Module 10 Computer Investigation
Module 10 Computer Investigation
Module 10 Computer Investigation
• Introduction
• Digital Evidence
• Preserving Evidence
• Analysis of Digital Evidence
• Writing Investigative Reports
Mary Komunte 1
Computer Investigations
Introduction
• The computer advent - revolutionized the way people live,
work and play; allowing our businesses to run more effectively.
• However, some individuals use them to lash out malicious
assaults including fraud, identity theft, hacking, embezzlement
and a wide array of other activities.
• To avert these crimes; specialists known as computer
investigators are called in to seize and gather information from
these computers.
• Computer investigation is the science of locating; extracting,
analyzing and protecting specific data from computers and
digital storage media, which can be interpreted to serve as legal
evidence in courts of law.
Introduction cont….
Mary Komunte 5
Looking for Digital Evidence
• Looking for digital evidence is difficulty and is comparable to
searching for bits of evidence data from a haystack.
• The evidence usually sought includes binary data fixed in any
medium such as on CDs, memory, and floppies, residues of
things used in the committing of a crime and physical
materials such as folders, letters, and scraps of papers.
Mary Komunte 6
Digital Evidence Previewing and Acquisition
Mary Komunte 9
Analysis of Digital Evidence
• Evidence analysis is the most difficult and
demanding task for investigators
• It involves:
– Analyzing Data Files
• File Directory Structure
• File Patterns
• Metadata
• Content
• Application
• User Configuration
Mary Komunte 10
– Analysis Based on Digital Media
• Deleted Files
• Hidden Files
• Slack Space
• Bad Blocks
• Steganography Utilities
• Compressed and Coded Files
• Encrypted Files
• Password-Protected Files
– Analysis Based on Operating Systems
• Microsoft–Based File Systems
• UNIX and LINUX File Systems
• Macintosh File System
Mary Komunte 11
– Documentation and notes describing the
networking of suspect’s devices
– Notes made on what was discovered including
passwords, pass phrases, encryption and any data
hiding.
– Any changes to the suspect’s scene configuration
authorized or not.
– Names of everyone at the suspect’s scene
– Procedures used to deal with the scene including
acquisition, extraction, and analysis of evidence.
– Any observed or suspected irregularities including
those outside the scope of the techniques in use.
Mary Komunte 12
When can Computer Forensics be useful?
a) In instances of homicide,
b) Financial fraud,
c) Drug and embezzlement record keeping,
d) Child pornography,
e) Mitigation of costs by insurance agencies.
f) Civil litigations; on discrimination and harassment cases.
g) Armed robberies (west-gate scandal)
h) International counter-terrorism (Osama bin Laden)
i) Unlawful access to company information
j) Employees’ wrongful termination, etc.
Investigation Reports:
• The Computer Forensic Investigation Report of any
cross-examination has to be perfectly documented.
Mary Komunte 15
– Documentation and notes describing the
networking of suspect’s devices
– Notes made on what was discovered including
passwords, pass phrases, encryption and any data
hiding.
– Any changes to the suspect’s scene configuration
authorized or not.
– Names of everyone at the suspect’s scene
– Procedures used to deal with the scene including
acquisition, extraction, and analysis of evidence.
– Any observed or suspected irregularities including
those outside the scope of the techniques in use.
Mary Komunte 16
Challenges of Computer Forensics
Technical Issues:
• Encryption – Encrypted data can be impossible to view without
the correct key or password.
• Increasing storage space – Storage media hold ever greater
amounts of data,
• New technologies – Computing is a continually evolving field,
with new hardware, software and operating systems emerging
constantly.
• Anti-forensics – Anti-forensics is the practice of attempting to
thwart computer forensic analysis. This may include encryption,
the over-writing of data to make it unrecoverable, the
modification of files’ metadata and file obfuscation (disguising
files).
Challenges continued
• Legal Issues
Trojans have many uses, and include key-logging, uploading and
downloading of files and installation of viruses. A lawyer may be able
to argue that actions on a computer were not carried out by a user but
were automated by a Trojan without the user’s knowledge;
Administrative Issues
-Accepted standards – There are multiples of standards and guidelines
in computer forensics, few of which appear to be universally accepted.