Bisf 2204 Class Task 1
Bisf 2204 Class Task 1
Risk Management
6
Digital Investigations
Digital Forensics Profession and Investigations
• The digital investigation triad represents three groups or departments responsible for
performing tasks.
• These groups work together to address all aspects of a digital technology investigation
without involving outside specialists.
• In smaller companies, one group might perform all tasks or contract with service providers.
➢ Disk Operating System (DOS) was a popular choice for forensics tools
during the 1980s, with various versions including PC-DOS, QDOS, DR-
DOS, IBM-DOS, and MS-DOS.
Private-Sector Investigations
• Focuses on policy violations like non-compliance with HIPAA regulations.
• Can also involve criminal acts like corporate espionage.
• Can start as civil cases but can develop into criminal cases.
• Evidence found in investigations can transition between civil and criminal
cases.
Understanding Law Enforcement Agency Investigations
➢ Understanding laws on computer-related crimes is crucial in public-sector
investigations.
➢ Questions to determine if a computer crime occurred include the tool
used, whether it was a trespass, theft, vandalism, or infringement on
someone else's rights.
➢ Laws vary by jurisdiction, with EU privacy laws being more stringent
than U.S. privacy laws.
➢ Internal company investigations can involve laws of multiple countries,
as companies consolidate into global entities.
➢ States have added specific language to criminal codes to define crimes
involving computers.
➢ States have expanded the definition of laws for crimes such as theft to
include taking data from a computer without the owner’s permission.
Many serious crimes involve computers, smartphones, and other digital
devices, including sexual exploitation of minors, missing children and
adults, drug dealers, car theft rings, and other criminals.
Following Legal Processes
Computer Investigation for Criminal Violations
• The legal process for computer investigations for potential criminal violations
depends on local custom, legislative standards, and rules of evidence.
• A criminal case follows three stages: complaint, investigation, and
prosecution.
• A complaint is filed, followed by a specialist investigating the complaint and a
prosecutor building a case.
• The investigation begins when evidence of an illegal act is found or witnesses
an illegal act.
• The police officer interviews the complainant and writes a crime report.
• The law enforcement agency processes the report, and management decides to
start an investigation or log the information into a police blotter.
• Police officers are not always computer experts, but some are trained to
recognize what they can retrieve from a computer disk.
• ISO standard 27037 defines two categories of officers: Digital Evidence First
Responder (Skills and Training) and Digital Evidence Specialist (Skills) to
differentiate training and experience.
• The scope of the case, including the device’s OS, hardware, and peripheral
devices, is assessed.
• The information is turned over to the prosecutor, who presents the collected
evidence with a report to the government’s attorney.
• If sufficient cause to support a search warrant is found, an affidavit
(declaration) is submitted to a judge with the request for a search warrant before
seizing evidence.
• Initial Assessment: Discuss the type of case with others involved and inquire
about the incident. Determine if the computer was used for a crime or if it
contains evidence.
• Preliminary Design or Approach: Outline the steps needed to investigate the
case. Determine if the suspect can be seized during work hours or if the
information law enforcement officers have gathered is already gathered.
• Detailed Checklist: Refine the general outline by creating a detailed checklist
of steps and estimated time for each step.
• Determine Resources Needed: List the software and tools needed for the
investigation based on the OS of the computer.
• Obtain and Copy an Evidence Drive: Make a forensic copy of the disk if
multiple computers are seizing.
• Identify Risks: List the problems expected in the case type.
• Mitigate or minimize risks: Identify ways to minimize risks, such as making
multiple copies of original media before starting.
• Test the design: Review decisions and steps made, including comparing hash
values.
• Analyze and recover digital evidence: Examine the disk to find digital
evidence, addressing any risks and obstacles.
• Investigate the data recovered: View information recovered from the disk,
including existing files, deleted files, emails, and Web history.
• Complete the case report: Write a detailed report detailing the investigation
and findings.
• Critique the case: Review the case to identify successful decisions and actions
and identify areas for improvement.
• Time and effort: The time and effort put into each step varies depending on the
nature of the investigation.
• Contingency plan: Always have a contingency plan for the investigation,
including alternative software and hardware tools.
• Gathering evidence: Acquire the USB drive from the IT Department, which
bagged and tagged the evidence.
• Completing an evidence form: Establish a chain of custody and transport the
evidence to a digital forensics lab.
• Ensuring the evidence is stored in an approved secure container: Prepare a
forensic workstation.
• Retrieving evidence: Go to the IT Department staff who confiscated the
storage media.
• Making a forensic copy of the evidence drive: Make a forensic copy of the
evidence drive.
• Returning the evidence drive to the secure container: Process the copied
evidence drive with digital forensics tools.
• Documenting evidence: Record details about the media, including who
recovered the evidence and when, and who possessed it. Use an evidence
custody form: This helps document what has and has not been done with the
original evidence and forensic copies.
• Depending on the environment: Create an evidence custody form for law
enforcement or private security.