Unit 4
Unit 4
4.1 INTRODUCTION
Computer forensics involves preserving, identifying, extracting, documenting, and interpreting electronic data for
legal evidence.
It focuses on investigating digital devices such as hard drives, disks, and tapes to uncover information related to
criminal activities.
Also referred to as computer forensic analysis, electronic discovery, and digital discovery.
Specialized tools and methodologies are used to retrieve deleted files, internet history, and emails from devices like
computers and smartphones.
Crucial for law enforcement and cybersecurity to identify and prosecute criminals involved in technology-based
crimes.
Plays a key role in criminal investigations, civil disputes, and employment-related matters.
Involves data recovery while adhering to legal compliance for evidence admissibility in legal proceedings.
Terms like digital forensics and cyber forensics are often used interchangeably with computer forensics.
Digital forensics starts with collecting information while preserving its integrity, followed by analysis to identify
alterations and responsible parties.
Cyber forensics, synonymous with computer forensics, aims to maintain evidence thread and documentation to
identify digital criminals.
Computer forensics can do the following:
It can recover deleted files, chat logs, e-mails, etc.
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
6. Reporting
After the analysis is done, a report is generated. The report may be in oral form or in written form or both. The report
contains all the details about the evidence in analysis, interpretation and attribution steps. As a result of the findings in this
phase, it should be possible to confirm or discard the allegations.
Some of the general elements in the report are:
Identity of the report agency
Case identifier or submission number
Case investigator
Identity of the submitter
Date of receipt
Date of report
Descriptive list of items submitted for examination
Identity and signature of the examiner
Brief description of steps taken during examination Results/conclusions
7. Testifying
This phase involves presentation and cross-examination of expert witnesses. An expert witness can testify in the form of:
Testimony is based on sufficient facts or data
Testimony is the product of reliable principles and methods
Witness has applied principles and methods reliably to the facts of the case
Precautions to be taken when collecting digital evidence are:
No action taken by law enforcement agencies or their agents should change the evidence
When a person to access the original data held on a computer, the person must be competent to do so
An audit trial or other record of all processes applied to digital evidence should be created and preserved
The investigator in charge bears ultimate responsibility for compliance with the law and established protocols.
3. Examination
The files obtained during the logical acquisition requires specific tools for decoding and viewing of their contents.
Once decoded, they provide a vast amount of user data such as call history, sent and received SMS, calendar events and
address book entries. For social media forensics examiners, they provide a huge bank of social networking footprints. These
artifacts are then examined and correlated to the actual case in hand.
Facebook Artifacts: Activity logs, Facebook archives, profile information, places visited, locations and geo-
locations, friends and family, applications, pages, groups, interests, text and links, the timestamp of all activities,
details of friends engaged in active chat sessions with the subject and much more.
Twitter Artifacts: User information, tweets posted, timestamps of the poster tweets, records of people followed by
the subject and their tweets along with timestamps.
Social Networking Applications & Mobile Devices
Due to the increasing use of social applications on smartphones, they are the biggest repertoire of evidence for
forensic investigators.
Did you know that more than 90% of social media users use mobile devices to access social networking platforms?
Thus, they store a lot of potential information that social media forensics professionals can extract with the right
tools.
Furthermore, with the right inspection methods and tools, such evidence can provide crucial leads in a case.
In fact, half of Facebook users access Facebook through its mobile applications on their smartphones or tablets.
Moreover, such users are twice as active compared to those who use other devices (desktop, laptop) to access
Facebook. Since millions of users leverage social networking applications on their mobile devices, the probability
of misuse is also quite high! Hence, a forensic analysis of the suspect's mobile device offers a great potential to aid
in his/her incarceration or exoneration.
Challenges of Forensic Analysis of Social Networking Applications on Mobile Devices
As much as the potential they have, smartphones also pose many challenges to social media forensics investigators.
Since smartphones are always active and regularly update data, it causes faster loss of evidence.
Secondly, the closed source OS of smartphones (except for Linux-based phones) make it difficult to extract
evidence using custom tools.
To make things worse for forensic examiners, smartphone vendors release OS systems very often. This makes it
challenging for social media forensics professionals to keep up with the latest tools and methods for examination.