Module 4
Module 4
Digital Forensics
and
People, Process, and Technologies to Defend the Enterprise
and Investigations
Digital forensics has been a discipline of Information Security for decades now.
Taking a step back, the book outlines the importance of integrating and accounting for
the people, process, and technology components of digital forensics. In essence, to
establish a holistic paradigm—and best-practice procedure and policy approach—
to defending the enterprise. This book serves as a roadmap for professionals to
successfully integrate an organization’s people, process, and technology with other
key business functions in an enterprise’s digital forensic capabilities.
Selling Points:
• Details the people, process, and technology requirements for integrating digital
forensic capabilities throughout the enterprise
Jason Sachowski
K32256
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
an informa business New York, NY 10017
2 Park Square, Milton Park
w w w. c r c p r e s s . c o m Abingdon, Oxon OX14 4RN, UK
Jason Sachowski
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Preface.................................................................................................................xi
Acknowledgments.............................................................................................xiii
About the Author............................................................................................... xv
Introduction.....................................................................................................xvii
v
vi ◾ Contents
Legal Considerations.................................................................................129
Summary..................................................................................................130
Resources..................................................................................................130
Glossary....................................................................................................131
8 Cloud Computing Enablement............................................................133
Brief History of Cloud Computing...........................................................133
What is Cloud Computing?......................................................................134
Persistent Threats and Challenges..............................................................137
Cloud Computing Governance.................................................................139
Enterprise Management Strategies.............................................................141
Cloud Computing Process Methodology...................................................147
Legal Considerations.................................................................................153
Summary..................................................................................................154
Resources.................................................................................................. 155
Glossary.................................................................................................... 155
9 Combatting Antiforensics...................................................................157
What Are Antiforensics?............................................................................157
Traditional Techniques..............................................................................158
Detection Methods...................................................................................167
Strategic Countermeasures........................................................................171
Summary..................................................................................................172
Resources..................................................................................................172
Glossary....................................................................................................173
10 Digital Evidence Management............................................................175
Types of Digital Evidence..........................................................................175
Evidence Gathering Considerations..........................................................182
Cause and Effect.......................................................................................186
Data Security Requirements......................................................................188
Preservation Strategies...............................................................................191
Enterprise Log Management.....................................................................196
Summary..................................................................................................200
Resources..................................................................................................200
Glossary....................................................................................................201
11 Digital Forensic Readiness..................................................................203
Forensic Readiness 101.............................................................................203
Cost versus Benefit....................................................................................204
Ten Steps to Forensic Readiness................................................................205
Achieving Forensic Readiness....................................................................216
Summary..................................................................................................216
Glossary....................................................................................................217
Section IV APPENDIXES
Appendix A: Investigative Process Models...................................................295
[P01] Computer Forensic Investigative Process (1995)..............................297
[P02] Computer Forensic Process Model (2001).......................................297
[P03] Digital Forensic Research Workshop (DFRWS) Investigative
Model (2001)............................................................................................298
[P04] Scientific Crime Scene Investigation Model (2001).........................298
[P05] Abstract Model of the Digital Forensic Procedures (2002)...............298
[P06] Integrated Digital Investigation Process (2003)...............................299
[P07] End-to-End Digital Investigation (2003).........................................299
[P08] Enhanced Integrated Digital Investigation Process (2004)...............300
[P09] Extended Model of Cybercrime Investigation (2004)......................300
[P10] A Hierarchical, Objective-Based Framework for the Digital
Investigations Process (2004)....................................................................301
Section V TEMPLATES
Template A: Investigator Logbook...............................................................323
Template B: Chain of Custody��������������������������������������������������������������������325
Bibliography.................................................................................................329
Index�����������������������������������������������������������������������������������������������������������337
9781138720930_C000.indd Page x 12/04/18 12:27 PM
Preface
At the beginning of all experimental work stands the choice of the appropriate technique
of investigation.
xi
I would like to most of all thank my wife and my children for showing me that no
matter what I do in my lifetime, they will always be my greatest success.
Thank you to my parents for providing me with countless opportunities to
become who I am today and for encouraging me to keep pushing my boundaries.
Thank you to my colleagues for allowing me the honor to work with you and
for the infinite wisdom and knowledge you have given me.
Lastly, thank you to Blair for opening doors.
xiii
xv
9781138720930_C000.indd Page xvi 12/04/18 12:27 PM
Introduction
Since the digital forensic profession was formalized as a scientific discipline decades
ago, its principles, methodologies, and techniques have remained consistent despite
the evolution of technology and can ultimately be applied to any form of digital
data. Within a corporate environment, digital forensic practitioners are often relied
upon to maintain the legal admissibility and forensic viability of digital evidence in
support of a broad range of different business functions.
xvii
◾◾ Are employed, both directly and indirectly, in the digital forensic profession
and are working to expand their organization’s digital forensic capabilities
◾◾ Are employed in the information security profession and are interested in
either (1) becoming directly involved in the digital forensic profession or
(2) enhancing their organization’s defenses
◾◾ An academic scholar pursuing nontechnical, business knowledge about digi-
tal forensics to provide them with education to become employed in the digi-
tal forensic profession
The use of technology in criminal activities has evolved significantly over the past
50 years. With this evolution, the digital forensic profession was born through the
work of pioneers who strived to expand their interest in technology advancement
into what is now a well-established and recognized professional discipline.
Because of their work, digital forensics has become a profession that strictly fol-
lows forensic science disciplines consisting of the best practices of proven method-
ologies, techniques, and principles. Applying these best practices and the ability to
make use of them within an organization provides an additional defense-in-depth
layer to ensure that digital evidence is forensically viable in a court of law. In other
words, digital forensics is the application of science to law.
Organizations that demonstrate a good understanding of the requirements for
implementing digital forensic capabilities within their environment are much better
equipped to gather and process digital evidence in line with the legal requirements
for prosecuting criminals. However, if these requirements are ignored or otherwise
not followed, not only do organizations run the risk of digital evidence being either
compromised, lost, or overlooked, but also that it will not be admissible in a court
of law based on concerns about integrity or authenticity.
Even though legal prosecution might not be the end goal, such as cases where
an employee has violated a corporate policy, there is always the potential that some
form of disciplinary action will take place, such as employment termination. In
all cases, it is fundamentally important that organizations consistently follow the
digital forensic best practices because evidence used during an investigation may
wind up in a court of law.
In this section, we will look at the principles, methodologies, and techniques
applied unanimously throughout the digital forensic discipline, and the best prac-
tices that organizations must adhere to.
Introduction to
Digital Forensics
The profession now commonly referred to as digital forensics was once made up of
unstructured processes; custom, home-grown toolsets; and knowledge based on
the collective work of hobbyists. Over the past 50 years, the digital forensic profes-
sion evolved alongside advancements in technology to become a mature discipline
where a common body of knowledge (CBK)1 made up of proven scientific prin-
ciples, methodologies, and techniques brought about a level of standardization and
formal structure to the profession.
Preface (1960–1980)
From the 1960s forward until the mid-1980s, computer systems were predomi-
nantly used to perform data-processing operations and were not typically connected
Infancy (1980–1995)
When the personal computer (PC) made its debut, there was a sudden burst of
interest in computer systems that incited hobbyists to get a better understanding of
how the internal components of these technologies worked. Among these hobby-
ists were individuals from law enforcement, government agencies, and corporations
who started sharing what they had learned about technology and what informa-
tion could be extracted. These individuals are considered the pioneers of computer
forensics, as the field was initially known.
It was during this era that government agencies came to realize that the skilled
individuals who were assisting them with technology-related investigations needed
better and more formalized training, better structure in the processes they fol-
lowed, and better tools. In one stream, development of software-based programs,
like Maresware or AccessData, emerged with capabilities to facilitate specific digital
forensic activities (i.e., forensic imaging). In another stream of work, several agen-
cies built small groups of specialized and trained individuals who would be used
to gather evidence from computer systems to be used in legal proceedings. One of
the earliest groups created was the Federal Bureau of Investigation (FBI) Computer
Analysis Response Team (CART), established in 1984.
This structure is primarily attributed to the collective efforts of the pioneers
who brought about a new level of acceptable procedures, specialty-built tools, and
improved education and training. This era is when ad hoc efforts transitioned into
a structured state to address technology-related investigations.
Childhood (1995–2005)
Starting in 1995, new technical working groups (TWG) and scientific working
groups (SWG) followed the lead of the FBI CART with the goal of creating a
CBK of principles, methodologies, and techniques that could standardize and
bring about further formal structure to computer forensics. Work done by the
Scientific Working Group on Digital Evidence (SWGDE), in collaboration with
Adolescence (2005–2015)
In 2008 the American Academy of Forensic Sciences (AAFS) responded to the
scrutiny by creating the Digital and Multimedia Sciences (DMS) section, which led
to major advancements by providing a common foundation by which groups can
share knowledge and resolve digital-forensic challenges.
With the expanding scope of digital forensics, both academic curriculum and
professional certification programs were offered to educate, train, and accredit
professional knowledge and experience in the field. Likewise, digital forensic tools
underwent a major evolution away from the home-grown applications into feature-
robust and enterprise-capable commercial software suites that not only supported
digital forensics, but also provided functionality to the fields of incident response,
electronic discovery (eDiscovery), and information governance.
Today, what started out as the pastime of hobbyists has arrived at a point of conver-
gence between various law enforcement agencies, organizations large and small, and
several intelligence agencies where well-established best practices u niversally follow
consistent and scientifically proven principles, methodologies, and techniques. This era
is defined as enhancing the structure of digital forensics into an enterprise state.
One thing for certain is that the digital-forensic CBK will continue to develop
and mature. At the end of the day, practitioners of the future will be better edu-
cated and trained because they have decades of knowledge from every individual
who has contributed before them. On the other hand, future technology
advancements will respectively introduce unique challenges that the digital-
forensic community will need to address. Two examples of where the future of
digital forensics will see development are cloud and quantum computing.
Cloud Computing
Over the past several years, cloud computing has made significant shifts in how
organizations have transformed their business operations. Generally, there is no limit
to the type of business services that can moved into cloud environments, which means
that the applications and data reside on systems external to the business itself. This
presents a challenge to digital forensics, as organizations do not have physical access
to the computer systems that might need to be seized and searched as part of an
investigation.
In 2014 the National Institute of Standards and Technology (NIST) released
a draft publication entitled NIST Cloud Computing Forensic Science Challenges
based on the research performed by the NIST Cloud Computing Forensic
Science Working Group. The document pulls together a list of challenges faced
by digital forensic practitioners when managing incidents and investigations in
a cloud-computing ecosystem. The goal of this publication is to put structure
around conducting digital forensics involving cloud-based systems and to establish
consistent principles, methodologies, and techniques.
For example, challenges identified by NIST working group specific to cloud-
computing ecosystems include, but are not limited to:
The full list of challenges are in NIST Cloud Computing Forensic Science Challenges,
available on the NIST website (http://csrc.nist.gov/publications/drafts/nistir-8006/
draft_nistir_8006.pdf).
Quantum Computing
Currently, despite much theory and experimentation, quantum computing is still
in its infancy, and the topic of quantum forensics has received minimal attention
from research communities. From research completed so far, there are theories
of potential impact in the capability to conduct live forensics on a quantum
system, leaving practitioners with the only option to conduct forensic analysis
postmortem.
Discussed further in Chapter 2 titled “Investigative Process Methodologies,” data
that exists within a live, or dynamic, state can provide practitioners with a great
deal of potential evidence; however, it is extremely volatile. This means that if crim-
inals gained access to a quantum system to commit their crimes, there could be
minimal artifacts recoverable for use in any type of investigation.
Addressing concerns about the impact quantum computing could have on
live forensics, organizations will need to invest resources into understanding their
potential to extract the maximum amount of evidence from recoverable data
elements.
Ad Hoc Phase
The ad hoc phase between the 1970s and the mid-1980s is an example of a starting
point in the continuous improvement of digital forensics. Otherwise referred to as
the preforensics or protoforensics era, this phase is characterized by the absence of
structure; ambiguous goals; and an overall lack of tools, processes, and training.
Looking at the history of digital forensics and crime, discussed in Chapter 4
titled “Laws, Standards, and Regulations,” it is evident that both technological
advancements and legal precedence are the major contributors for evolution within
the digital forensic profession. Generally, the term ad hoc refers to something new
that has been created (i.e., technology, law) and, because of this, the approach is
disorganized or not theory driven. This is not to say that we ignore everything that
Ad-hoc
Sc
ien
Law
ce
Evolutionary
cycle
En
d
ter
re
ctu
p
ris
ru
e
St
Technology
came previously and start anew, but that with new developments in technology,
there is a need to circle back to ensure structure is provided in terms of digital
forensic capabilities.
Structured Phase
The structured phase from the mid-1980s through the 1990s is an example of the
next period in the evolution of digital forensics. This phase is characterized by the
development of complex solutions, which brings harmony and structure to pro-
cesses and tools that were identified as challenges faced during the ad hoc phase.
Elements specifically addressed during this phase include:
consistently reproduce results, its legitimacy can be called into question and
the forensic viability of evidence g athered or processed cannot be guaranteed.
For processes and tools to produce credible evidence that is forensically sound
requires it be:
At the end of this phase, the formal structure brings digital forensic processes and
tools in line with the scientific principles, methodologies, and techniques required
for achieving a state of maturity.
Enterprise Phase
The enterprise phase in the 2000s is an example of the final era in the maturity of
digital forensics. This phase is characterized by the recognition of processes and
tools to be a science that involves the real-time collection of evidence; the general
acceptance for the development of effective tools and processes; and the application
of formally structured principles, methodologies, and techniques
Ultimately, this phase of the digital forensic evolution came about from
the need to automate digital forensic processes. Not only does this automa-
tion support the ability to perform proactive evidence collection, but it also
allows for methodologies and techniques to be consistently applied that main-
tain standards set out by the legal system to ensure the legal admissibility of
evidence.
The evolution of digital forensics is cyclical when it comes to maturing exist-
ing scientific principles, methodologies, and techniques for new technologies and
standards (i.e., laws and regulations). However, at the same time the evolution of
digital forensics is linear in the sense that the scientific principles, methodologies,
and techniques are maturing, the continued development and contribution to the
digital forensic CBK persists.
◾◾ Upon seizing digital evidence, actions taken should not change that evidence.
◾◾ When it is necessary for a person to access original digital evidence, that per-
son must be forensically competent.
◾◾ All activity relating to the seizure, access, storage, or transfer of digital
evidence must be fully documented, preserved, and available for review.
◾◾ An individual is responsible for all actions taken with respect to digital
evidence while the digital evidence is in their possession.
◾◾ Any agency that is responsible for seizing, accessing, storing, or transferring
digital evidence is responsible for compliance with these principles.
audio, imaging, and electronic devices.” The standards and principles defined by
the SWGDE are as follows:
Evidence Exchange
One of the main goals in conducting a forensic investigation is to establish factual
conclusions that are based on credible evidence. According to the Locard’s Exchange
Principle, illustrated in Figure 1.2, anyone or anything entering a crime scene takes
Exchange
Suspect Digital
Victim
evidence
Exchange
Crime scene
something in with them and leaves something behind when they leave. The Locard’s
Exchange Principle states that with contact between entities, there will be an exchange.
In the physical world, an example of this exchange can occur where a p erpetrator
might inadvertently leave their fingerprints or traces of blood at the crime scene.
Alternatively, another example could be where a perpetrator might take a crucial
piece of evidence away from the crime scene, such as a knife, to make the job of
identifying evidence more challenging. In both examples, these exchanges produce
tangible forms of evidence that demonstrate both class and individual character-
istics. Evidence that possesses class c haracteristics, otherwise referred to as class
evidence, have features that group items by type, such as hair color. On its own,
this type of evidence does not provide conclusive identification of a perpetrator and
individualizing characteristics. What individualizes evidence, such as hair color,
are those characteristics that possess unique qualities that differentiate one from
another and help to narrow down the group to a single item. Using the analogy of
hair color, examples of individual characteristics can include, but are not limited to,
length, style (e.g., straight, wavy), or highlights.
In the digital world, evidence exists in a logical state that is intangible in c omparison
to physical evidence. However, exchanges like those in the physical world can per-
sist and are equally as relevant in the digital world. Email communication and web
browsing are clear examples of how these exchanges occur within the digital world.
If a threatening email message is sent, the individual’s computer will contain arti-
facts of this, as will the email servers used to transmit the message between people.
Practitioners can identify and gather a copious amount of evidence relating to this
threatening email in the form of access logs, email logs, and other artifacts within
computer systems.
Forensic Soundness
Evidence can make or break an investigation. Equally important in both the
physical and digital worlds, it is critical that evidence is handling in a way that will
not raise questions when later presented in a court of law.
Forensically sound is a term used to qualify and, in some cases, justify the use
of a technology or methodology. Likewise, forensic soundness occurs when ESI,2 as
digital evidence, remains complete and materially unaltered as a result of using a
technology or methodology. This means that during every digital investigation,
proper forensic techniques are used following consistent methodologies that are
based on established scientific principles.
While Chapter 2 titled “Investigative Process Methodologies” discusses this
further, the below principles must be followed to achieve forensic soundness specific
to digital evidence:
Perhaps one of the biggest causes for why digital evidence does not maintain forensic
soundness is human error. To guarantee forensic soundness, digital evidence must
be gathered, processed, and maintained following principles, m ethodologies, and
techniques that do not alter its state at any time; thus, demonstrating the evidence
is authentic and has integrity.
Supporting the need to establish authenticity, the goal for maintaining the integrity
of digital evidence is to demonstrate that it has not been changed since the time it
was first gathered. In digital forensics, verifying integrity involves comparing the
digital fingerprint of digital evidence when it is first gathered and subsequently
throughout its lifecycle. Currently, the most common means of generating a digital
fingerprint in digital forensics is to use a one-way cryptographic hash a lgorithm
such as the Message Digest Algorithm family (i.e., MD5, MD6)4 or the Secure
Hashing Algorithm family (i.e., SHA-1, SHA-2, SHA-3).5
In 2004–2005, experts identified that the MD5 and SHA-1 algorithms con-
tained flaws where two unique inputs, having distinctively different properties
and characteristic, would result in the same computational hash value being
outputted.
Dubbed a “ hash collision,” this meant that the same computational hash
value could be engineered in a way that multiple pieces of digital evidence could
return the same hash value. Naturally, this raised concerns in the digital forensic
community about the impact it would have on the legal admissibility of digital
evidence.
In 2009 during the matter of United States vs. Joseph Schmidt III, the
court rules that chance of a hash collision is not significant and is not an issue.
Specifically, a digital fingerprint of a file still produces a digital algorithm that
uniquely identified that file.
This ruling meant that the integrity of digital evidence that was done using
either the MD5 or SHA-1 algorithms can be relied upon as legally admissible.
Chain of Custody
Perhaps the most important aspect of maintaining authenticity and integrity is
documenting the continuity of possession for digital evidence. This chain of cus-
tody is used to demonstrate the transfer of ownership over digital evidence between
entities and can be used to validate the integrity of evidence being presented in
court. Without a chain of custody in place, arguments can be made that evidence
has been tampered, altered, or improperly handled, which can lead to potential
evidence contamination of other consequences. It is best to keep the number of
custody transfers to a minimum, as these individuals can be called upon to provide
testimony on the handling of evidence during the time they controlled it.
Summary
Digital forensics is the application of science to law and must follow established and
scientifically proven principles, methodologies, and techniques required to legally
admit evidence in a court of law. If history has taught us anything, it is that the
advancement in technology will stand as the catalyst to new and evolved digital
forensic principles, methodologies, and techniques.
Glossary
1. Common body of knowledge (CBK) is the complete concepts, terms, and
activities that make up a professional domain.
2. Electronically stored information (ESI) is information created, manipulated,
communicated, stored, and best utilized in digital form and requiring the use of
computer hardware and software.
3. Forensically sound qualifies and, in some cases, justifies the use of a forensic
technology or methodology.
4. Message Digest Algorithm family is a suite of one-way cryptographic hashing
algorithms that is commonly used to verify data integrity through the creation
of a unique digital fingerprint of differing length based on version used.
5. Secure Hashing Algorithm family is a suite of one-way cryptographic hashing
algorithms that is commonly used to verify data integrity through the creation
of a unique digital fingerprint of differing length based on version used.