Fdocuments.in Computer Forensics Definition What is Computer Forensics Computer Forensics
Fdocuments.in Computer Forensics Definition What is Computer Forensics Computer Forensics
Definition
• What is Computer Forensics??
– Computer forensics involves the preservation,
identification, extraction, documentation, and
interpretation of computer media for evidentiary and/or
root cause analysis.
– Evidence might be required for a wide range of
computer crimes and misuses
– Multiple methods of
• Discovering data on computer system
• Recovering deleted, encrypted, or damaged file
information
• Monitoring live activity
• Detecting violations of corporate policy
– Information collected assists in arrests, prosecution,
termination of employment, and preventing future
illegal activity
The Field of Computer Forensics
What is Computer Forensics?
Recertification
Every three years must complete recertification process
Must be in good standing with IACIS
Complete proficiency test
Collecting Evidence
Make Exact copies of all hard Reveal all contents of hidden
drives & disks using computer files used by application and
software operating system
Date and Time stamped on each file;
used for timeline
Access contents of password
protected files if legally able to
Protect the Computer system
do so
Avoid deletion, damage, viruses and
corruption Analyze data
Discover files Print out analysis
Normal Files Computer System
Deleted Files All Files and data
Password Protected Files Overall opinion
Hidden Files Provide expert
Encrypted Files
consultation/testimony
How Evidence is
Protected
A Computer Forensic Specialist promises to:
Not delete, damage or alter any evidence
Protect the computer and files against a virus
Handle all evidence properly to prevent any
future damage
Keep a log of all work done and by whom
Keep any Client-Attorney information that is
gained confidential
Advantages of Computer
Forensics
Ability to search
through a massive
amount of data
Quickly
Thoroughly
In any language
Disadvantages of
Computer Forensics
Digital evidence
accepted into court
must prove that there is no
tampering
all evidence must be fully
accounted for
computer forensic specialists
must have complete knowledge
of legal requirements, evidence
handling and storage and
documentation procedures
Disadvantages of
Computer Forensics
Costs
producing electronic records & preserving them is
extremely costly
Sattar vs. Motorola Inc
Presents the potential for exposing privileged
documents
Legal practitioners must have extensive
computer knowledge
How Computer Forensics are
Used
Criminal Prosecutors Large Corporations
Child Pornography cases Embezzlement
Michael Jackson Case Insider Trading
Homicides
Martha Stewart Case
Scott Peterson Trial
Embezzlement Law Enforcement
John Gotti, Bugsy Siegal Any Individual
Financial Fraud Claims
ENRON Sexual harassment
Civil Litigations Age discrimination
Fraud Wrongful termination from job
Divorce Background checks
Breach of Contract
Copy right
Insurance Companies
False Accident Reports
Workman’s Compensation Cases
Definition (cont)
• What Constitutes Digital Evidence?
– Any information being subject to human intervention or
not, that can be extracted from a computer.
– Must be in human-readable format or capable of being
interpreted by a person with expertise in the subject.
• Computer Forensics Examples
– Recovering thousands of deleted emails
– Performing investigation post employment
termination
– Recovering evidence post formatting hard
drive
– Performing investigation after multiple
users had taken over the system
Computer Forensics ….
Mostly a success story - < 14 years
• Data from computers can be reliably
preserved and presented in court
• Deleted data can be recovered
• Events can be reconstructed
• Intentions can be inferred
Lots of good products and procedures to
support ….
(c)Peter Sommer 2002
(c)Peter Sommer 2002
(c)Peter Sommer 2002
Computer Forensics ….
deployed in:
• hacking • electoral law
• fraud • obscene publication
• paedophiliac rings • perjury
• defamation • forgery
• immigration fraud • murder
• narcotics trafficking • sexual harassment
• credit card cloning • data theft – industrial
• software piracy espionage
• divorce
• Operation Systems
– Windows 3.1/95/98/ME/NT/2000/2003/XP
– DOS
– UNIX
– LINUX
– VAX/VMS
• Software
– Familiarity with most popular software packages
such as Office
• Forensic Tools
– Familiarity with computer forensic techniques and the
software packages that could be used
Anti-Forensics
• Software that limits and/or corrupts evidence
that could be collected by an investigator
• Performs data hiding and distortion
• Exploits limitations of known and used forensic
tools
• Works both on Windows and LINUX based
systems
• In place prior to or post system acquisition
Evidence Processing Guidelines
• New Technologies Inc. recommends following
16 steps in processing evidence
• They offer training on properly handling each
step
– Step 1: Shut down the computer
• Considerations must be given to volatile information
• Prevents remote access to machine and destruction of
evidence (manual or ant-forensic software)
– Step 2: Document the Hardware Configuration
of The System
• Note everything about the computer configuration
prior to re-locating
Evidence Processing Guidelines (cont)
– Step 3: Transport the Computer System to A Secure
Location
• Do not leave the computer unattended unless it is locked
in a secure location
– Step 4: Make Bit Stream Backups of Hard Disks and
Floppy Disks
– Step 5: Mathematically Authenticate Data on All
Storage Devices
• Must be able to prove that you did not alter
any of the evidence after the computer
came into your possession
– Step 6: Document the System Date and Time
– Step 7: Make a List of Key Search Words
– Step 8: Evaluate the Windows Swap File
Evidence Processing Guidelines (cont)
– Step 9: Evaluate File Slack
• File slack is a data storage area of which most computer
users are unaware; a source of significant security
leakage.
– Step 10: Evaluate Unallocated Space (Erased Files)
– Step 11: Search Files, File Slack and Unallocated
Space for Key Words
– Step 12: Document File Names, Dates and Times
– Step 13: Identify File, Program and Storage
Anomalies
– Step 14: Evaluate Program Functionality
– Step 15: Document Your Findings
– Step 16: Retain Copies of Software Used
Methods Of Hiding Data
• Covert Channels – Hiding in Transmission
– Take advantage of timing or shared storage to pass
data through unsuspected channel
68
Preparing a Computer
Investigation
(continued)
• Follow an accepted procedure to prepare a
case
• The U.S. Department of Justice has a
document you can download that reviews
proper acquisition of electronic evidence
• Searching and Seizing Computers
• Chain of custody
– Route the evidence takes from the time you find
it until the case is closed or goes to court
69
Examining a Computer Crime
• Computers can contain information that
helps law enforcement determine:
– Chain of events leading to a crime
– Evidence that can lead to a conviction
• Law enforcement officers should follow
proper procedure when acquiring the
evidence
– Digital evidence can be easily altered by an
overeager investigator
70
Examining a Computer Crime
(Example page 30)
Guide to Computer 71
Forensics and
Examining a Company Policy
Violation
• Companies often establish policies for
computer use by employees.
• Employees misusing resources can cost
companies millions of dollars
• Misuse includes:
– Surfing the Internet
– Sending personal e-mails
– Using company computers for personal tasks
72
Taking a Systematic Approach
• Steps for problem solving:
– Make an initial assessment about the type of
case you are investigating
– Determine a preliminary design or approach
to the case
– Create a detailed design
– Determine the resources you need
– Obtain and copy an evidence disk drive
Guide to Computer 73
Forensics and
Taking a Systematic Approach
(continued)
• Steps for problem solving (continued):
– Identify the risks
– Mitigate or minimize the risks
– Test the design
– Analyze and recover the digital evidence
– Investigate the data you recovered
– Complete the case report
– Critique the case
Guide to Computer 74
Forensics and
Assessing the Case
Guide to Computer 76
Forensics and
Planning your Investigation
• A basic investigation plan should include
the following activities:
– Acquire the evidence
– Complete an evidence form and establish a
chain of custody
– Transport evidence to a computer forensics
lab
– Secure evidence in an approved secure
container
Guide to Computer 77
Forensics and
Planning your Investigation
(continued)
• A basic investigation plan (continued):
– Prepare a forensics workstation
– Obtain the evidence from the secure
container
– Make a forensic copy of the evidence
– Return the evidence to the secure container
– Process the copied evidence with computer
forensics tools
Guide to Computer 78
Forensics and
Planning your Investigation
(continued)
• An evidence custody form helps you
document what has been done with the
original evidence and its forensics copies
• There are two types:
– Single-evidence form
– Multi-evidence form
Guide to Computer 79
Forensics and
Planning your Investigation
(continued)
Guide to Computer 80
Forensics and
Planning your Investigation
(continued)
Guide to Computer 81
Forensics and