Nelson 04
Nelson 04
and Investigations
Fifth Edition
Chapter 4
Processing Crime and Incident
Scenes
Objectives
• Digital evidence
– Can be any information stored or transmitted in
digital form
• U.S. courts accept digital evidence as physical
evidence
– Digital data is treated as a tangible object
• Groups such as the Scientific Working Group on
Digital Evidence (SWGDE) set standards for
recovering, preserving, and examining digital
evidence
Guide to Computer Forensics and Investigations Fifth Edition 4
© Cengage Learning 2015
Identifying Digital Evidence
• Business-record exception
– Allows “records of regularly conducted activity,” such
as business memos, reports, records, or data
compilations
• Generally, digital records are considered
admissible if they qualify as a business record
• Computer records are usually divided into:
– Computer-generated records
– Computer-stored records
• Innocent information
– Unrelated information
– Often included with the evidence you’re trying to
recover
• Judges often issue a limiting phrase to the
warrant
– Allows the police to separate innocent information
from evidence
• Additional complications:
– Files stored offsite that are accessed remotely
– Availability of cloud storage, which can’t be located
physically
• Stored on drives where data from many other
subscribers might be stored
• If you aren’t allowed to take the computers to your
lab
– Determine the resources you need to acquire digital
evidence and which tools can speed data acquisition
Guide to Computer Forensics and Investigations Fifth Edition 28
© Cengage Learning 2015
Getting a Detailed Description of the
Location
• Goals
– Preserve the evidence
– Keep information confidential
• Define a secure perimeter
– Use yellow barrier tape
– Legal authority for a corporate incident includes
trespassing violations
– For a crime scene, it includes obstructing justice or
failing to comply with a police officer
• Guidelines (cont’d)
– Don’t cut electrical power to a running system unless
it’s an older Windows 9x or MS-DOS system
– Save data from current applications as safely as
possible
– Record all active windows or shell sessions
– Make notes of everything you do when copying data
from a live suspect computer
– Close applications and shut down the computer
• Guidelines (cont’d)
– Bag and tag the evidence, following these steps:
• Assign one person to collect and log all evidence
• Tag all evidence you collect with the current date and
time, serial numbers or unique features, make and
model, and the name of the person who collected it
• Maintain two separate logs of collected evidence
• Maintain constant control of the collected evidence
and the crime or incident scene
• Guidelines (cont’d)
– Look for information related to the investigation
• Passwords, passphrases, PINs, bank accounts
– Collect documentation and media related to the
investigation
• Hardware, software, backup media, documentation,
manuals
• Sparse acquisition
– Technique for extracting evidence from large
systems
– Extracts only data related to evidence for your case
from allocated files
• And minimizes how much data you need to analyze
• Drawback of this technique
– It doesn’t recover data in free or slack space
• Responsibilities
– Know all aspects of the seized system
– Direct investigator handling sensitive material
– Help secure the scene
– Help document the planning strategy
– Conduct ad hoc trainings
– Document activities
– Help conduct the search and seizure