Cybercrime and Cyber-Terrorism: Module 4: Practical Aspects of Cybercrime Investigations
Cybercrime and Cyber-Terrorism: Module 4: Practical Aspects of Cybercrime Investigations
Cybercrime and Cyber-Terrorism: Module 4: Practical Aspects of Cybercrime Investigations
terrorism
Module 4: Practical Aspects of Cybercrime Investigations
Learning outcomes
• Identify, analyse, and critically assess legal and ethical obligations of
cybercrime investigators and digital forensics professionals
• Identify essential phases in the digital forensics process
• Articulate and critically evaluate the ways in which digital evidence is
identified, collected, acquired, and preserved
• Discuss and appraise the processes involved in digital evidence
analysis and the reporting of findings based on this analysis
• Explain and apply a framework for assessing the admissibility of
digital evidence in courts
Legal and ethical obligations
• Cybercrime investigators and digital forensics professionals should legally and ethically
investigate cybercrime, handle, analyse, and interpret digital evidence, and report
findings
• While legal obligations are prescribed by national, regional, and international law,
ethical obligations (wherever present) are self-imposed and/or prescribed by
government agencies and/or private professional organizations
• Where a code of ethics (i.e., guidelines covering right and wrong conduct to inform
decision-making) exists, it often includes what cybercrime investigators and/or digital
forensics professionals should do at all times and what these individuals should never
do under any circumstance
• For instance, the International Society of Forensic Computer Examiners (ISFCE) includes
a code of ethics for its members to abide by to ensure that standards are being met and
the results of the digital forensics process are accurate and trustworthy.
• This code of ethics includes the behaviours that members must engage in and
prohibited behaviours
Discussion
https://dfcb.org/code-of-ethics-and-standards-of-professional-conduct/
Discussion Questions
• What type of ethical conduct does the association, organization, or agency
prescribe?
• What type of unethical behaviour does it prohibit?
Handling of digital evidence
- Identification
- Collection
- Acquisition
- Preservation
- Analysis and Reporting
• Digital evidence is volatile and fragile, and the improper handling of
this evidence can alter it.
• Because of its volatility and fragility, protocols need to be followed to
ensure that data is not modified during its handling (i.e., during its
access, collection, packaging, transfer, and storage).
• These protocols delineate the steps to be followed when handling
digital evidence. There are four phases involved in the initial handling
of digital evidence: identification, collection, acquisition, and
preservation
There are protocols for collecting volatile evidence. Volatile evidence should be
collected based on the order of volatility; that is, the most volatile evidence
should be collected first, and the least volatile should be collected last. RFC 3227
document provides the following sample of the order of volatile data (from most
to least volatile) for standard systems:
• registers, cache
• routing table, [address resolution protocol or ARP] cache, memory
• file systems
• disk
• remote logging and monitoring data that is relevant to the system in question
• physical configuration, network topology
• archival media
Identification Phase
Preliminary information is obtained about the cybercrime case prior to
collecting digital evidence. This preliminary information is similar to
that which is sought during a traditional criminal investigation. The
investigator seeks to answer the following questions:
• Who was involved?
• What happened?
• When did the cybercrime occur?
• Where did the cybercrime occur?
• How did the cybercrime occur?
• May use traditional investigative techniques especially w.r.t. information and
evidence gathering. For example, victims, witnesses, and suspects of a
cybercrime are interviewed to gather information and evidence of the cybercrime
under investigation
• Undercover law enforcement investigations have also been conducted to identify,
investigate, and prosecute cybercriminals
• The use of covert surveillance measures involves a careful balancing of a
suspect's right to privacy against the need to investigate serious criminality.
Provisions on covert surveillance should fully respect “the rights of the suspect”.
• Even malware has been used by law enforcement agencies to conduct
surveillance in order to gather information about and evidence of cybercrime. For
example, US law enforcement agencies are using networking investigation
techniques (NITs), "specially designed exploits or malware," in their investigations
of online child sexual exploitation and abuse.
• Before digital evidence collection begins, the investigator must define the types
of evidence sought.
• Digital evidence can be found on digital devices, such as computers, external hard
drives, flash drives, routers, smartphones, tablets, cameras, smart televisions,
Internet-enabled home appliances (e.g., refrigerators and washing machines),
gaming consoles, public resources (e.g., social media platforms, websites, and
discussion forums) and private resources (e.g. Internet service providers logs of
user activity; communication service providers business records; and cloud
storage providers records of user activity and content).
• Users' data can be stored wholly or in fragments by many different cloud service
providers in servers in multiple locations. Retrieving data from these providers is
challenging.
Collection
• With respect to cybercrime, the crime scene is not limited to the physical location of
digital devices used in the commissions of the cybercrime and/or that were the target of
the cybercrime.
• The cybercrime crime scene also includes the digital devices that potentially hold digital
evidence, and spans multiple digital devices, systems, and servers.
• The first responder identifies and protects the crime scene from contamination and
preserves volatile evidence by isolating the users of all digital devices found at the crime
scene (e.g., holding them in a separate room or location).
• The users must not be given the opportunity to further operate the digital devices.
Neither should the first responder nor the investigator seek the assistance of any user
during the search and documentation process.
• The investigator, if different from the first responder, searches the crime scene
and identifies the evidence.
• Before evidence is collected, the crime scene is documented. Documentation is
needed throughout the entire investigative process (before, during, and after the
evidence has been acquired). This documentation should include detailed
information about the digital devices collected, including the operational state of
the device - on, off, standby mode - and its physical characteristics, such as make,
model, serial number, connections, and any markings or other damage.
• In addition to written notes, sketches, photographs and/or video recordings of the
crime scene and evidence are also needed to document the scene and evidence
• The investigator collects the evidence. The collection procedures vary depending
on the type of digital device, and the public and private resources where digital
evidence resides (e.g., computers, phones, social media, and cloud; for different
digital forensics practices pertaining to multimedia, video, mobile).
• Law enforcement agencies have standard operating procedures that detail the
steps to be taken when handling digital evidence on mobile devices, Internet-
enabled objects (e.g., watches, fitness trackers, and home appliances), the cloud,
and social media.
• A standard operating procedure (SOP) is designed to assist investigators by
including the policies and sequential acts that should be followed to investigate
cybercrime in a manner that ensures the admissibility of collected evidence in a
court of law, as well as the tools and other resources needed to conduct the
investigation SOPs include the processes to be followed during an investigation.
• Unique constraints that could be encountered during the investigation should be
identified. For instance, cybercrime investigators could encounter multiple digital
devices, operating systems, and complex network configurations, which will
require specialized knowledge, variations in collection procedures, and assistance
in identifying connections between systems and devices.
• Anti-forensics techniques such as steganography and encryption could also be
encountered during an investigation. Because of this, the investigator should be
prepared for these situations and have the necessary human and technical
resources needed to deal with these constraints.
• The actions taken by the investigator in these cases (e.g., the ability of the
investigator to obtain the passwords to those devices and/or decrypt the files), if
any, depends on various factors.
• Digital forensics can assist in this endeavour. Examples of such tools include
Forensic Toolkit (FTK) by Access Data, Volatile Framework, X-Ways Forensics.
• Along with these resources, a forensic toolkit is needed, which contains the
objects needed to document the crime scene, tools need to disassemble devices
and remove other forms of evidence from the crime scene, and material needed
to label and package evidence (e.g., for smartphones, a Faraday bag, which blocks
wireless signals to and from the digital device, and a power bank are needed).
• The actual collection of the evidence involves the preservation of volatile
evidence and the powering down of digital devices.
• For instance, if a computer is encountered, if the device is on, volatile evidence
(e.g., temporary files, register, cache, and network status and connections) is
preserved before powering down the device and collecting it.
• If the device is off, then it remains off and is collected.
• There are circumstances where digital devices will not and cannot be collected
(e.g., due to size and/or complexity of the systems and/or their hardware and
software configurations, because these systems provide critical services). In these
situations, volatile and non-volatile data are collected through different
procedures that require live acquisition.
• In addition to digital devices, other relevant items (e.g., notes and/or notebooks
that might include passwords or other information about online credentials,
telephones, fax machines, printers, routers, etc.) should be collected as well.
• The actions taken by the investigator during the collection of evidence should be
documented. Each device should be labelled (along with its connecting cables
and power cords), packaged, and transported back to a digital forensics.
• Once the items are transported to the laboratory, they are "inventoried,
recorded, and secured in a locked room…away from extreme temperatures,
humidity, dust, and other possible contaminants"
Discussion
Standard Operating Procedures
• Find the standard operating procedures (SOPs) relating to digital evidence of law
enforcement agencies in Bangladesh(?)/India
• SOP of India
https://indianrailways.gov.in/railwayboard/uploads/directorate/security/downloads/2019/
SOP%20on%20Cyber%20Investigation%20Techniques.pdf
Discussion Questions
• What was included in the SOP?
• What digital handling procedures were covered?
• Were any unique constraints that could be encountered during the investigation covered
in the SOP? If so, which ones?
Acquisition
• The approach taken depends on the type of digital device. For example, the procedure
for acquiring evidence from a computer hard drive is different from the procedure
required to obtain digital evidence from mobile devices, such as smartphones.
• Unless live acquisition is performed, evidence is extracted from the seized digital devices
at the forensic laboratory (i.e., static acquisition). At the forensics laboratory, digital
evidence should be acquired in a manner that preserves the integrity of the evidence.
• To achieve this, the tools and techniques used to acquire digital evidence must prevent
alterations to the data or when this is not possible, at the very least minimize them.
• The tools and techniques used should be valid and reliable.
• The limitations of these tools and techniques should be identified and considered before
their use.
• The US National Institute of Standards and Technology has a searchable digital forensics
tools database with tools with various functionalities.
• The seized digital devices are considered as the primary source of
evidence- data is not acquired from the primary source.
• A duplicate is made of the contents of that device and the analyst works on
the copy. This duplicate copy of the content of the digital device ( imaging)
is created before a static acquisition is conducted to maintain the integrity
of digital evidence.
• To verify whether the duplicate is an exact copy of the original, a
cryptographic hash value is calculated for the original and duplicate; if they
match, the copy's contents are a mirror image (i.e., duplicate) of the
original content.
• A write blocker, which is designed to prevent the alteration of data during
the copying process, should be used before extraction whenever possible
in order to prevent the modification of data during the copying process.
• The acquisition process described above applies mainly to computers.
• When acquiring data from devices where the memory storage cannot be
physically separated from the device to make an image, a different
procedure is followed.
Two types of extraction performed: physical and logical.
• Physical extraction involves the search for and acquisition of evidence
from the location within a digital device where the evidence resides,
such as the hard drive of a computer.
• A physical extraction may be conducted using keyword searches
(based on terms provided by the investigator), file carving (i.e., search
"based on the header, footer, and other identifiers"), and by
examining unallocated space (i.e., space available on a system
because it was never used or because the information in it was
deleted) and partitions, which separates segments of the hard drive
from each other.
Two types of extraction performed: physical and logical.
• Logical extraction involves the search for and acquisition of evidence
from the location it "resides relative to the file system of a computer
operating system, which is used to keep track of the names and
locations of files that are stored on a storage medium such as a hard
disk".
• The type of logical extraction conducted depends on the digital
device, file system, applications on the device, and operating system.
• A logical extraction involves the acquisition of data from active and
deleted files, file systems, unallocated and unused space, and
compressed, encrypted, and password protected data.
• The entire acquisition process should be documented.
• This documentation should include
• detailed information about the digital devices from which evidence was
extracted,
• the hardware and software used to acquire the evidence,
• the manner in which the evidence was acquired (i.e., how it was
obtained),
• when, where, and why it was obtained,
• what evidence was obtained, and
• for what reason it was obtained
Preservation