it must satisfy certain purely legal tests of
acceptability. This tends to be a function of jurisdictions derived from the English
common law as opposed to those based on European civil codes. The best known of
the admissibility rules are:
The actual rules are quite complex and have many exceptions. In the UK, intercepted
data content can be used only for intelligence purposes – it cannot be admitted in
evidence for a court to consider8. There is however a fair wind behind those who
wish to get rid of this very odd rule, at least in cases involving serious crime and
terrorism. In the US the Federal Rules of Evidence help to define “admissibility” in
that jurisdiction; US court decisions have produced special rules, not replicated
8
Regulation of Investigatory Powers Act 2000, see also p. 60 below.
6.2 Weight
Having satisfied the admissibility criteria, the evidence can be considered then for
weight of fact – its persuasiveness or probative value. While in the final analysis
“weight” is a non-scientific concept, there are a number of desirable features in non-
testimonial evidence, that is, exhibits and documents of various kinds. These
attributes include that an exhibit is:
9
The Daubert tests – Daubert v. Merrell Dow 509 U.S. 579 (1993) provides the following tests: (1)
whether the theory or technique can be (and has been) tested; (2) the error rate associated with the
method; (3) publication in a peer-reviewed journal; and (4) whether the technique has gained
widespread acceptance.
10
s 78 Police and Criminal Evidence Act, 1984.
• content – of a file, typically, the words and figures in a document or report, images,
designs within an application file, a database or selection, emails, webpages, files
downloaded;
• meta-data – within certain files, that is, data about data which is not immediately
viewable but indicates, for example, who created a file, how many times it has been
edited and when it was last printed. Microsoft word processing and spreadsheet
documents may contain extensive meta-data;
• directory data – information about a file which is held in a system’s storage media
containing details of name, various associated date and time stamps, and size;
• configuration data – files and directory data which help a computer and/or
application programs to behave in a particular way and which may provide evidence
of how and when the computer was used. On a Windows PC, this includes material
found in the registry;
• logging data – files created by application programs and operating systems which
either record activity explicitly as in audit trails and online keystroke captures, or which
can be used to attempt to reconstruct events, eg “history”, “session” and “recent” files;
• material from back-ups – depending on the circumstances, any of the above;
• forensically recovered data – material obtained from storage media which would not
normally be seen, eg undeleted files, files from slack space, swap files, caches, plus
of fragments of any of the above;
• eavesdropped data – material obtained by placing a monitor across a telephone or
network connection. This in turn divides into two:
o traffic data – who called whom, when and for how long;
o content – what was said;
• expert interpretations – based on any of the above in any combination.
11
A file or an entire disk is subjected to a mathematical process to produce a “result”; in effect a short
stream of letters and numbers. Once that file or disk has been copied the same mathematical process is
re-applied and should produce the same “result”; if it doesn’t the copy is not identical to the original
Costs continue to fall. Laptops with large hard-disks and the most recent operating
systems now cost less than £300, which translates to less than 3 days’ earnings for a
semi-skilled painter/decorator in London, 5 hours of the time of a skilled plumber and
perhaps 40 minutes with a partner at a leading solicitors’ firm. External hard-disks, a
key risk factor in data theft, cost under 12p per 1000 MB of storage. Just before
Easter 2008 you could buy an easily-secretable 8 GB USB thumb drive for under £15.
For £15/month you could also get fully mobile Internet on your laptop and with 3GB
download per month – and the hardware dongle to do so was free.
It is obvious that these technological changes have brought about profound changes in
everyday private and commercial life. And almost every one of them has created
opportunities for new forms of crime, albeit often variants on existing ones. Ten
years ago, almost no one was predicting a crisis for the music and film publishing
industries prompted by easy, low-cost copying and distribution of their product. And
only the very paranoid were predicting the extent to which individuals might leave
large numbers of digital footprints of their activities. Ten years ago mobile phones
simply made and received telephone calls, today they are fully fledged computers
capable of connecting to the Internet, handling emails, storing and generating
substantive work files, photographing still and movie pictures, and playing music and
video files. The mid-2000s saw the growth of social networking sites. In one sense
social networking has been around for a very long time: the Bulletin Board Systems
of the early 1980s, well before the arrival of the Internet, provided a medium in which
people could meet. What the likes of Facebook, Bebo, LinkedIn and their siblings
have provided is a much richer, more fluid and easier to use mechanism. But their
very popularity has made it much easier for investigators to identify private detail
about individuals which can later be exploited.
It would be a rash futurologist who made predictions at too great a level of detail.
And that includes forecasts of how digital forensics might have to respond.
Operating systems and other programs frequently alter and add to the contents
of electronic storage. This may happen automatically without the user
necessarily being aware that the data has been changed.
12
See below.
13
Available at: http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf;
http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf
A proposed Standards for the Exchange of Digital Evidence from the International
Organisation on Computer Evidence suggests a similar set of principles for the
standardised recovery of computer-based evidence14:
• upon seizing digital evidence, the actions taken should not change that
evidence;
• when it is necessary for a person to access original digital evidence,
that person must be forensically competent;
• all activity relating to the seizure, access, storage, or transfer of digital
evidence must be fully documented, preserved and available for
review;
• an individual is responsible for all actions taken with respect to digital
evidence while the digital evidence is in their possession;
• any agency that is responsible for seizing, accessing, storing, or
transferring digital evidence is responsible for compliance with these
principles.
14
For a G8 conference: http://www.ioce.org/G8_proposed_principles_for_forensic_evidence.html
The Convention also extends towards issues involving evidence, both in terms of
warranting methods and actual procedures. With regard to electronic evidence,
Council of Europe Recommendation No. R(95)13 concerning problems of criminal
procedural law connected with information technology16, adopted on 11 September
1995, states the following:
15
Chart of signatures and ratification of the Convention on Cybercrime: http://conventions.coe.int/
Treaty/Commun/ChercheSig.asp?NT=185&CM=1&DF=09/07/04&CL=ENG. The Convention on
Cybercrime entered into force on 1 July 2004.
16
Available at: http://www.coe.fr/cm/ta/rec/1995/95r13.htm
To be carried out successfully this requires both appropriate technical products and
following certain procedures. Each step in turn needs to be carefully recorded so that
there is no opportunity for others to question the technician’s skills.
There are a variety of software products. Retail “imaging” products are designed to
assist recovery after a hard disk failure. For PC, products such as Ghost, Acronis
True Image, Paragon and Powerquest DriveImage (for Apple Mac, SubRosaSoft’s
CopyCatX II) may not be adequate in a forensic arena as they usually concentrate
only on “live” files as opposed to data that has been deleted but are still resident on
disk; some retail imaging products actually add data during imaging. dd is a reliable
and flexible standard part of Unix operating systems and is completely free, although
not easy to use. Most computer forensic practitioners use stand-alone products such
as SafeBack, EnCase or FTK Imager. The latter two provide a complete disk
forensics suite, including imaging. The professional products often contain in-built
integrity checking, so that an “image file” (intermediate file which either can be
directly examined or from which exact clones of the original can be made) can be
verified against the original using “digital fingerprinting”.17 Not all imaging products
can cope with all the disk operating systems that might be encountered and some
versions of well-known products may fail to capture everything on a hard disk, which
is why competent technicians need to be employed to carry out the work.
The first task is to ensure that, once the computer has been seized, the computer is not
booted up normally as, under most modern operating systems, during the process
fresh data will be written to disk, even if all that happens is that the computer is
started up and then almost immediately afterwards shut down. To avoid this, usually
a technician will remove the hard disk and install it in his own specialist workstation.
The workstation will contain, among other things, specialist “imaging” software; a
write-protect device so that the hard disk to be imaged can only be “read”, not
“written to”; and a further hard disk onto which the resulting “image file” can be
stored prior to being backed-up to DVD and/or CD, tape or network store. In the case
of a laptop or other computer where disk removal is difficult, the computer is started
up with an alternative operating system from the CD drive. The special CD contains
the imaging software and networking capability. The computer to be imaged is linked
via a network or parallel cable to the technician’s computer, which then takes charge
of events and collects the image file over the network cable. (The network actually
17
A complex mathematical calculation is performed on the contents of the original and then on the
clone – if original and clone are identical, the product of the calculation will also be identical.
There are also specialist hand-held hardware devices which can carry out high-speed
imaging of disks, once they have been removed from their computers. They are of
particular value when time is of the essence, for example where computer downtime
may incur extensive consequential loss.
A further problem occurs where a larger “personal” computer contains several hard
disks designed to work together in a “RAID” array. These are used mainly where
very fast performance is required, as in an office server or in video-editing
workstations. Usually, the disks cannot be imaged separately and specialist assistance
is required to determine the best course of action.
In any event, the technician will make contemporaneous notes of what has been done,
to be incorporated in a witness statement or exhibit later.
A further essential task for the technician is to check the “clock-time” on the
computer that is being imaged. All computers have an onboard clock, sometimes
referred to as the BIOS clock, from which the day and time stamps used by the
computer are derived. It is important to establish how far the computer’s clock-time
diverges from the actual time, as this may have an impact on assessments of
chronologies of events later. A handy tip is to get the computer’s BIOS screen to a
point where the clock is visible and then to place next to it a clock which takes its
timing from an “atomic” source; the two are then photographed together using a
digital camera or cellphone with in-built camera.
Some software-based imaging products permit the technician to “preview” a hard disk
of interest – that is, carry out an initial examination safely but without first having to
make an image. This can save time by the early elimination of “irrelevant” material
and is particularly useful when large numbers of disks have to be examined.
Most of the popular forensic analysis products available are for PCs running the
Windows family of operating systems.18 Examples include EnCase19, AccessData
18
Many of these do much more than preserve evidence – they also perform analyses
Legal issues
In general terms, employers and their agents are normally “authorised” to access
computers used by their employees, but this may be subject to a detailed examination
of contracts of employment. Section 10 of the Computer Misuse Act 1990 protects
law enforcement officers in the execution of their powers of inspection, search or
seizure. Where computers are seized from professionals such as lawyers and
accountants there may be issues of professional privilege (under Part 2 of the Criminal
Justice and Police Act 2001 and associated codes of practice)28. Section 54 restates
19
http://www.guidancesoftware.com/
20
http://www.accessdata.com/products/ftk/
21
http://www.prodiscover.com/ProDiscoverDFT.htm
22
http://www.asrdata.com/tools/
23
http://www.sleuthkit.org/
24
http://www.macforensicslab.com/
25
http://www.blackbagtech.com/software_mfs.html
26
Newer Macs powered by Intel chips also have a replacement for the BIOS called EFI (Extensible
Firmware Interface) which in turn affects how the computer boots up and hard-disks are partitioned;
older forensic analysis tools can only “see” the contents of such hard-disks after manual fiddling,
27
For example, under the business records provisions in s. 117 of the Criminal Justice Act 2003.
28
Actually an update of the Police and Criminal Evidence Act 1984, Code B.
Software versions offer similar facilities and are usually designed to operate covertly
– their existence is not shown up when a computer user tries to find which programs
are “running” on his machine. Software keyloggers, once installed, can usually be
controlled remotely, across a network or the Internet, provided of course that the
targeted computer is actually connected to a network. Most software keyloggers can
be asked to perform screen-captures, or send messages to investigators if particular
keywords are triggered.
Legal issues
Assuming for the moment that the keylogger is being installed by an investigator
instructed by the employer of a suspect, the legal considerations are similar to those
for any other sort of employer-based investigation. These are covered in Appendix
IV. In other circumstances, the use of software-based keyloggers involves breach of s
3 of the Computer Misuse Act 1990. Hardware-based keyloggers might, it could be
argued, be counted as “interception” for the purposes of s 1 of the Regulation of
Investigatory Powers Act, 2000.
But should an organisation not now be expecting the system to be “imaged” in the
way that it is for single hard disks, so that defence experts are absolutely sure that they
can run as many verification tests as they wish? Does an organisation have to make a
forensic copy of the entire network of a large bank with a global presence and all its
subsidiaries, just because an assistant manager in a UK branch is accused of fraud by
colluding with customers over credit agreements and says that the computer is not
accurately reflecting all the business transactions and queries made?
In terms of the exhibit that is being produced, it is useful to be able to give the
following:
Legal Issues
Usually, admissibility of evidence will be on the basis that the material is a “business
record” as defined in s. 117 of the Criminal Justice Act 2003; an “expert report” for
the purposes of s. 118(8) and 127 of the same Act; or “real evidence”. However,
evidence may be excluded, for example if it has been obtained unfairly (judicial
discretion under s. 78 of the Police and Criminal Evidence Act 1984), or in
contravention of data protection or human rights legislation.
Corporate Networks
In addition, often it is not feasible to “image” or “clone” networks. Apart from the
quantity of machines that would need to be imaged, if the evidence is to have real
integrity, the entire network would have to go offline and be shut down for the
duration. If this does not happen, then the images of each of the various constituent
computers will be “snapshots” taken at different times – the data will not synchronise
and corroborate. So, again, the form of selection will have to be made. In so doing,
several things need to be borne in mind:
• the organisation needs to show that it has captured the “complete” evidence in terms
of the litigation that it is pursuing;
• the evidence must be admissible.
An organisation will need to be able to justify the overall reliability of the network
and the particular workstations and servers that it is submitting as evidence. The
following elements in a witness statement may help to persuade a sceptical court:
As always, an organisation should be prepared for defence team demands for further
disclosure so that they can test the overall reliability of its log evidence and perhaps
request further information from its computer system in order to test or prove
assertions of their own.
In the last few years products have begun to emerge which allow for workstations to
be remotely monitored and imaged across a corporate network. The most mature
products appear to be EnCase Enterprise Edition and ProDiscover Professional.
These new products require that each workstation to be monitored has a small
“servelet” program installed on it. The monitoring takes place from a specially
designated workstation and the servelet on each monitored workstation accepts
commands from it. Communications between the monitoring and monitored
workstation run across the corporate network, but are encrypted. The hard disk on the
monitored workstation becomes “write-protected”, just as it would during a
conventional examination, so that the process should be free from contamination by
the examiner.
Although this approach seems very promising it has yet to be tested fully in the courts
and there may be practical problems such as the time taken to image. For any
organisation considering the deployment of remote monitoring or imaging, in addition
to the costs of the software licence, significant funds will need to be set aside for the
related training and development of appropriate procedures. There will still be
problems of selection of material and anticipating how a defence expert might test it –
or the defence team complaining that their expert is not able to conduct a realistic test
and that as a result the evidence should be excluded.
Admissibility of evidence will be on a similar basis to that for material obtained from
large computer systems: that the material is a “business record” as defined in is a
“business record” as defined in s. 117 of the Criminal Justice Act 2003; an “expert
report” for the purposes of s. 118(8) and 127 of the same Act; or “real evidence”.
However, evidence may be excluded, for example if it has been obtained unfairly
(judicial discretion under s. 78 of the Police and Criminal Evidence Act 1984), or in
contravention of data protection or human rights legislation.
Where remote monitoring has been used, there may be arguments which suggest that
a interception for the purposes of the Regulation of Investigatory Powers Act 2000
has taken place. Employers should be able to have the benefit of the
Telecommunications (Lawful Business Practice) (Interception of Communications)
Regulations 200029. This allows a business to carry out an interception on its own
network in order to: “establish the existence of facts”, “in the interests of national
security”, “for the purpose of preventing or detecting crime”, and “for the purpose of
investigating or detecting the unauthorised use of that or any other telecommunication
system”. In any event, in a corporate environment employees will need to be have
been forewarned that their computer use may be subject to monitoring of various
kinds.
Email
Copies of emails may be found on the personal computers of the sender and the
recipient and on one or more email servers. For each of these, copies may exist in
archived back-ups. If either the sender or recipient uses a mobile device such as a
mobile phone or PDA, copies may exist there as well. Obviously, a simple printout of
an email is better than nothing, but because of the ease with which a wordprocessor
can be deployed to alter or fake an email, a more sophisticated approach is required.
The key to securing reliable email evidence within an organisation is to know how the
specific email service works – in particular, where copies of emails are likely to be
stored. It is not unusual for suspects to attempt to delete emails from their local
machine – hence the importance of being able to locate alternative copies. Clearly,
each further copy of an individual email that is discovered provides greater levels of
corroboration, and hence authenticity.
Emails sent over the Internet or using internet-like protocols have “headers”
associated with them, which are normally suppressed when viewed through a regular
email client program30, which contain information about where the email originated
and what route it took to the recipient. This information, though it can be forged or
spoofed, can be used to provide a level of authentication.
29
http://www.opsi.gov.uk/si/si2000/20002699.htm
30
In Microsoft Outlook Express, for example, the headers can be viewed via right-clicking and
selecting “Properties”.
The emails themselves are stored in files associated with the email application – a
forensic technician needs to have a knowledge of which files are important and where
they are located. Attachments to emails may be stored elsewhere, in another directory
on the disk. In the simpler older products, often the email files can be read directly
using a text editor, but in more modern products such as Outlook and Outlook
Express, the emails are held inside a structured database and can be read only from
within the email program or a specialist utility. Email server programs also store
messages within specialist databases. The advantage of the structured database is that
it then becomes easy to carry out sophisticated searches for individual emails, by
sender, recipient, subject, content, date and so on. In addition, the fact that each email
is within a structured database makes tampering with the content of individual emails
more difficult.
One disadvantage is that the set of emails within a database may contain material that
is wholly irrelevant to the litigation and which is subject to data protection or human
rights legislation, is commercially sensitive or covered by legal privilege. In these
circumstances it may be necessary to arrange for an independent third party to have
formal supervision of the files, along the lines of what is done in civil search orders or
under Part 2 of the Criminal Justice and Police Act 2001 and associated codes of
practice.
Some email services are presented via a web interface. For individuals, there are
services such as Hotmail, Yahoo and Gmail, and many large ISPs offer a web-based
service so that their customers can access email when away from their usual base via
someone else’s computer or an Internet café. Similar web-based email services can
be offered by large organisations for their staff based on corporate email servers –
Microsoft Exchange can be set up in this way, for example. In those circumstances
the participants’ PCs will not maintain a permanent record of emails sent and
received. However, for recent emails, a computer forensic technician may be able to
retrieve copies from the “temporary internet files” folders (also known as the cache).
Legal Issues
There are some general restrictions on employer surveillance of employees and these
apply to emails, phone calls and web browsing, among others (they also apply to the
use of closed circuit television) (these are considered in Appendix 4).
Once these hurdles have been overcome, emails obtained from a PC may be
admissible either as “business records” or as “real evidence” but there has to be a
basis for them to be lawfully obtained in the first place. As far as PCs are concerned,
the computer owner or another authorised person has to give permission, otherwise
• where the email has come from a client program installed on an individual PC – the
identification of the program and the steps taken to capture and preserve the
supporting files;
• where the email has come from a server program – the identification of the program
and the steps taken to extract and preserve the supporting files; whether this is simply
a subset of the total email data available and what basis was made for the selection,
whether a larger subset is available against appropriate defence team request;
• in the case of a server program – what security features exist and how they are
managed (this is to anticipate a suggestion that incriminating material was placed
there by someone other than the suspect);
• compliance with any external good practice or system audit standards.
In terms of capturing evidence, there are a number of choices. Ideally, like hard disks
PDAs should be “imaged”. As with evidence from hard disks and other data storage
media, it is important to be able to demonstrate that the process of collection has not
caused the data to be modified. Just as with conventional PCs, in some instances the
mere act of “just having a look” may cause data alteration. PDAs often contain two
sorts of memory: internal and external. The external is usually on a card – Compact
Flash, Secure Digital, etc., and this presents relatively few problems as the cards can
be removed and read. But the internal memory cannot be removed easily or read
without somehow powering up the PDA. Furthermore, some PDAs lose data if their
internal batteries are not kept charged up. If a PDA is to be regarded as prime
evidence, then advice should be sought to ensure that critical data is not lost after
seizure and before a case comes to trial.
31
There may be explicit or implied authorisation under an employee’s contract of employment. In
addition, it is possible to seize a computer under a warrant.
Legal Issues
These are similar to those regarding PCs. In admissibility terms the entire PDA is
“real evidence”. However, there are significant hurdles in terms of getting full legal
access to a PDA where the owner does not want to cooperate and the PDA is personal
property, not that of the business. Unauthorised access may be a criminal offence and
there may be data protection and human rights issues.
Cellphones
The first cellphone, as opposed to a radio or walkie-talkie which could be linked to
the telephone network, dates from 1973. Modern cellphones, as available in 2008,
provide much more than the ability to provide on-the-go communications to any
telephone, fixed and mobile, anywhere in the world. They often have substantial
PDA functionality – contact lists, diaries, stored files, photographs, etc and may also
feature in-built cameras. As with PDAs they can synchronise with personal
computers.
32
http://www.paraben-
forensics.com/catalog/index.php?cPath=25&osCsid=4a67143f86e68754330bc45c3eea12e3
33
Http://www.grandideastudio.com/portfolio/index.php?id=1&prod=17
34
http://csrc.nist.gov/publications/nistir/nistir-7250.pdf
35
Some PDAs also use a version of the Linux operating system.
36
Guidelines on PDA Forensics, available at: http://www.iwar.org.uk/comsec/resources/nist/pda-
forensics-sp800-72.pdf
It is the complexity and variety of cellphones which provide the corporate investigator
with many potential headaches – plus the fact that new models appear all the time.
Unlike PCs, where most corporate machines will use the Windows family of
operating systems or Mac OSX, each cellphone manufacturer may develop their own
operating system. There are some broad families of cellphone operating systems for
more sophisticated products – Symbian, Windows Mobile, Blackberry/RIM, Palm,
Linux, and “Google” – each of these exists in several variants and there are many
instances of customisation to give individual phones their unique specification. It
requires a not insubstantial investment by specialist investigators to maintain a
collection of connectors, cables and software for the range of models they are likely to
be asked to examine.
There are two big problems as well as some more minor ones facing anyone seeking
to preserve a cellphone for evidential purposes: how to ensure that existing data on the
phone does not become over-written or otherwise lost, and how to extract all the data
that might be there.
Turning now to the basic function of making and receiving telephone calls: each
phone gets its identity in two ways: the SIM or Subscriber Identity Module37 is what
identifies the caller to the phone network and also provides the means of payment,
which will be either on a monthly contract or be topped up on a “pay as you go” basis.
The IMEI or International Mobile Equipment Identity is what uniquely identifies any
particular item of hardware. Cellphones have two, sometimes, three areas where
unique, investigation-relevant, information may be held. The SIM in addition to
holding immediate information about the phone’s number, its IMSI and its location
area identity, will also hold contact details and SMS messages. The body of the
phone also has an area of “addressable” data storage and this can include, contact
37
USIMs are the equivalent for UMTS or 3G services
Because of the volatility issues mentioned above it is especially important that proper
time-stamped contemporaneous notes are kept. For example:
o A “principles” document which shows how the ACPO principles for handling
computer evidence in general can be applied to mobile phones:
http://www.holmes.nl/MPF/Principles.doc
o A work-flow document which shows the steps required in a proper
investigations of a mobile phone:
http://www.holmes.nl/MPF/FlowChartForensicMobilePhoneExamination.htm
There are only two areas of technical investigation which are open to those without
specialist equipment and training and both of these are quite limited.
Legal Issues
These are similar to those regarding PCs and PDAs, though with the additional
difficulty that telephones might be regarded as more “personal” than other devices
thus setting the bar on the tests of necessity and proportionality that bit higher. In
addition, voice and SMS messages which are intended for the owner of the phone
have been intercepted and have not been received by the intended recipient may fall
foul of the Regulation of Investigatory Powers Act 2000.
In admissibility terms the entire cellphone is “real evidence”. However, there are
significant hurdles in terms of getting full legal access to a cellphone where the owner
does not want to cooperate and the PDA is personal property, not that of the business.
Unauthorised access may be a criminal offence and there may be data protection and
human rights issues. It might be prudent for an organisation that supplies cellphones
to its employees to address the issue of employee rights to privacy explicitly in the
contract of employment or similar document.
Cellsite analysis
38
If a base station is “full” of active connections it may offload traffic to another nearby base station.
There is one exception, where the owner of the cellphone has consented to be tracked.
Such services are available in a number of countries, including the UK. Typical
customers are parents anxious about their children and businesses needing to identify
the location of some of their employees. The UK services require customers to go to
significant lengths to demonstrate that consent has been obtained.39 Versions of
Google maps for running on some mobile phones use the same technique in order to
deliver a “show me where I am” service. GPS-based services are much more accurate
for these location-finding facilities.
Most of these classes of media operate in a similar fashion to hard disks in that often
deleted data can be recovered. So it is important that any devices suspected of
holding data relevant to an incident or investigation are seized and properly imaged.
Legal Issues
The main legal issue in a corporate, non-law enforcement inquiry is that the devices
may be the personal property of a suspect and there may be no immediate and timely
basis upon which they can be seized.
39
An example can be seen at: http://www.followus.co.uk/mobilephonelocationandyou.htm
40
You would need to examine the System Registry
For the forensic examiner the problems are similar to those for PDAs and cellphones.
There are few common standards other than NMEA, which is the protocol by which
data is transmitted by the satellite and available to be interpreted electronically. Each
manufacturer has its own ideas about the internal design of their satnav units, and
these develop and change with the appearance of new models. The popular TomTom
family of devices appears to use a variant of Linux. Some manufacturers rely on a
modified form of Windows Mobile.
Typically what is stored includes: recent destinations, saved home and destination
addresses, uploaded “Points of Interest”. Most units sold for use in cars do not retain
data about specific journeys Navman devices seem to hold some records and
sometimes it is possible to recover deleted material from some TomTom devices.
Hand-held devices as sold to trekkers, on the other hand, often have a “breadcrumb”
facility which records the journey (and which is useful for those who get lost and wish
to return to their starting point or plot their journeys afterwards on a terrain map).
Some of the more sophisticated devices can be linked to PCs for back-up purposes, to
receive updates and to plan journeys – the software for TomTom devices is called
TomTom Home. As with syncing software used for PDAs and Cellphones it is often
a good idea to see if there is a computer with whom syncing has taken place and if
any useful information exists on it.
Legal Issues
The main legal issue in a corporate, non-law enforcement inquiry is that if the device
is the personal property of a suspect there may be no immediate and timely basis upon
which they can be seized. Even if the device is provided by the employer, the right to
seize may be limited unless there has been some warning in the contract of
employment.
Analogue Telephony
• it is helpful to be able to say something about the specific PABX and what logging
facilities exist;
• there should be some statement about how they were collected, by whom, what
precautions were taken, and how selections of data were made;
• once taken, they should be subjected to some form of integrity check, such as MD5
digital fingerprinting, as a guard against post-capture tampering.
The real difficulty is establishing a legal basis on which to carry out the monitoring of
internal telephone communications data and content (this is reviewed below and in
Appendix 4).
Data Traffic
There is little practical difficulty for an organisation to monitor data traffic on its own
internal networks. In effect, one or more network cards are set up in areas of high
traffic flow and instead of just listening for packets of data specifically directed at the
associated workstation, all the passing data is collected (putting the card into
“promiscuous” mode) and then filtered according to various criteria. Such facilities
are used regularly to monitor the quality and load of data traffic on a network and to
carry out a variety of technical diagnostics. In the situation of an investigation it is
trivial to switch such facilities to monitoring activity by workstation, user identity,
email name or the occurrence of specific words. Forensically, the technical issues to
be covered in a witness statement include the following:
• can the organisation provide a brief technical description of the monitored network?
• can the organisation identify and describe the technical facilities, hardware and
software used to carry out monitoring, including the location of the monitoring points
on the network?
• can the organisation describe and provide the raw logs that were generated during the
monitoring, and say how it preserved them?
• can the organisation describe any post-capture processing that was carried out to
analyse the logs and produce more understandable derived exhibits?
Legal Issues
As with the surveillance of internal telephone calls, the real difficulty is establishing a
legal basis on which to carry out the monitoring of data activity (this is reviewed
below and in Appendix 4).
41
This Directive has been modified by Directive 2006/24/EC which is implemented in the UK as the
Data Retention (EC Directive) Regulations 2007.
http://www.opsi.gov.uk/si/si2007/uksi_20072199_en_1. At the time of writing there is a Data
Communications Bill before Parliament. The effect is likely to be extend the period during which data
is retained.
The main law is the Regulation of Investigatory Powers Act 2000 (RIPA 2000).
Briefly, this makes it unlawful to intercept any communication in the course of
transmission without the consent of one of the parties or without lawful authority.
English law is unusual in that it makes a distinction between interception of
communications or traffic data (who called who, when and for how long) and content
(what was said). Traffic data also includes location data such as where a mobile
phone company holds records on which specific base station a given mobile was
registered at any one time. Some data held by ISPs or collectable by them is also
classified as “communications data”. Warrants for interception of content can be
issued only by the Home Secretary and are subject to various criteria, which include
“the interests of national security”, “for the purpose of preventing or detecting serious
crime” and “for the purpose of safeguarding the economic well-being of the United
Kingdom”. The Home Secretary has to be convinced that such interception of content
is necessary in relation to other possible means of obtaining the same information and
proportionate to the circumstances. Section 17 excludes content evidence from most
legal proceedings and also forbids any disclosure that interception of content has
taken place.42 Chapter II of RIPA 2000 (ss. 21–25) covers the circumstances in which
authorisations and notices to collect and disclose communications data are issued and
by whom. The grounds on which such authorisations and notices may be issued
include the following:
There is a lengthy and complex list of “designated persons” who can issue
authorisations, but such authorisations have to be necessary and proportionate to the
circumstances. There are arrangements to make payments to meet the cost of the
telecoms companies, etc.
42
At the beginning of 2008 the Government announced that it might consider changing the
admissibility rules about the content of traffic, but only in respect of terrorism offences and serious
crime and subject to a number of limitations. At the time of going to press a report has been published
- http://www.official-documents.gov.uk/document/cm73/7324/7324.asp - but the matter is still being
reviewed.
The scope for a private company to get access to records from a public
telecommunications service without the assistance of law enforcement or one of the
other agencies empowered under Part II of RIPA 2000 seems extremely limited.
In legal terms an ISP is for some of these functions a “common carrier”, in the same
way as a conventional telecoms company specialising in voice telephony. But for
other functions such as hosting websites, the ISP is more like a publisher.
Legal Issues
If ISPs operate in the UK, they can readily provide customers with their own personal
data that the ISP holds about them. But for most purposes, ISPs cannot supply data
on third parties other than against a proper authorisation under RIPA 2000 or an
explicit court order. Again, in relation to a website that an organisation may have had
hosted by an ISP, the ISP can provide the organisation with such web logs as it has
collected and the organisation is prepared to pay for. But logs from the websites of
third parties are unlikely to be available in the absence of authorisation under RIPA
2000.
Emails held on the ISP’s mail server computers will be regarded almost certainly as
being on a public telecommunications service for the purposes of RIPA 2000. To
obtain traffic data, law enforcement will require an appropriate authorisation under
Chapter II of RIPA 2000 but that evidence will be admissible. To get the content a
warrant signed by the Home Secretary will be necessary, and the material can only be
used for intelligence purposes but will not be admissible as evidence.
One route is simply to use the “Print” option within the browser. Most browsers will
not only print out what you can see on the screen but also provide a footer with details
of the URL (website and specific page) together with a day and time stamp. As with
other printouts, the result is better than nothing but also open to the charge of ease of
subsequent alteration. The same could be said of “saves” to disk. Both Microsoft
Internet Explorer and Mozilla Firefox gives options to save “Web Page Complete”
and “Web Page HTML only”, but here too, post-capture modification of content is
easy.
There are some important limitations that need to be considered. The first is that what
can be seen on screen is not necessarily what is currently on a remote site due to the
caches kept by ISPs and on Internet browsers. A further complication is that what is
being seen on screen may have been assembled from a number of sources and in quite
complex ways, as when the web designer has used “frames” or “cascading style
sheets”. Older web-capturing tools may fail to “get” every single element.
All this means that both web-capturing and writing accompanying witness statements
have to be carried out with some care in order to anticipate criticism.
The second limitation is that spidering only works when the webpages have fixed
content: that is, they exist as files on the remote website. But on many websites the
pages being seen are created “on-the-fly” against a specific request or in response to
specific circumstances – this is known as dynamic page creation. Examples include
the “results” pages created by search engines such as Google, the “welcome” page on
Amazon.com where, in response to a cookie on your computer, you are greeted by
name and with a list of uniquely personalised “recommendations” based on previous
purchases, as well as the accumulated shopping baskets that almost all e-commerce
pages have.
43
Http://www.bluesquirrel.com/products/webwhacker/. Other examples include Pagesucker:
http://www.pagesucker.com/ and Surfsaver: http://www.surfsaver.com/
44
Http://www.digital-detective.co.uk/intro.asp.
45
To prevent double-ordering, or the subsequent retrieval of sensitive financial information.
In terms of the overall reliability of web server logs, the following elements in a
witness statement may help to persuade a sceptical court:
• a description of the computer system’s overall functions and the role of the web server
within it;
• an account of how long the system in its present configuration has been in operation;
• what forms of testing took place prior to commissioning and what forms of routine
audit are in place;
• what external factors exist to act as a check on reliability;
• what security features exist and how they are managed (this is anticipates suggestion
that incriminating material was placed there by someone other than the suspect);
• whether other similar systems are in existence that have a good history of reliability;
• compliance with any external good practice or system audit standards.
In terms of the precise exhibit that is being produced, it is useful to be able to say:
• how the selection of the data in the exhibit was made and why it can be regarded as
“complete” in terms of the issues at hand;
• what procedures were used to collect the evidence such that it can be regarded as
free from tampering;
• what procedures were used to preserve the evidence so that it can be regarded as
free from subsequent tampering – this may take the form of imaging some computers
or copying selected files to write-once data media such as CD or DVD, or making a
digital fingerprint of the files;
• what manipulation or subsequent analysis was carried out to make the material
“easier to understand” – this is a perfectly legitimate course of action, but in this event
the original material should be exhibited so that the defence team can test the
manipulation or analysis.
Usually, admissibility of evidence will be on the basis that the material is a “business
record” as defined in is a “business record” as defined in s. 117 of the Criminal Justice
Act 2003.
For law enforcement it is possible to get a warrant for intrusive surveillance under
s. 26(3) of RIPA 2000. (edit note: problems with these two lines)
Section 32(3) sets out the circumstances in which such surveillance has to be
justified, and there are overarching tests of necessity and proportionality46. There are
a number of problems for law enforcement: it may wish to avoid disclosing its precise
methods and, although it is possible for law enforcement to approach a judge under
the public interest immunity agenda, this may be at the expense of not being able to
use the result of the intrusion.
CCTV equipment
Early forms of closed circuit television consisted of a low-cost, low resolution camera
linked by coaxial cable to a monitor; if it was desired to record activity, it was to a
tape-based machine, usually one which ran much more slowly than a conventional
VCR so that the tapes did not have too be changed too often. The use of hard-disk-
based recording has had many advantages: it is less prone to wear than tape, hard-disk
capacities permit long periods of usage, indeed a recorder can be set to re-use hard-
disk space automatically after, say, seven days of usage; time-codes are much easier
to enable – this is crucial if you want to examine activity at particular known points;
there are a wide variety of compression levels available depending on the desired
quality of the recorded video; multiplexing of several different cameras can take place
on just the one recording medium. More modern cameras can also use network
protocols and cables instead of coaxial cable; indeed they can use wireless networking
which greatly eases and reduces the cost of installation. Finally for more advanced
systems, once the video is in digital form, software can be used to analyse recorded
activity.
46
A code of practice can be found at: http://www.homeoffice.gov.uk/crimpol/crimreduc/regulation/
codeofpractice/surveillance/part1.html
Indeed one of the major problems faced by law enforcement is that, in a complex
enquiry, in order to follow the activities of people of interest, they require to look at
the recorded output of large numbers of different systems, all in different formats.
In order to ensure the evidential value of pictures, your CCTV system should meet the
following requirements:
• Before installing a CCTV system you should have a clear idea of what you
want the system to do and how it should perform (e.g. recognise the face of
someone walking through a doorway, or read a vehicle registration number).
• It should not be expected that enhancement features, such as zoom controls,
would provide extra detail. If you can't see it, then it's not fit for purpose.
• You should test the system using a volunteer etc.
• The quality of the recorded or printed pictures may differ from the live
display.
• Ensure the time and date on the system are correct.
• The quality of the pictures should not be compromised to allow more to be
squeezed onto the system.
• Regularly maintain all aspects of the system (e.g. camera focus, cleaning of
lenses, etc).
• A trained operator and simple user guide should be available to assist the
investigator in replay and export.
• Export of medium and large volumes of data can take a substantial period of
time. The operator should know the retention period of the system and
approximate times to export different amount data.
• If the software needed to replay the pictures is not included at export, the
police may have trouble viewing it. Export of a system event log or audit trail,
and any system settings with the pictures will help establish the integrity of the
pictures and system.
• The system needs to be capable of exporting small or large amounts of video
quickly without losing quality. An ideal solution for medium-to-large
downloads, would be for the system to have the facility to export to a 'plug-
and-play' hard drive.
• The system should not apply any compression to the picture when it is
exported as this can reduce the usefulness of the content.
• The replay software must allow the investigator to search the pictures
effectively and see all the information contained in the picture and associated
with it.
• It should be possible to replay exported files immediately, e.g. no re-indexing
of files or verification checks.
Legal Issues
The use of CCTV on employees falls squarely within the guidance given in Appendix
4 of this guide, which addresses the broad issues of employers’ rights to carry out
surveillance on their employees.
If the CCTV is aimed at non-employees including members of the public, the main
laws to worry about are Human Rights and Data Protection. The essence is that an
organisation has to be clear what the reasons are for the installation and to make sure
that the way the system is set-up does not cause any intrusion beyond that necessary
and proportionate to achieve those goals. Typical aims would be theft reduction and
public safety. But the privacy of individuals must still be respected. For example
In relation to the storage of cctv recordings in which people appear (including those
recordings in digital form), the standards used must be meet the eight data protection
principles as the video recordings will count as “personal data”: the data must be
If an entire computer or some item of data storage media (disks, tapes, etc.) are seized
and can be offered in court, they are admissible as “real evidence”. Anything derived
from this real evidence – printout, display, CDROM extracts, the product of analysis –
becomes a separate exhibit, admissible when the person who carried out the derivation
is present in court and can formally produce the exhibit and be cross-examined.
Up until April 2000 there was a separate admissibility regime for computer evidence
which required a certificate that the computer was operating properly and was not
used improperly, before any statement in a document produced by the computer could
be admitted in evidence (the former s. 69 of the Police and Criminal Evidence Act
1984). But today a presumption exists that the computer producing the evidential
record was working properly at the material time and that the record is therefore
admissible as real evidence. However, this presumption can be rebutted if evidence
casting doubt on its intrinsic reliability is adduced.. In this event it will be for the
party seeking to produce the computer record in evidence to satisfy the court that the
computer was working properly at the material time.
• the document was created or received by a person in the course of a trade, business,
profession or other occupation, or as the holder of a paid or unpaid office; and
• the information contained in the document was supplied by a person (whether or not
the maker of the statement) who had, or may reasonably be supposed to have had,
personal knowledge of the matters dealt with.
It then becomes admissible as “business document” for the purposes of s. 117 of the
Criminal Justice Act 2003. The court may make a direction if satisfied that the
statement's reliability as evidence for the purpose for which it is tendered is doubtful
in view of-
(a) its contents,
(b) the source of the information contained in it,
Expert evidence has been admissible in English law since 1782 and there are cases
going back to 1554. But “expert” for this purpose means the right of the witness to
offer opinions based on experience. This is distinct from the role of a forensic
technician who may have carried out a technical investigation or procedure and
simply reports factually on their findings. In the end it is for a judge to form a view of
the extent of any individual’s “expertise” and hence the territory over which opinions
can be offered.
A judge has general discretion to exclude any evidence which appears to be so unfair
(normally by reference to the way in which it was obtained) that it would have an
adverse effect on the fairness of the proceedings; s. 78 of the Police and Criminal
Evidence Act 1984). Normally, judges only make such exclusions on the application
of defence lawyers.
47
s 177(7)
48
More guidance on the US position can be found at:
http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.htm
49
Under CPR 33.5: http://www.justice.gov.uk/criminal/procrules_fin/contents/rules/part_33.htm
For example, this last covers the circumstances in which an interview takes place and
when a caution should be administered. Two other Acts are particularly important in
the IT domain:
Any action by an employer has to pass a test of “necessity” (there was no less
intrusive route) and “proportionality” (what was done was limited to what appeared to
be strictly proportionate to the circumstances – are you investigating stolen stationery
or substantial missing funds?).
In determining a legal policy for any form of surveillance, there are some general
principles from which the detail flows:
(a) he is a person with a right to control the operation or the use of the system; or
(b) he has the express or implied consent of such a person to make the interception.
50
The full text of the Regulations is available at : http://www.hmso.gov.uk/si/si2000/20002699.htm
51
Available at:
http://www.informationcommissioner.gov.uk/cms/DocumentUploads/ico_emppraccode.pdf
• increase trust in the workplace – there will be transparency about information held on
individuals, thus helping to create an open atmosphere where workers have trust and
confidence in employment practices;
• encourage good housekeeping – organisations should dispose of out-of-date
information, freeing up both physical and computerised filing systems and making
valuable information easier to find;
• protect organisations from legal action – it will help employers to protect themselves
from challenges against their data protection practices;
• encourage workers to treat customers’ personal data with respect – it will create a
general level of awareness of personal data issues, helping to ensure that information
about customers is treated properly;
• help organisations to meet other legal requirements – the Code is intended to be
consistent with other legislation such as the Human Rights Act 1998 and RIPA 2000;
• assist global businesses to adopt policies and practices that are consistent with
similar legislation in other countries – the Code is produced in the light of EC Directive
95/46/EC of 24 October 1995 on the protection of individuals with regard to the
processing of personal data and on the free movement of such data and ought to be
in line with data protection law in other European Union (EU) Member States;
• help to prevent the illicit use of information by workers – informing them of the
principles of data protection and the consequences of not complying with the Act
should discourage them from misusing information held by the organisation.
It says that any organisation that wishes to monitor electronic communications should
establish a policy on their use and communicate it to workers. Further detail in the
Code suggests specific elements of such a policy. Each specific act of monitoring
should be accompanied by a formal impact assessment, carried out by a group of
people able to look at all the likely implications.
The Computer Misuse Act 1990 refers to “unauthorised acts” of accessing computers
or modifying their contents. In a corporate situation, a business is normally
authorised to examine its own computers but the provisions of data protection and
human rights legislation still apply. A business is not authorised to access the
computers owned privately by its employees – these can include laptop computers,
Businesses should also consider creating formal records of decisions which might be
construed as impinging on the rights of employees, together with the reasoning behind
the decisions.
This appendix provides an outline of the law and the issues, but it is stressed that in
any individual situation, an organisation will need access to specific legal advice.
Criminal Procedure
The main current law is to be found in the Criminal Procedure and Investigations Act
1996 (CPIA 1996)52. There is also a Code of Practice issued under ss. 23 and 26 of
the Act. It replaces an earlier and simpler “materiality” or “relevancy” test which was
thought to be too vague and liable to abuse53. There is also in force a set of guidelines
prepared by the attorney-general54.
CPIA 1996 makes the investigator responsible for ensuring that any information
relevant to the investigation is retained, whether gathered in the course of the
investigation or generated by the investigation. The investigator is required to draw
the prosecutor’s attention to anything that might undermine the prosecution case.
When evidence is served it must be accompanied by a schedule of “unused material”
which the defence team can then ask to see, should it so wish. This is called “primary
disclosure”.
CPIA 1996 imposes on the defence the obligation to produce, in good time before
trial, a defence case statement indicating the broad bases upon which a charge is to be
challenged. Failure to do so may mean that late-announced defence arguments may
be disallowed by the judge at trial. Once the investigator has received the defence
case statement, they are under a duty to re-evaluate what has been in the primary
disclosure and advise the prosecutor of any further unused evidence which might now
undermine the prosecution case. In addition, the defence team can make specific
52
Http://www.hmso.gov.uk/acts/acts1996/1996025.htm. The Criminal Justice Act 2003 introduces a
number of amendments which emphasise the defence’s duties as well as the prosecutor’s duty of
continuing review of matters which might undermine their case and assist the defence.
53
R v Keane [1994] 1 W.L.R. 746; (1994) 99 Cr. App. R. 1.
54
Http://www.lslo.gov.uk/pdf/guidelines.pdf
The basis upon which a prosecutor can withhold disclosure is usually via the
mechanism of public interest immunity (PII). This usually takes the form of an
application by a prosecutor to a judge. Depending on the circumstances, it is possible
for a hearing to be ex parte – that is, without notifying the defence. The judge has to
weigh the balance between the dangers of disclosure against the need to ensure a fair
trial. It is almost never possible for a prosecutor to adduce evidence which has been
derived from material which is withheld from disclosure. Public interest immunity
simply excludes material which might be relevant to the defence’s case.
From the perspective of most commercial organisations, the main heading for
allowing “unused” material to be “sensitive”, and hence be excluded, is that the
material was “given in confidence”, but there is nothing automatic about this and a
judge may still order to disclose if it is believed necessary.
One route to limit disclosure that sometimes can be pursued fruitfully is to allow a
defence expert access to sensitive material, but against a formal written undertaking
that the sole purpose of such disclosure is for the immediate legal proceedings. If
necessary, a party from whom disclosure is required can ask that the expert’s
undertakings are covered by a court order. The effect of this is that any unauthorised
or ultra vires disclosure would be contempt of court.
55
http://www.cps.gov.uk/legal/section20/chapter_a.html
Procedures for cases of complex fraud may vary from this general explanation.
Civil Procedure
The general rules for the disclosure of “documents” in the English Civil Procedure are
to be found in Civil Procedure Rule 31. What is required to be disclosed is set out in
Civil Procedure Rule 31.6, which provides:
There is a duty of search in respect of standard disclosure that is set out in Civil
Procedure Rule 31.7, which provides:
(1) When giving standard disclosure, a party is required to make a
reasonable search for documents falling within rule 31.6(b) or (c).
(2) The factors relevant in deciding the reasonableness of a search include
the following–
(a) the number of documents involved;
(b) the nature and complexity of the proceedings;
(c) the ease and expense of retrieval of any particular document;
and
(d) the significance of any document which is likely to be located
during the search.
(3) Where a party has not searched for a category or class of document on
the grounds that to do so would be unreasonable, he must state this in
his disclosure statement and identify the category or class of document.
56
http://www.cps.gov.uk/legal/section20/chapter_g.html
57
Http://www.courtservice.gov.uk/cms/media/electronic_disclosure1004.doc
This appendix explains the main problems that corporate investigators may encounter
and the risks to - and obligations of - the organisation.
English law distinguishes between adult and child pornography and also between
material which is “obscene” and that which amounts to “extreme pornography”. For
this purpose a “child” is someone who is or appears to be under the age of 18 (s. 45 of
the Sexual Offences Act 2003).
In terms of adult material the test of obscenity is applied by a court. Section 1(1) of
the Obscene Publications Act 1959 states:
(1) For the purposes of this Act an article shall be deemed to be obscene if
its effect or (where the article comprises two or more distinct items)
the effect of any one of its items is, if taken as a whole, such as to tend
to deprave and corrupt persons who are likely, having regard to all
relevant circumstances, to read, see or hear the matter contained or
embodied in it.
In practice over the years, juries have become steadily more permissive and the
prosecution criteria have tended to move in step. There is no offence in possessing
such material, only if it is “published”. The test for publication is:
(3) For the purposes of this Act a person publishes an article who–
(a) distributes, circulates, sells, lets on hire, gives, or lends it, or offers
it for sale or for letting on hire; or
(b) in the case of an article containing or embodying matter to be
looked at or a record, shows, plays or projects it [, or, where the matter
is data stored electronically, transmits that data].
The Crown Prosecution Service tends to want strong prima facie evidence of
publication for gain, widespread offence being caused by virtue of public display, or
ease of access.
58
http://www.opsi.gov.uk/acts/acts2008/ukpga_20080004_en_9#pt5-pb1-l1g63
and a reasonable person looking at the image would think that any such person
or animal was real.
This is a “strict liability” offence. Strict liability means that there is enough to
convict, provided that a person is found in possession of offending material and that
they know that they are in possession. There are a small number of defences, which
the defendant has to prove to the court on the balance of probabilities. Further
guidance, published by the Ministry of Justice in November 2008, is available at:
http://www.justice.gov.uk/docs/extreme-pornographic-images.pdf
Child material is dealt with under the Protection of Children Act 1978 which creates
offences of “making” and “distributing” an indecent image of a child under the age of
18. The Court of Appeal has interpreted “making” to include the simple “making of a
copy” or even “causing a picture to appear on screen knowing that it was indecent”.
An important extension of the 1978 Act exists within s. 160 of the Criminal Justice
Act 1988. The effect of s. 160 of the Criminal Justice Act 1988 is that, as with
extreme pornography, it is a “strict liability” offence to possess “indecent” pictures
(i.e. of children in a sexual situation).
The combination of the strict liability offence of “possession” and the tight definition
of “making” have the potential to create significant difficulties for the organisation or
corporate investigator, who just wants to do the right thing.
Section 46 of the Sexual Offences Act 2003 provides a defence that a “making” was
necessary to do so for the purposes of the prevention, detection or investigation of
crime, or for the purposes of criminal proceedings. Section 46 works on a “reverse
burden of proof” basis. A defence is available where a person “making” such a
photograph or pseudo-photograph can prove that it was necessary to do so for the
purposes of the prevention, detection or investigation of crime, or for the purposes of
criminal proceedings. A memorandum of understanding between the Crown
Prosecution Service and the Association of Chief Police Officers dated 6 October
2004 provides guidance59. It seeks to protect those who genuinely come across such
59
See http://www.cps.gov.uk/publications/docs/mousexoffences.pdf
A further bit of advice is that it is prudent that all decisions made by a system
administrator and an organisation that finds itself unexpectedly handling indecent
material should keep careful and full records in internal minutes.
In due course it is likely that new guidance will be issued to cover the handling of
extreme pornography under s 63 of the Criminal Justice Act, 2008 but for the moment
it seems sensible to make the ACPO/CPS Guidance on indecent images of children
also apply to extreme pornography. Indeed the defences available under the 2008 Act
track closely those in s160 of the Criminal Justice Act 1988 which covers possession
of indecent images of children. For the moment the only specific official help is to be
found in the Ministry of Justice document referred to above.
There are three main circumstances in which encrypted material is found in corporate
investigations:
• The organisation itself uses encryption facilities in the course of its business.
In these circumstances the solution to decrypting often lies in the hands of the
organisation. However there may be obligations to third parties, such as
customers or clients etc). However some organisations use encryption the
passphrase for which changes with each session, but this usually applies to
encryption used in the course of transmitting data rather than for stored files
• Where an individual has used encryption for their own use and outside any
corporate framework
• When law enforcement in the course of an investigation requests access to
information that would normally be held in encrypted form
Decryption techniques:
It is beyond the scope of this guide to deal in any detail with methods of decrypting
encrypted files, but it may be helpful to understand some of the basic steps an
investigator will follow
The first step is to seek to identify the specific encryption product deployed. This can
usually be done by searching the associated PC – at the very least there has to be
software or hardware capable of encrypting and decrypting. The next step is to
determine the unique passphrase. There are a variety of methods; some encryption
systems have turned out to be inherently weak so that the vulnerabilities can be
exploited by specific software tools – many of these are available on the web. A
second approach is to use the so-called “dictionary attack” where a list of large
numbers of “typical” passwords are thrown at the encrypted file until one of them
works.
Although foremost is the minds of legislators was the situation of the individual PC
owner with a requirement for concealment – typical examples would be those
planning terrorist attacks and collectors of pictures of child sexual abuse – the
legislation also covers organisations that store and transmit encrypted information.
• That law enforcement would demand encryption keys which rendered into
plaintext not only the material covered by a warrant but other, innocent files,
including those which the organisation held in confidence
• That some encryption methods, particularly those used to transmit data,
involve the use of ever-changing session keys. As a result at any one time the
organisation would not know the key in use; the only way to provide
decrypted access to law enforcement might be to drop encryption altogether
• That they might receive an Order which while valid nevertheless involved
great cost and inconvenience and there would no way to negotiate an
alternative
In order to allay the anxieties of organisations, a Code of Practice has been issued:
Investigation of Protected Electronic Information 60
Public authorities seeking access must fulfil a number of requirements – for example
notices can only be issued by a restricted group of office holders, the information
sought must be identified as specifically as possible, all orders must satisfy necessity
and proportionality tests, explanations must be provided, and there should be
circumstances allowing the recipient of such a notice to discuss the precise means of
compliance – for example what information is actually needed in order to satisfy the
needs of an investigation.
60
http://security.homeoffice.gov.uk/ripa/encryption/
For businesses the problem remains that there may be a clash between existing
obligations of confidentiality and the receipt of an order to decrypt. In those
circumstances lawyers may advise a business to wait until there is judicial order
which they can say they were compelled to comply with.
61
Home Office press release 30 September 2009
62
Hansard 19 June 2008;
http://www.publications.parliament.uk/pa/cm200708/cmhansrd/cm080619/text/80619w0005.htm#0806
1980001736
63
http://www.cityoflondon.police.uk/NR/rdonlyres/3528E395-EDE9-4B8C-A8BA-
829C00982E0D/0/chequecreditcardfraudinvestigationFOI.pdf
64
http://www.mod.uk/DefenceInternet/AboutDefence/WhatWeDo/SecurityandIntelligence/MDPGA/Abo
utMinistryofDefencePolice.htm
65
http://www.soca.gov.uk/
/68 http://police.homeoffice.gov.uk/operational-policing/forensic-science-regulator
ISO 15489 is for any organisation that needs to ensure that its records (both paper and
electronic) are properly maintained, easily accessible and correctly documented from
creation right through to ultimate disposal, be it archiving, imaging or destruction.
The standard ensures that disposal is carried out in a transparent manner according to
pre-determined criteria. ISO 15489, which emerged from work done by the British
Standards Institute (BSI) in the 1990s (Code of Practice on 'Legal Admissibility and
Evidential Weight of Information Stored Electronically'- BSI PD0008), is directly
aimed at organisations that need to reassure customers and clients that they maintain
accurate, detailed records according to a stated policy, for example, the health,
financial services and state-funded sectors.
In its earliest form the Standard addressed a technology known variously as document
management systems or electronic records management. Many organisations were
scanning important paper documents – mortgages, insurance policies, cheques, etc. –
and placing them on optical media (in the mid-1990s this was on so-called Write
Once Read Many - WORM media) so that they could be stored and retrieved
efficiently and economically. The immediate problem was to take proper steps to
ensure that the results would be regarded as both reliable and admissible in court. BSI
PD000869 provided high-level guidance and the detail came in a workbook, PD000970.
The updated and international version appeared in 2001 as ISO 1548971. The
Standard provides a descriptive benchmark that organisations can use to assess their
record-keeping systems and practices. The two parts of the Standard are designed to
help organisations create, capture and manage full and accurate records to meet their
business needs and legal requirements, as well as to satisfy other stakeholder
expectations. Both parts apply to records in any format or media that are created or
received by any public or private organisation during the course of its activities.
69
Code of Practice for Legal Reliability and Evidential Weight of Information Stored Electronically,
available at: http://www.bsi-global.com/ICT/Legal/bip0008.xalter
70
See http://www.bsi-global.com/ICT/Legal/bip0009.xalter
71
Http://www.iso.ch/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=31908&ICS1=1
BS10008, which is specific to the UK, appeared in November 2008. It claims that
compliance “ensures that any electronic information required as evidence of a
business transaction is afforded the maximum evidential weight. The process is based
on the specification of requirements for planning, implementing, operating,
monitoring and improving the organization’s information management systems”. It is
a consolidation and updating of the work commenced under PD0008.72
72
http://www.bsigroup.com/en/Shop/Publication-Detail/?pid=000000000030172973#5
Many published surveys can be dismissed because the survey sample is too small or
unrepresentative. However, the following detailed studies are worth examining:
• Cyber Trust and Crime Prevention – a study by the Home Office and the
Department of Trade and Industry Foresight Team:
http://www.foresight.gov.uk/previous_projects/cyber_trust_and_crime_preven
tion/index.html
• The Future of Netcrime Now – a Delphi study by the Home Office:
http://www.crimereduction.gov.uk/internet01.htm
• Audit Commission ICT Fraud and Abuse Survey – http://www.audit-
commission.gov.uk/
• Computer Security Institute / Federal Bureau of Investigation Computer
Security Survey – http://www.gocsi.com/
The international standard for Information Security Management is ISO 17799, which
is based on BS 7799, available from http://www.bsonline.bsi-
global.com/server/index.jsp.
CPNI publishes a guidance document, Risk Management and accreditation of
information systems, which is also HMG Infosec Standard No 2. It is available for
download from http://www.cpni.gov.uk/docs/re-20050804-00653.pdf
A CSIRT will receive requests for assistance and reports of threats, attack, scans,
misuse of resources or unauthorised access to data and information assets. They will
analyse the report, determining what they think is happening and the course of action
to take to mitigate the situation and resolve the problem.
The following are some of the better-known products. It is not possible to make
effective use of them without proper training. Because of the rate of change in ICT,
products can rapidly become obsolete unless there are frequent new versions. Most
experienced digital forensic investigators will use a variety of tools.
• EnCase (http://www.guidancesoftware.com)
• AccessData FTK (http://www.accessdata.com)
• ProDiscover (http://www.techpathways.com)
• Sleuthkit and Autopsy (http://www.sleuthkit.org/)
• SMART (http://www.asrdata.com/index.html)
• Ilook (Law enforcement only) http://www.ilook-forensics.org/
• Blackbag (for Apple Mac) (http://www.blackbagtech.com/products.html)
• MacForesnsicsLab http://www.macforensicslab.com/
• Paraben (also for PDAs) (http://www.paraben-forensics.com/)
• Tucofs – website listing many tools (http://www.tucofs.com/tucofs.htm)
• Open Source tools (http://www.opensourceforensics.org/)
MEMBERS, GOVERNMENT
LIAISON PANEL
www.iaac.org.uk