Computer forensics involves examining digital media to identify, preserve, recover, analyze, and present evidence related to crimes involving computers. The forensic process consists of three main parts: acquisition, analysis, and reporting, while ensuring legal authority and maintaining chain of custody are crucial. Analysts must approach investigations without bias, considering both inculpatory and exculpatory evidence.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views
Module 1_Forensic Process
Computer forensics involves examining digital media to identify, preserve, recover, analyze, and present evidence related to crimes involving computers. The forensic process consists of three main parts: acquisition, analysis, and reporting, while ensuring legal authority and maintaining chain of custody are crucial. Analysts must approach investigations without bias, considering both inculpatory and exculpatory evidence.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21
ITSC 306:
Computer Forensics Module 1: Forensic Process Definition
Computer forensics is a branch of digital forensic science
pertaining to evidence found in computers and digital media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
investigation: 1. The computer as the target of a crime For example, an intrusion investigation 2. The computer as an instrument in a crime For example, accessing or distributing child pornography 3. The computer holds evidence of a traditional crime: For example, email between two subjects planning a crime
◦ Science Follows the scientific method Passes the Daubert or Frye test for admissibility of scientific evidence used in American courts ◦ Art Dependent on the type of investigation and experience of the investigator
• As a forensic analyst, you should not go into an
investigation with a pre-determined outcome. ◦ Inculpatory: Evidence which implies the guilt of a subject ◦ Exculpatory: Evidence which implies the innocence of a subject • It is imperative that you present both sides of the evidence and let the court decide on the evidence.
◦ What are you investigating? ◦ Where will the evidence be located? ◦ Which tools will you use? ◦ How quickly do you require results? ◦ What are the expected results? • Don’t deviate from the plan • Don’t chase the shiny object
investigator, with dates and times recorded. • Clear the area and get everyone away from the keyboards. • Photograph the area around the computer. • Photograph the computer monitor and note if the system is running when you arrive, as this determines your next steps.
◦ Goal: interact with the evidence as little as possible
◦ Law enforcement in 1980s/1990s trained to pull the plug from the back of the computer upon arrival at the scene ◦ Realized that volatile information was being lost, so changed the process to live response on the system before pulling the plug ◦ Imaging of the evidence should be conducted in your controlled lab space ◦ Is there reason to believe the drive may be encrypted?
conduct the examination ◦ Power cables for laptops/cell phones ◦ Any proprietary cables • Package the equipment carefully to prevent damage • Avoid electrical fields (such as the radio in the trunk of a police car) • Retain custody of the evidence until you can store it in your lab evidence locker (chain of custody) • Keep notes of what you have done
• Always assume you will be taking the evidence to court
• Chain of custody is important • Typically, electronic evidence is corroborative evidence • Often the goal is to put a person behind the keyboard • Legal Counsel ◦ When working for legal counsel, the analysis is work product and not discoverable without a court order (client/solicitor privilege)
• Before you start your investigation you need to ensure
you have the legal authority to examine the evidence. ◦ Law enforcement: Have a search warrant or the owner’s informed consent Informed consent means knowing the implications of having the evidence examined and the possibility of being charged with a criminal offense. ◦ Corporate: More difficult to establish. Consider the following: Is the item the property of the corporation? Are there any expectations of privacy on the part of the system users? Is there a login banner indicating no expectation of privacy on the part of the user that needs to be acknowledged prior to system usage?
(sometimes simply Locard’s principle) holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence. Dr. Edmond Locard (13 December 1877 – 4 May 1966) was a pioneer in forensic science…”
• Be aware of encryption (an imaged encrypted drive is
still an encrypted drive) ◦ May require corporate keys to unlock the drive ◦ Try to obtain any user passwords • Drives can fail ◦ May require a data recovery lab • You may require adapters to connect the target drive to the imaging system ◦ Legacy equipment may be hard to connect to your imaging system
• Location may become an issue if you have to complete
your image over a network connection. ◦ May need be more surgical and pick what you suspect are the important files to the investigation and not collect unallocated space • Size of the hard drive may become an issue • International borders may cause an issue: what can be legally transferred outside of the country • Cloud storage may make it difficult to access the data • Internet of Things: How do you image a thermostat?
judicial hearings • Forensic process: Acquisition, analysis and reporting • Don’t be afraid to use open source tools as well as commercial tools • Important: Ensure you have the legal authority to examine the evidence