Digital Forensics and Electronic Evidenc
Digital Forensics and Electronic Evidenc
Legal professionals.
SOFTWARE PIRACY
NARCOTICS
DOMESTIC VIOLENCE
TELECOMMUNICATIONS FRAUD
IDENTITY THEFT
Fake Documents: Counterfeit IDs, certificates, insurance, loan, and
sales documents, driver’s licenses, birth certificates
2. Undeleting Files:
3. File Signatures:
4. Limits of Recovery:
Deleting a file doesn't erase the data—it only marks the space as
available for reuse.
The file is hidden from the OS, but still resides on the disk until
overwritten.
2. Undeleting Files
Recovery tools can access and read data from the index, even if
marked as deleted.
A file not listed in the FAT may still be recoverable if its data exists
on the disk.
4. File Signatures
Each file type has a unique signature at the start and end.
Simplest form.
Must be in writing.
Should include:
o Search Warrant:
Issued by a court.
Seizure and
Chain of Custody
The chain of custody is defined as the witnessed written records of all the
individuals who maintained unbroken control over the items of evidence.
It establishes proof that the items of evidence collected at the crime
scene is the same evidence that is being presented in court.
The purpose.
The first image made of a hard drive is known as the best evidence, and
the chain of custody documentation should be attached and stored with
the best evidence in a safe environment.
After the best evidence is gathered, a second copy should be made either
from the original or from the best evidence. This is the working copy that
investigators will use for their investigation.
Every time the best evidence changes hands, the chain of custody
documentation needs to be updated so that there are no gaps in the
records of where it came from or where it went.
7. Hash Coding
Concept:
Usage in Forensics:
Forensic tools compute hash values before and after imaging a drive
to ensure accuracy.
Key Principle:
If the hash value remains the same, the data has not been altered.
8. Forensic Imaging
Concept:
It captures all data: visible files, deleted files, and even hidden
partitions.
Purpose:
Imaging Types:
Tools:
Best Practice:
Showcases:
Takeaway:
Challenges:
Mobile devices store vast and varied types of data (SMS, call logs,
app data, GPS, photos).
Forensic Considerations:
Extraction Types:
Tools:
Demonstration Focus:
May include:
o Setting up tools (e.g., Cellebrite).
o Connecting phone.
Key Insight:
What’s Collected:
Collection Methods:
API-based tools.
Tools:
Challenges:
Dynamic content.
User deletions.
Applications Involved:
Evidence Types:
Forensic Tools:
Magnet AXIOM.
Important Notes:
14. Email
Types of Data:
Forensic Value:
o Source IP.
o Sending server.
o Timestamps.
Phishing attacks.
Insider threats.
Corporate espionage.
Tools:
Best Practice:
Capture and preserve full headers and source; never forward the email as
it loses integrity.
IMAGING TOOLS
FTK Imager
OSFClone
DATA RECOVERY
Photorec
Recuva
OSFMount
FTK Imager
Docfetcher
Bulk-Extractor
Duckcapture
FAW
HTTRACK
Duckcapture
CAPTURING WEBSITES
FAW
HTTrack
OSForensics
Belkasoft