National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Prepared By:
1. 2. 3.
Mehmood ul Hassan, Forensic Expert Amir Nazir Choudhry, Forensic Expert Khurram Shahzad, Technical Writer
Supervised By:
Ammar Hussain Jaffri
Project Director NR3C/FIA
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
The purpose of this guide is to train the law enforcement officers of Pakistan to combat cyber crimes/cyber terrorism and to maintain the integrity of electronic evidence by standard operating procedures (sops). This guide is specially designed for the first responders, who are the responsible for protecting an electronic crime scene and for the recognition, collection and preservation of electronic evidence.
Note: Without having the necessary skills and training, no responder should attempt to explore the contents or recover data from a computer (e.g. Do not touch the keyboard or click the mouse) or other electronic device other than to record what is visible on its display.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Objectives of NR3C
To enhance the capability of Government of Pakistan and Federal Investigation Agency to effectively prevent growing cyber crimes. Establishment of Computer Forensic Laboratory, of National level, equipped with HiTech tools for supporting NR3C operations in cyber crime cases. To establish a reporting centre for all types of Cyber Crimes in the country. Investigation and prosecution of cyber criminals and to cope with high-tech crimes. To enforce existing laws to combat electronic crime and to protect consumers. Develop and maintain expertise investigations of crimes involving high technology. To provide on demand state-of-the-art electronic forensic services and cyber investigator to Law Enforcement Agencies of Pakistan
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Note: First responders should also have radio frequency-shielding material such as Faraday isolation bags or aluminum foil to wrap cell phones, smart phones and other mobile communication devices after they have been seized.
Preliminary Interviews:
First responders should separate and identify all suspect(s) at the crime scene as well as to record their locations and did not access to any suspect(s) to computer(s) or Electronic device(s). In the interview gather or collect the following information from the suspect(s). Names of all users of the computer(s) and device(s).
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Computer(s) and Internet user information. Login names and user account names including Passwords. Detail about different applications in use. Type of Internet access. Any offsite storage. Detail of Internet service provider. Installed software documentation. Detail of e-mail accounts.
Search
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
The police can exercise their power of search under the section 165 of Cr.P.C. 1898, where the reasonable grounds are available which cause the police to investigate any matter which is falling in the jurisdiction.
Arrest
Under the section 46 of Cr.P.C. 1898, the police making arrest of person are made for purpose preventing that person from committing offence or putting that person in custody of police for the alleged committing of offences. The section 47 of Cr.P.C. says that where the arrest is essential for the purpose of the making arrest of that person, they can make search of the premises where the person supposed have take abode or hiding himself.
Procedure:
After securing the scene, read all steps below before taking any action. 1. Record in notes all actions you take and any changes that you observe in the monitor, computer, printer or other peripherals that result from your actions. 2. Observe the monitor and determine if it is on, off or in sleep mode. Then decide which of the following situations applies and follow the steps for that situation.
Situation 1:
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Monitor is on and desktop is visible. 1. 2. Photograph the monitor screen. Record information displayed on the screen included software & processor.
Situation 2:
Monitor is on and screen is blank (sleep mode) or screen saver (picture) is visible. 1. 2. 3. Move the mouse slightly (without pushing buttons). The screen should change and show work product or request a password. If mouse movement does not cause a change in the screen, may be monitor/system is off. Then turn on the monitor/system to proceed.
Situation 3:
Monitor is off. 1. 2. Make a note of off status. Turn the monitor on, then determine if the monitor status is as described in either
situation 1 or 2 above and follow those steps. Regardless of the power state of the computer (on, off or sleep mode), remove the power source cable from the computer (Not from the wall outlet). If dealing with a laptop, in addition to removing the power cord, remove the battery pack. The battery is removed to prevent any power to the system. Some laptops have a second multipurpose battery. Check for this possibility and remove that battery as well. Check for outside connectivity. If a telephone connection is present, attempt to identify the telephone number. To avoid damage to potential evidence, remove any floppy disks that are present, package the disk separately and label the package. If available, insert either a seizure disk or a blank floppy disk. Do not remove CDs or touch the CD drive. Place tape over all the drive slots and over the power connector. Record make, model and serial numbers. Photograph and diagram the connections of the computer(s) and the corresponding cables. Label all connectors and cable ends (including connections to peripheral devices) to allow for exact re-assembly at a later time. Label unused connection ports as unused. Identify laptop computer docking stations in an effort to identify other storage media. Record or log evidence according to departmental procedures. If transport is required, package the components as fragile cargo.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Note: If Electronic Evidence is off then dont turn it on & if electronic Evidence is on then consult with Technical Expert for further process & seize the evidence.
**********************
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
10
F-29
Investigation summary Form.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
11
F-30
Form for the Collection of Electronic Evidence
Federal Investigation Agency (HQs) National Response Centre for Cyber Crimes (NR3C) Date NR3C Police Station Nature of the case Required data for further case processing Location from where the evidence was obtained * ** *** Case/Enquiry No Investigation Officer
Electronic evidence recovered from crime scene Item No Description of the evidence Model No/Serial No 1 2 3 4 5 Evidence Recovered By Name, Designation & Signature of technical officer Name, Designation & signature of Investigation officer
F-31
Formfor Receiving Evidence in Forensic Lab.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
12
National Response Centre for Cyber Crimes (NR3C) Federal Investigation Agency (HQs) Laboratory Case File No Name of the Organization form which the equipment is received Name Address Contact No Date & Time of Receiving
Detail of electronic equipment received: Item No 1 2 3 4 5 Chain of Custody Log: S.No Received From / Sig/ Date & Time Description of the evidence Model No/Serial No Brand /Manufacturer Name
Remarks
F-32
Check List for Crime Scene Analysis/Investigation
13
Task/Operation
Prepare the Raid Team Identify the team leader Team leader should demonstrate about the crime/ case reported to all other team member Plan the crime scene search Establish team members safety prior to entry Identify & arrest the suspect(s) Thoroughly search the suspect(s) On spot interview of the suspect(s) Start documentation of every event Photograph the crime scene Use latex gloves to preserve the finger print of the suspect Search the drawer, dust bin, table, etc Identify the evidence(s) Label the evidence(s) Photograph the evidence(s) from front and back Sketch the crime scene Collect the evidence(s) Preserve the evidence(s) Search & collect email record Search & collect notes Search & collect letter or any other correspondence Search & collect financial/assets record
Check Box
S.No
23 24 25 26 27 28 29 30 31 32 33 34 35
Task/Operation
Search & collect telephone record Search & collect CDs/Software/Floppy/USB/ External storage devices, etc Search & collect Credit Card(s)/Debit Card(s)/MSR Cards, etc Search & collect Magnetic Strip Reader and Writer machine Search & collect credit card skimmer Search & collect diaries Search & collect digital camera Search & collect Sim(s) Search & collect Mobile Phone/PDA/iPOD/Black Berry, etc Search & collect all other portable devices Pack the magnetic media and wireless devices in anti-static bags Properly pack all other evidence(s)/device(s) Properly fill form F-30 (for the collection of digital evidence) duly signed by the IO and Forensic Expert/Principal Investigator Keeping in view the perishable & fragile nature of electronic evidence, make swift way for the transportation of the said equipment
Check Box
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
36
F-33
Check List for Computer system
14
Task/Operation Always use latex gloves Physically examine the received electronic/digital media devices in order to identify the significant problems/damaged items. Verify the integrity of seized items. Tagged all received items like CPU, hard disks, CDs, USBs, etc Photograph all received items. Fill form F-31 (Electronic Device Receiving Form). Entry in the register before the start of forensic analysis procedure. Always use write blocker. Open/remove the CPU case and Photograph the internal components Search for fire flash drives. Document all the items along-with serial #/model # and brands name Firstly read the requirement(s) of investigation officer/reporting agency. Always use physical/bit stream image for forensic analysis/examination. Analyze the evidence such that analysis should meet the requirements of investigation officer/reporting agency Record/ print the timeline and directory structure of the evidence. Perform keyword search See recent documents/files Search for deleted items Visualize the internet history/cookies/email correspondence, etc Search in normal files/hidden files/encrypted files, etc. Evaluate the file slack and swap files, etc Document the computer media analysis report Verify your findings in comparison with the requirements provided by the IO/reporting agency Stored the item / evidence securely in lock Prepare and signed the forensic report for further case processing.
Check Box
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
15
Policy:
Ensure that proper procedures are followed for packaging, transporting and storing electronic evidence to avoid alteration, loss, physical damage or destruction of data.
Packaging Procedure:
All actions related to the identification, collection, packaging, transportation and storage of digital evidence should be thoroughly documented. When packing digital evidence for transportation, the first responder should: Ensure that all digital evidence collected is properly documented, labeled, marked, photographed, video recorded or sketched and inventoried before it is packaged. All connections and connected devices should be labeled for easy reconfiguration of the system later. Remember that digital evidence may also contain latent, trace or biological evidence and take the appropriate steps to preserve it. Digital evidence imaging should be done before latent, trace or biological evidence processes are conducted on the evidence. Pack all digital evidence in antistatic packaging. Only paper bags and envelopes, cardboard boxes and antistatic containers should be used for packaging digital evidence. Plastic materials should not be used when collecting digital evidence because plastic can produce or convey static electricity and allow humidity and condensation to develop, which may damage or destroy the evidence. Ensure that all digital evidence is packaged in a manner that will prevent it from being bent, scratched or otherwise deformed. Label all containers used to package and store digital evidence clearly and properly.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
16
Leave cellular, mobile or smart phone(s) in the power state (on or off) in which they were found. Package mobile or smart phone(s) in signal-blocking material such as faraday isolation bags, radio frequency-shielding material or aluminum foil to prevent data messages from being sent or received by the devices. (First responders should be aware that if inappropriately packaged or removed from shielded packaging, the device may be able to send and receive data messages if in range of a communication signal.)
Collect all power supplies and adapters for all electronic devices seized.
Transportation Procedure:
When transporting digital evidence, First responder should:
Keep digital evidence away from magnetic fields such as those produced by radio transmitters, speaker magnets and magnetic mount emergency lights. Other potential hazards that the first responder should be aware of include seats heaters and any device or material that can produce static electricity.
Avoid storing electronic evidence in vehicles for prolonged periods of time. Heat, cold or humidity can damage electronic evidence. Ensure that computers and electronic devices are packaged and secured during transportation to prevent damage from shock and vibration. Document the transportation of the digital evidence and maintain the chain of custody on all evidence transported.
Storage Procedure:
Ensure that evidence is inventoried in accordance with departmental policies. Store evidence in a secure area away from temperature and humidity extremes. Protect it from magnetic sources, moisture, dust and other harmful particles or contaminants. The following procedures must be followed to ensure proper storage and retrieval of electronic evidence. These procedures describe the safeguards that are needed to ensure that original evidence is protected from contamination while in the possession of Evidence store incharge or evidence custodian. 1. All physical electronic and digital evidence must be stored in a safe custody within Evidence Store operated under the supervision of store incharge. 2. The store incharge is responsible for receiving and issuing evidence to the officers (who require it).
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
17
3. The store incharge and the concerned officer must fill, verify and sign the Chain of Custody Sheet at the time of handing or taking of electronic evidence. If the electronic evidence is to be transported outside the building then follow the SOP for transportation of electronic evidence. Concerned officers must also fill and sign the handing and taking Evidence sheet/ Chain of Custody Form that details the list of equipments, their serial numbers, equipments physical condition, the case reference number and the authority letter to collect or submit the electronic evidence. 4. The Forensic Experts must store the original evidence to Evidence store after taking images of digital evidence (if possible). 5. After the completion of forensic report, all original evidence, original forensic images and its copies and case documentation in electronic form must be archived and labeled with case reference numbers and to be stored in the separate hard disk or CDR/DVD-R for each case along with the cryptographic hash values to ensure the integrity of the information. All these CD-R, DVD-R and hard disk must be labeled with Case reference number and are to be submitted to Evidence Store once an investigation ends. .
Presumption:
This document assumes that the following pre-requisites would be followed before starting
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
18
any examination of digital evidence. 1. The physical electronic evidence would be handed over to Incharge of forensic lab by following SOPs for secure chain of custody. 2. Potential Evidence would be collected and transported from the crime scene by following SOPs for search, seizure and transportation of electronic evidence.
19
that cryptographic hashes will match the original evidence drive. The image can be mounted under Encase Forensic workstation and be processed as a normal file system.
Note: If you are taking the image of evidence storage media or creating image copy of received, always use software or hardware write blocking mechanism, so that the original evidence must not get any change or alteration
Relational Analysis.
This is the process of determining how digital objects are connected to the various components of the investigation. The cohesion or strength of the connectivity between objects is determined by the number of connections between the objects. The simple process of associating value to common characteristics should illustrate that objects with high values share more common characteristics. These high value objects represent higher degrees of connectivity between the objects. This should illustrate the relationship between the different objects or evidence. There are several methods for documenting relational analysis; such as a matrix illustrating object class attributes or a more graphical presentation such as a bubble diagram.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
20
Functional Analysis:
This process documents how objects function and how illustrating or diagramming those functions reveals similarities and context connections between each object. For example, a phone modem has a particular function, establish a telephone connection to another telephone modem via an analog signal. A phone modem must use a phone line and telephone switch in order to complete the connection. If a suspect accesses a web site, numerous functions are executed; internet connectivity is established, access to a computer, knowledge of computer, knowledge of a computer program to access the web site, knowledge of the web site. In this particular example, there are five distinct functions. No one function can accomplish the task, but all five are needed. This example could be broken down into additional functions such as, connecting to the internet, logging in or on the computer and performing information searches. All of the activities perform a particular function. These functions are related to each other in some form or manner. All functions will affect change upon the system, some at a very minuscule level while others provide a wealth of information. Functional analysis presents the shared or common dependency of functions and objects. The stronger the bond or greater the dependency between objects, the more objects are connected. For example, a phone modem requires a phone line, telephone switch and another distant modem to function. If a phone line does not exist, then there is no relationship between the modem on the computer and the distant modem.
Evidence Analysis.
Forensic Expert may use all three of these analysis techniques to prove a position. The Forensic expert must be completely objective in this analysis. Exculpatory evidence must be given equal weight as incriminating evidence. All evidence must be validated and crosschecked. The evidence must be tied to the suspect and not possess any ambiguities. For example, just because a pornographic picture was found on the computer does not necessarily mean the owner of the computer was the person responsible for putting the image on the computer. Maybe the owner of the computer was away on a business trip when the image appeared on his computer. As the Forensic investigator, you would have to prove that the owner was able to access the computer and place the image on the computer. Or you would have to present a provable scenario by which the computer image could have gotten on the computer.
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
21
FORENSIC REPORT
The Forensic Expert is responsible for completely and accurately reporting his or her findings and the results of the analysis of the digital evidence examination. Documentation is an ongoing process throughout the examination. It is important to accurately record the steps taken during the digital evidence examination
Examiners Note:
The following is a list of general considerations that the Forensic examiner must consider throughout the documentation process. Take notes when consulting with the case investigator and/or prosecutor. Maintain a copy of the search authority with the case notes. Maintain the initial request for assistance with the case file. Maintain a copy of chain of custody documentation. Take notes detailed enough to allow complete duplication of actions. Include in the notes dates, times, and descriptions and results of actions taken. Document irregularities encountered and any actions taken regarding the irregularities during the examination. Include additional information, such as network topology, list of authorized users, user agreements, and/or passwords. Document changes made to the system or network by or at the direction of law enforcement or the Forensic examiner. Document the operating system and relevant software version and current, installed patches. Document information obtained at the scene regarding remote storage, remote user access, and offsite backups. During the course of an examination, information of evidentiary value may be found that is beyond the scope of the current legal authority. Document this information and bring it to the attention of the Investigation officer because the information may be needed to obtain additional search authorities.
***************************************
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
22
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
23