UNIT-3
UNIT-3
Definition
A chain of custody is a roadmap that shows how evidence was collected,
analyzed, and preserved in order to be presented as evidence in court.
Preserving a chain of custody for electronic evidence requires proving that:
One team member will be assigned the task of maintaining the evidence note-book.
This person will record the who, what, where, when, and how of the
investigation process. At a minimum, items to be recorded in the notebook
include the following task.
a) Who initially reported the suspected incident along with time, date, and
circumstances surrounding the suspected incident?
b)Details of the initial assessment leading to the formal investigation.
i) A copy of the policy or policies that relate to accessing and using the systems
previously listed.
j) A list of administrators responsible for the routine maintenance of the system.
To avoid confusion, the number of people assigned this task should be kept to a minimum.
This member (or members) should also be highly proficient with copying and analysis
tools.
This person will tag all evidence and work with the person responsible for the
evidence notebook to ensure that this information is properly recorded.
Next, the person will also be responsible for making a reliable copy of all
data to be used as evidence.
The data will include complete copies of drives on compromised or suspect
systems, as well as all relevant log files.
This can be done on-site or the entire system can be moved to a forensics lab,
as needs dictate.
A binary copy of the data is the proper way to preserve evidence.
The process must meet industry standards for quality and reliability.
Once all evidence is collected and logged, it can be securely transported to the
forensics lab.
A detailed description of how data was transported and who was
responsible for the transport, along with date, time, and route, should be
included in the log.
Storage and Analysis of Data
The lab must provide some form of access control; a log should be kept
detailing entrance and exit times of all individuals.
It is important that evidence never be left in an unsecured area.
If a defense lawyer can show that unauthorized persons had access to the
evidence, it could easily be declared inadmissible.
As analysis of evidence is performed, investigators must log the details of
their actions in the evidence notebook. The following should be included at
a minimum:
The date and time of analysis
Finally, once all evidence has been analyzed and all results have been
recorded in the evidence notebook, a copy of the notebook should be made
and given to the legal team.
If the legal team finds that sufficient evidence exists to take legal action, it
will be important to maintain the chain of custody until the evidence is
handed over to the proper legal authorities.
Legal officials should provide a receipt detailing all of the items received for
entry into evidence.
COMPUTER IMAGE VERIFICATION AND AUTHENTICATION
It may be possible to seize or impound the computer system, but this risks
violating the basic principle of innocent until proven guilty, by depriving an
innocent party of the use of his or her system.
It should be perfectly possible to copy all the information from the computer
system in a manner that leaves the original system untouched and yet makes
all contents available for forensic analysis.
The courts may rightly insist that the copied evidence is protected from either
accidental or deliberate modification and that the investigating authority
should prove that this has been done. Thus, it is not the content that
needs protection, but its integrity.
A secure method of determining that the data has not been altered
by even a single bit since the copy was taken.
A secure method of determining that the copy is genuinely the one
taken at the time and on the computer in question.
These elements are collectively referred as the Digital Image
Verification and Authentication Protocol.
DIGITAL IDS AND AUTHENTICATION TECHNOLOGY
Without an assurance of the software’s integrity, and without knowing who
published the software, it’s difficult for customers to know how much to
trust software.
It’s difficult to make the choice of downloading the software from the Internet.
Users can choose to trust all subsequent downloads of software from the
same publisher and all software published by commercial publishers that
has been verified by VeriSign.
Public Key Cryptography
In public key cryptographic systems, every entity has two complementary
keys (a public key and private key) that function only when they are held
together.
Public keys are widely distributed to users, whereas private keys are kept safe
and only used by their owner.
Any code digitally signed with the publisher’s private key can only be
successfully verified using the complementary public key.
Code that successfully verified using the publisher’s public key, could only
have been digitally signed using the publisher’s private key, and has not
been tampered with.
Certificate Authorities
Certification Authorities such as VeriSign are organizations that issue digital
certificates to applicants whose identity they are willing to vouch for. Each
certificate is linked to the certificate of the CA that signed it.
VeriSign has the following responsibilities:
3. Managing certificates
Digital ID
A Digital ID/Certificate is a form of electronic credentials for the Internet.
A Digital ID is issued by a trusted third party to establish the identity of the ID holder.
The third party who issues certificates is known as a Certificate Authority (CA).
The purpose of a Digital ID is to reliably link a public/private key pair with its owner.
When a CA such as VeriSign issues a Digital IDs, it verifies that the owner
is not claiming a false identity.
When a CA issues you a digital certificate, it puts its name behind the
statement that you are the rightful owner of your public/private key pair.
How Authenticode works with VeriSign Digital IDs?
Creates a package containing the code, the encrypted hash, and the
publisher’s certificate
4. The end user encounters the package
5. The end user’s browser examines the publisher’s Digital ID. Using the
VeriSign root Public Key, which is already embedded in Authenticode
enabled applications, the end user browser verifies the authenticity of
Software Developer Digital ID (which is itself signed by the VeriSign root
Private Key)
6. Using the publisher’s public key contained within the publisher’s Digital ID,
the end user browser decrypts the signed hash.
7. The end browser runs the code through the same hashing algorithm as the
publisher, creating a new hash.
8. The end user browser compares the two hashes. If they are identical, the
browser messages that the content has been verified by VeriSign, and the end
user has the confidence that the code was signed by the publisher identified in
the Digital ID, and the code hasn’t been altered since it was signed.
Time Stamping: Because key pairs are based on mathematical relationships that
can theoretically be ―cracked‖ with a great deal of time and effort, it is a well-
established security principle that digital certificates should expire.
2.3 Practical Consideration
It is useful to present some fundamental requirements of a forensic data
collection system before considering how these can be securely protected.
Other forensic experts may argue against some or all of them:
a. Forensic data collection should be complete and non-software
specific,
avoiding software traps and hidden partitioning.
b. In operation, it should be as quick and as simple as possible to avoid error or delay.
c. It should be possible for anyone to use a forensic data collection
system with the minimum amount of training.
d. Necessary costs and resources should be kept to a minimum.
To meet the conditions specified in items 2, 3, and 4, the digital integrity
verification and authentication protocol must be tailored to suit.
Only investigators issued with a valid digital signature would be able to complete copies.
2.4 Practical Implementation
A minimum amount of reliance is placed on the technical
ability of the operator/investigator.
It must be understood that during the copying process, procedures are
implemented to trap and handle hardware errors, mapping exceptions where
necessary.
It must also be understood that procedures are implemented to verify that
information is copied correctly.
This information is stored on each cartridge within a copy series.