Unit 4
Unit 4
https://www.uspto.gov/sites/default/files/documents/List_of_Acceptable_I-9_Documents.pdf
Introduction to evidence acquisition
Evidence Based Acquisition (EBA) is a cost-effective way for academic, corporate
and government libraries to evaluate and acquire content that meets the
information needs of their users. With this acquisition model your library can
maximise the return on investment with making informed decision based on
usage.
Steps:
Identification->
Acquisition->
Labelling and Packaging->
Transportation->
Chain-of-Custody->
Importance of Document
and Preservation
Evidence Identification
what can be identified as digital evidence?
Digital evidence can be any information that is stored or transmitted in binary form that may be used
as evidence in court. This includes things like emails, text messages, social media posts, digital images
and videos, and more.
How to identify ?
Tools that can be used to create a forensic image of media. Some of the most popular ones include:
• FTK Imager
• Autopsy
• The Sleuth Kit
Evidence Identification
Abstract: In spite of growth in technology, Indian Judiciary system somehow lacks digitalization. In the
court trials cases, every argument by the lawyers, evidence presentation, witness/suspect cross
examination everything will be noted down by the stenographer and everyday hearings details will be
printed at the end of every court sessions. Therefore, the details about particular case will be in
physical files as well as in digital format and can be accessed whenever it is needed like in the situation
of case reopening. Data integrity is important in the judiciary system; when it comes to court cases,
evidence integrity must be protected because even little changes in the evidence can lead to false
judgments, and historical data is crucial. Where historical data archiving is necessary, Blockchain
technology is suited. In the modern era, Blockchain technology is regarded as more reliable
technology than any other. Blockchain technology can be used in the justice system to provide privacy
and integrity, as well as efficient auditability and traceability, for storing case records and evidences.
This research study has proposed a novel method using Inter Planetary File System distributed data
storage to store case details and evidences on top of the Ethereum Blockchain. The case details can be
stored using text and image files. The Ethereum smart contract is used for storing hash value of data in
the Blockchain. The storage and access of the data in InterPlanetary File System is studied and
explained using an experimental setting.
Recent Literatures about evidence examination
Abstract: In modern digital investigations, forensic sensitive information can be gathered from the
physical memory of computer systems. Digital forensic community feels the urge towards accurate
data collection, preservation, examination, validation, data analysis and presentation. This
investigative process has become an essential part of digital investigation. The extraction of
forensically relevant evidence from the physical memory can reveals users' actions. This research will
report the amount of evidence that can be extracted and how the evidence changes with the length of
time that the system is switched on and the application is still opened. In this experiment, the
quantitative assessment of user input on the most commonly used applications will be presented.
Recent Literatures about evidence examination
Abstract: It is becoming more and more common for criminals to use computers in the execution of a
crime and there are many ways of recovering information from an assortment of storage media to find
out what a computer has been used for. However, to do this, one must first know which computer has
been used; without a target machine it is very difficult to link a person with a crime. In perpetrating a
crime it is often only the output from a computer, in the form of a letter, set of accounts, counterfeit
document or pornographic picture, which is recovered by the investigator. Document examination
skills can be used to link these documents with a particular printer and thus lead to the computer that
has been used. By combining the sophisticated techniques of the computer analyst with the more
traditional skills of the document examiner, the Forensic Science Service has developed an
investigation unit capable of assisting in a wide range of circumstances from the initial discovery of a
crime to the presentation of evidence in court. The paper presents a survey of the types of evidence
that may be gained from the examination of documents produced by, or associated with computers.
Recent Literatures about evidence examination
Abstract: The presence of IM (Instant Messaging) applications can have a negative impact, one of
which is cybercrime. Its development is also accompanied by the development of operating systems
on mobile devices used, one of which is iOS. The research conducted not only analyzed digital
evidence but also compared the findings of digital evidence in WhatsApp, Telegram, and Messenger
IM applications based on iOS version 13.3 on two conditions (jailed and jailbreak). The NIST 800-101
Revision 1 method is used as a guide in conducting the forensic process. Data acquisition was carried
out using the Cellebrite UFED 4PC tool, data examination and data analysis were carried out using
Oxygen Forensic Detective, FTK Imager and Autopsy. The results of the analysis obtained are then
compared to the condition of the iPhone and the scenarios that have been executed. The results of
this study indicate that the condition of the iPhone that has been jailbroken greatly affects the findings
of digital evidence. WhatsApp digital evidence found on jailed iPhone devices has the same amount as
the jailbroken iPhone condition with a digital evidence finding value of 71.42%. Telegram obtains more
digital evidence with a digital evidence finding value of 71.42% on a jailbroken iPhone. The Messenger
application shows its significance to the digital found in a jailbroken iPhone which has a percentage
value of 85.71% digital discovery which is the largest value between WhatsApp and Telegram.
Recent Literatures about evidence examination
Abstract: The objects created by the operating system are known as artifacts, and they contain crucial
data about the actions taken by computer users. Thus, these artifacts are of great relevance to the
forensic analyst. These artifacts can act as a evidence in a court of law to prove the digital crime. Link
File or Shortcut file is one such object, presence of which confirms the usage of file in recent time. Link
File are links between the executable and the applications. In this work, Link File is forensically
analyzed and bring out its forensic value, knowledge it provides and perform few in-depth forensics
examinations on Link File useful for analyst using open source FTK Imager tool. Lastly, we compared
the Link File artifacts in various versions of Windows Operating System
Recent Literatures about evidence examination
Abstract: The examination of digital forensic evidence is a science highlighting the main areas of
progress in forensic science. Various social media sites (SNS) providing e-mail services, messages,
pictures, and videos have brought about a huge explosion in development. In recent times, Digital
Forensics has expanded to be used in all institutions and companies, especially financial companies,
pharmaceutical companies, and investment companies. With this electronic development, criminal
activities have dramatically increased to obtain and steal data for personal or international interests or
the so-called data theft. Therefore, the biggest challenge lies in protecting this information from theft
and searching for digital forensic evidence so that the digital evidence is correct and sound from a
forensic point of view. Against this, this paper provides a detailed review of the most important
Android applications in digital forensics to attain, retrieve, and compare information altogether.
Recent Literatures about evidence examination
Digital forensics: Electronic evidence collection, examination and analysis by using combine
moments in spatial and transform domain
Abstract: A novel digital forensics tool is developed by combining wavelet invariant with spatial
moments. A forensic printed circuit board image matching system is presented that is capable of
probing a large database of digital images of circuit boards and compare them for similarity to provide
investigation leads for electronic crimes digital forensic science investigations. The developed system
has been implemented, and proved to be very efficient in detection similarities between a target
image and a large image database even when the target image is noisy, scaled or mirrored.
Recent Literatures about evidence examination
Evaluation of Digital Evidence in Criminal Proceedings in Croatia with a Focus on Preservation Requirements
and Role of Standard Operative Procedures
Abstract: Collection and analysis of digital evidence in criminal proceedings entails risks, such as the
contamination of evidence during seizure and/or search of a computer system and the inability to establish its
authenticity, which may affect its admissibility and credibility before the courts. For that purpose the requirement
on digital evidence preservation is prescribed in the criminal procedure law, which should apply by default to all
relevant actors. Analysis of available court decisions and rules of the Criminal Procedure Act confirms that the
claims concerning mishandling and/or manipulation of digital evidence do not affect ex lege inadmissibility of
such evidence. Such claims would be subject to examination on the credibility (reliability) of evidence before the
courts. Any detailed technical procedures and measures to be implemented so as to ensure digital evidence
preservation are best suited for regulation by standard operative procedures or perhaps even by sub-legal acts. To
that effect, the standard operative procedures discussed in this paper have a proven ability to ensure the
common goal of ensuring digital evidence preservation. Adherence to best practices stemming from standardized
procedures has shown to be vital for ensuring that investigatory procedures and acquired digital evidence are
valid and as such accepted throughout the criminal proceedings.
Recent Literatures about evidence examination
Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
Abstract: Police investigations involving digital evidence tend to focus on forensic examination of
storage units on personal electronic devices (laptops, smartphones, etc). However, a number of factors
are making digital forensic tools increasingly ineffective: (i) storage capacities of electronic devices
have increased, and so has the amount of personal information held on them, (ii) cyber crimes are
increasingly committed on social media, and evidence of crimes are held on social media platforms,
not necessarily on personal devices, (iii) there is a greater need for protecting digital privacy, especially
when examining digital evidence from witnesses and victims of cyber crimes. These factors pose a
number of practical challenges for both law enforcement agencies and citizens when disclosing and
handling the digital evidence. This paper defines and illustrates the key challenges, and proposes the
concept of verifiable limited disclosure, which defines a communication protocol to ensure privacy,
continuity and integrity of digital evidence. More specifically, the protocol allows (i) citizens to decide
what evidence to disclose to law enforcement agencies and (ii) any of the two parties to be able to
prove any tampering of the disclosed evidence. The paper discusses methods for implementing the
communication protocol using standard security and privacy tools and presents a pathway to
evaluating their effectiveness.
Evidence Examination tools (selection criteria)
some of the best digital forensics and cybersecurity tools. In selecting from the
wide range of options, we considered the following criteria:
Affordability: Price may not indicate quality, but collaborative peer reviews can
be. Most of the tools below are open-sourced, and all are free and maintained by
a community of dedicated developers.
The analysis process includes identifying, preserving, and analyzing the evidence.
The goal is to determine what happened, how it happened, and who was involved.
The analysis process should be conducted in a controlled environment to ensure that
the integrity of the evidence is maintained.
+ experience required
Evidence Presentation (in the court)
Evidence presentation is the process of presenting evidence in a clear and concise
manner. The goal is to present the evidence in a way that is easy to understand
and that supports the conclusions that are being drawn.
The presentation of evidence can take many forms, including written reports,
photographs, videos, and charts. The presentation should be tailored to the
audience and should be presented in a way that is appropriate for the situation.
Evidence Acquisition process
What are write blockers?
A write blocker is any tool that permits read-only access to data storage devices without compromising the
integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of
custody.
Copy the URL and paste in browser, press enter, for more information
https://toolcatalog.nist.gov/search/index.php?all_tools=all&ff_id=1&1%5B%5D=any&2%5B%5D=any&3%5
B%5D=any&4%5B%5D=any&5%5B%5D=any&6%5B%5D=any&7%5B%5D=any&8%5B%5D=any&10%5B%5D
=any
https://toolcatalog.nist.gov/search/index.php?ff_id=1
Evidence Integrity
What is evidence integrity?
Evidential Integrity means the state whereby there is assurance, sufficient to satisfy any judicial assessment,
that Evidential Records have been correctly and lawfully generated and have not undergone unauthorised
amendment or been otherwise tampered with since their creation
Digital evidence integrity is ensured by calculating MD5 and SHA1 hashes of the extracted content and
storing it in a report along with other details related to the drive. It also offers an encryption feature to
ensure the confidentiality of the digital evidence.
Evidence is the key to solve any crime. Evidence integrity needs to be protected in order to make it admissible
in the court of law. Digital evidence is more revealing, but it is fragile; it can easily be tampered with or
modified. There are different techniques available to protect the integrity of digital evidence.
SOP
Standard Operating Procedures for Acquisitions and Preservation of Evidence.
https://citizen.goapolice.gov.in/web/guest/forensic-science-lab
https://keralapolice.gov.in/storage/pages/custom/ckFiles/file/7GafuMCjLbFgjBNh8aXz8WhLv2Zqtfczvbi7Uv6m.pdf
https://www.ojp.gov/pdffiles1/nij/254661.pdf
https://www.acq.osd.mil/asda/dpc/ce/cap/docs/piee/PIEE_Records_Retention_and_Destruction_SOP_2020
0615.pdf
https://rm.coe.int/3692-sop-electronic-evidence/168097d7cb
https://www.epa.gov/sites/default/files/2015-06/documents/g6-final.pdf
Introduction to Data Recovery and Carving
What is data recovery ?
Data recovery is the process of retrieving lost or deleted data from a storage
device. There are two types of data recovery techniques: software-based and
hardware-based.
Software-based techniques use utilities that can read and copy the data from the
problem storage.
Data carving is the forensic technique of reassembling files from raw data
fragments when no filesystem metadata is available. It is commonly used when
performing data recovery after a storage device failure. It may also be performed
on a core memory dump as part of a debugging procedure. Data carving allows for
detecting and recovering files and other objects based on filesystem contents
rather than a filesystem’s metadata and file structure
• Data carving is used when no filesystem metadata is available, while data recovery is used when the
data stored in a storage device cannot be accessed in a usual way.
• Data carving detects and recovers files and other objects based on filesystem contents rather than a
filesystem’s metadata and file structure, while data recovery retrieves lost or deleted data from a
storage device.
• Data carving is commonly used when performing data recovery after a storage device failure, while
data recovery can be performed with different tools, such as Disk Drill or Recuva.
• Data carving may also be performed on a core memory dump as part of a debugging procedure,
while data recovery success depends on the nature of the data loss and the timely application of the
right method.
• Data carving allows for detecting and recovering files and other objects based on filesystem contents
rather than a filesystem’s metadata and file structure, while data recovery can be software-based or
hardware-based.
• Data carving does not involve repairing or replacing the damaged parts of the device in a laboratory,
while data recovery involves repairing or replacing the damaged parts of the device in a laboratory.
Introduction to Data Recovery and Carving
Data Carving Methods
https://www.sciencedirect.com/science/article/pii/S2212017313003198