Unit 02
Unit 02
ISM09204
Dr. Nicodemus M. M.
Digital Evidence
De nition
• Some of the popular electronic devices which are potential digital evidence
are: HDD, CD/DVD media, USB drive, biometric scanner, digital camera,
smart phone, smart card, PDA, etc.
fi
Digital Evidence
The Importance
• The digital evidence are used to establish a credible link between the
attacker, victim, and the crime scene.
• Consider the following hypothetical incident: a racist tweet was posted from a
Twitter account (Account A).
• The direct evidence is that Account A was used to post the racist tweet.
• The circumstantial evidence is that the account holder posted the tweet.
Locard’s Principle
• Only human failure to nd it, study and understand it, can diminish its value.
fi
Digital Footprint
• In the eld of computer forensics, digital traces are left behind as the result of
individuals' use of information and communication technology (ICT).
• Particularly, a person utilizing ICT can leave a digital footprint, which refers to
the data left behind by ICT users.
• Digital footprint can reveal information about them, including age, gender,
race, ethnicity, nationality, sexual orientation, thoughts, preferences, habits,
hobbies, medical history and concerns, psychological disorders, employment
status, a liations, relationships, geolocation, routines, and other activities.
• This data can also be used to prove or disprove a matter being asserted;
refute or support the testimony of a victim, witness, or suspect; and/or
implicate or exculpate a suspect of a crime.
Read this One
• The rule states that “the court prefers the original evidence at the trial rather than a copy”
• The rule was established to deter any alteration of evidence either intentionally or
unintentionally
• Each country has its own criminal investigations rules, regulations, and
procedures on how to process a crime scene.
fi
International Standards
ff
Collecting Volatile Evidence
• Volatile evidence should be collected based on the order of volatility; that is, the
most volatile evidence should be collected rst, and the least volatile should be
collected last.
- registers, cache
- routing table, ...[address resolution protocol or ARP] cache, process table,
kernel statistics, memory
- temporary le systems
- disk
- remote logging and monitoring data that is relevant to the system in question
- physical con guration, network topology
- archival media
Protocol: Guideline for Evidence Collection and Archiving
fi
fi
fi
Categories of Digital Evidence
• The rst type can be de ned as an any type of data that can be maintained
by the system and its components
• They are generated from computer processes or algorithms without user
intervention such as log les and noti cations triggered by management systems.
• Some records may contain both types, such as Microsoft Excel sheets
that contain computer-generated records such as a mathematical formula in a
spreadsheet and computer-stored records generated by the user.
fi
fi
fi
fi
First Responder
• First responders are the individuals who are rst on the scene of a digital
incident or crime.
• First responder must be prepared to collect the evidences from the crime
scene in a manner that is accepted by court.
• Do not shut-o or reboot the machine. This will erase all the valuable data
present in the volatile devices.
• Do not assume that any parts of the victim/suspicious computer are reliable.
• Take precautions and follow procedures otherwise may accidentally trigger
malware which will e ect/change/delete volatile data.
ff
ff