Fallsem2023-24 Cse4004 Eth3
Fallsem2023-24 Cse4004 Eth3
Crime
9/14/2023 1
• The role of digital forensics professional is to gather evidence
to prove that a suspect committed a crime or violated a
company policy
• Collect evidence that can be offered in court or at a
corporate inquiry
• Investigate the suspect’s computer
• Preserve the evidence on a different computer
• Chain of custody
• Route the evidence takes from the time you find it until the case is
closed or goes to court
9/14/2023 2
• Computers can contain information that helps law
enforcement determine:
• Chain of events leading to a crime
• Evidence that can lead to a conviction
• Law enforcement officers should follow proper
procedure when acquiring the evidence
• Digital evidence can be easily altered by an overeager
investigator
• A potential challenge: information on hard disks
might be password protected so forensics tools may
be need to be used in your investigation
9/14/2023 3
An Overview of a Company Policy Violation
• Employees misusing resources can cost companies millions of dollars
• Misuse includes:
• Surfing the Internet
• Sending personal e-mails
• Using company computers for personal tasks
9/14/2023 4
Taking a Systematic Approach
• Steps for problem solving
• Make an initial assessment about the type of case you are investigating
• Determine a preliminary design or approach to the case
• Create a detailed checklist
• Determine the resources you need
• Obtain and copy an evidence drive
9/14/2023 5
Taking a Systematic Approach
• Steps for problem solving (cont’d)
• Identify the risks
• Mitigate or minimize the risks
• Test the design
• Analyze and recover the digital evidence
• Investigate the data you recover
• Complete the case report
• Critique the case
9/14/2023 6
Assessing the Case
• Systematically outline the case details
• Situation
• Nature of the case
• Specifics of the case
• Type of evidence
• Known disk format
• Location of evidence
• Based on these details, you can determine the case
requirements
9/14/2023 7
Planning Your Investigation
• A basic investigation plan should include the following activities:
• Acquire the evidence
• Complete an evidence form and establish a chain of custody
• Transport the evidence to a computer forensics lab
• Secure evidence in an approved secure container
9/14/2023 8
Planning Your Investigation
• A basic investigation plan (cont’d):
• Prepare your forensics workstation
• Retrieve the evidence from the secure container
• Make a forensic copy of the evidence
• Return the evidence to the secure container
• Process the copied evidence with computer forensics tools
9/14/2023 9
Planning Your Investigation
• An evidence custody form helps you document what has been done
with the original evidence and its forensics copies
• Also called a chain-of-evidence form
• Two types
• Single-evidence form
• Lists each piece of evidence on a separate page
• Multi-evidence form
9/14/2023 10
Planning Your Investigation
9/14/2023 11
Planning Your Investigation
9/14/2023 12
Securing Your Evidence
• Use evidence bags to secure and catalog the evidence
• Use computer safe products when collecting computer evidence
• Antistatic bags
• Antistatic pads
• Use well padded containers
• Use evidence tape to seal all openings
• CD drive bays
• Insertion slots for power supply electrical cords and USB cables
9/14/2023 13
Securing Your Evidence
• Write your initials on tape to prove that evidence has not been
tampered with
• Consider computer specific temperature and humidity ranges
• Make sure you have a safe environment for transporting and storing it until a
secure evidence container is available
9/14/2023 14