Module 5
Module 5
The forensic examination of computers, and data storage media, is a complicated and
highly specialized process. The results of forensic examinations are compiled and
included in reports. In many cases, examiners testify to their findings, where their skills
and abilities are put to ultimate scrutiny.
Computer is either the subject or the object of cybercrimes or is used as a tool to commit a
cybercrime. Computer intrusion and fraud committed with the help of computers were the
first crimes to be widely recognized as a new type of crime.
Computer forensics experts need digital evidence in cases involving data acquisition,
preservation, recovery, analysis and reporting, intellectual property theft, computer
misuse, corporarte policy violation, mobile device (PDA, cell phone) data acquisition
and analysis, malicious software/application, system intrusion and compromise,
encrypted, deleted and hidden files recovery, pornography, confidential information
leakage, etc.
Computer forensics is still a relatively new discipline in the domain of computer security.
It is a rapid growing discipline and a fast growing profession as well as business. The
focus of computer forensics is to find out digital evidence - such evidence required to
establish whether or not a fraud or a crime has been conducted.
There is a difference between computer security and computer forensics. Although
"computer forensic' often associated with "computer security," the two are different.
Digital forensics is the application of analyses techniques to the reliable and unbiased
collection, analysis, interpretation and presentation of digital evidence.
The objective of "cyber forensics" is to provide digital evidence of a specific or general
activity. Following a two more definitions worth considering:
1. Computer forensics: It is the lawful and ethical seizure, acquisition, analysis, reporting and
safeguarding of data and metadata derived from digital devices which may contain
information.
In other words, it is the collection of techniques and tools used to find evidence it computer.
2. Digital forensics: It is the use of scientifically derived and proven methods toward the
preservation, collection, validation, identification, analysis, interpretation, documentation and
presentation of aged evidence.
The media, on which clues related to cybercrime reside, would vary from case to case. There
are many challenges for the forensics investigator because storage devices are getting
miniaturized due to advances in electronic technology; for example, external storage devices
such as mini hard disks (pen drives) are available in amazing shapes.
Looking for digital forensics evidence (DFE) is like looking for a needle in the haystack.
Here is a way to illustrate why there is always the need for forensics software on suspect
media - the capacity of a typical regular hard disk is 500 GB (gigabytes). In an A4 size page,
there are approximately 4, 160 bytes (52 lines × 80 Characters = 4,160 bytes assuming 1 byte
per character). This is equivalent to 4 KB (kilobytes). An A4 size of paper sheet has thickness
of 0.004 inches. Data of 4 MB (megabyte; 1,000 times of 4 KB) when printed on A4 size of
paper would be 4 inches thick. Data of 4 GB if printed on A4 sheet would be 4,000 inches,
that is, 1,000 times of
4 MB. This would turn out to be 4 inches thick. The printout of 500 GB would be 500,000
inches! It would be virtually impossible to "retrieve" relevant forensics data from this heap!!
There comes the help from forensics software- it helps sieve relevant data from the irrelevant
mass.
There are many forms of cybercrimes: sexual harassment cases - memos, letters, E-Mails;
obscene chats or embezzlement cases - spreadsheets, memos, letters, E-Mails, online banking
information; corporate espionage by way of memos, letters, E-Mails and chats; and frauds
through memos,
letters, spreadsheets and E-Mails. In case of computer crimes/cybercrimes, computer
forensics helps.
Computer forensics experts know the techniques to retrieve the data from files listed in
standard directory search, hidden files, deleted files, deleted E-Mail and passwords, login
IDs, encrypted files, hidden partitions, etc. Typically, the evidences reside on computer
systems, user created files, user protected files, computer created files and on computer
networks.
There are number of contexts involved in actually identifying a piece of digital evidence:
1. Physical context: It must be definable in its physical form, that is, it should reside on a
specific piece of media.
2. Logical context: It must be identifiable as to its logical position, that is, where does it
reside relative to the file system.
3. Legal context: We must place the evidence in the correct context to read its meaning. This
may require looking at the evidence as machine language, for example, American Standard
Code for Information Interchange (ASCII).
Following are some guidelines for the (digital) evidence collection phase:
1. Adhere to your sites security policy and engage the appropriate incident handling and law
enforcement personnel.
2. Capture a picture of the system as accurately as possible.
3. Keep detailed notes with dates and times, notes and printouts should be signed and dated.
4. Note the difference between the system clock and Coordinated Universal Time.
5. Be prepared to testify (perhaps years later) outlining all actions you took and at what times.
Detailed notes will be vital.
12. You should make a bit-level copy of the systems media. If you wish to do forensics
analysis out should make a bit-level copy of your evidence copy for that purpose, as your
analysis will almost certainly alter file access times. Try to avoid doing forensics on the
evidence copy.
Digital evidence is present in nearly every crime scene. That is why law enforcement must
know how to recognize, seize, transport and store original digital evidence to preserve it for
forensics examination.
The cardinal rules to remember are that evidence
1. is admissible;
2. is authentic;
3. is complete;
4. is reliable;
5. is understandable and believable.
The investigator must be properly trained to perform the specific kind of investigation that is
at hand. Tools that are used to generate reports for court should be validated. There are many
tools to be used in the process.
One should determine the proper tool to be used based on the case. Broadly speaking, the
forensics life cycle involves the following phases:
1. Preparation and identification;
2. Collection and recording;
3. Storing and transporting;
4. examination/investigation;
5. Analysis, interpretation and attribution;
6. Reporting;
7. Testifying.
In order to be processed and applied, evidence must first be identified as evidence. It can
happen that there is an enormous amount of potential evidence available for a legal matter,
and it is also possible that the vast majority of the potential evidence may never get
identified.
Evidence of an activity that caused digital forensics evidence to come into being might be
contained in a time stamp associated with a different program in a different computer on the
other side of the world that was offset from its usual pattern of behaviour by a few
microseconds.
If the evidence cannot be identified as relevant evidence, it may never be collected or
processed at all, and it may not even continue to exist in digital form by the time it is
discovered to have relevance.
Reporting
Once the analysis is complete, a report is generated. The report may be in a written form or
an oral testimony or it may be a combination of the two. Finally, evidence, analysis,
interpretation and attribution must ultimately be presented in the form of expert reports,
depositions and testimony.
The following are the broad-level elements of the report:
1. Identity of the reporting agency;
2. Case identifier or submission number;
3. Case investigator;
4. Identity of the submitter;
5. Date of receipt;
6. Date of report;
7. Descriptive list of items submitted for examination, including serial number, make and
model;
8. Identity and signature of the examiner;
9. Brief description of steps taken during examination, such as string searches, graphics
image searches and recovering erased files;
10. results/conclusions.
Testifying
This phase involves presentation and cross-examination of expert witnesses. Depending on
the country and legal frameworks in which a cybercrime case is registered, certain standards
may apply with regard to the issues of expert witnesses. Digital forensics evidence is
normally introduced by expert witnesses except in cases where non-experts can bring clarity
to non-scientific issues by stating what they observed or did.
A witness qualified as an expert by knowledge, skill, experience, training or education may
testify in the form of an opinion or otherwise if
(a) The testimony is based on sufficient facts or data,
(b) The testimony is the product of reliable principles and methods,
(c) The witness has applied the principles and methods reliably to the facts of the case.
Network Forensics
Network forensics is the study of network traffic to search for truth in civil, criminal and
administrative matters to protect users and resources from exploitation, invasion of privacy
and any other crime fostered by the continual expansion of network connectivity.