Module 3 - Buiding-Environments-For-Digital-Forensics
Module 3 - Buiding-Environments-For-Digital-Forensics
Building environments
for digital forensics
Topics
• Forensic Laboratories
• Policies and Procedures
• Quality Assurance
• Hardware and Software
• Accreditation v. Certification
Forensic Laboratories
Forensic Labs
Drive
• Evidence repository separate
images
from the examiner on
• This is how the FBI does it server
• Saves money, increases access
to resources
• Role-based access Examiner
– Examiners and management get full access connects
– Investigators, prosecutors, and attorneys get remotely
restricted access
Concerns with Virtual
Labs
• Security
– Must retain integrity or evidence will be inadmissible in court
• Performance
– High-speed connectivity required
• Cost
Lab Security
• Physical security
– Keep unauthorized people out of critical areas
• Examination stations
• Evidence storage
– Keys, swipe cards, access codes
– Digital access control is better than keys
• Keeps an audit trail to support chain of custody
– Protection from fire, flood. etc.
Chain of Custody
• Data safe
– Protects evidence from tampering
– Fireproof and waterproof
• Evidence log
– Must record who entered, when, and what they removed or returned
• Data storage lockers must be kept locked
Policies and Procedures
Standard Operating
Procedures (SOPs)
• Documents that detail evidence
collection, examinations, etc.
• These ensure consistency and
reliability
• Very important to handle questions
in court
• Unusual situations will often require
special handling
Best Practices for Evidence
Collection
• For proper evidence preservation, follow these procedures in order (Do not use the computer or
search for evidence)
• Technical review
– Focuses on results and conclusions
– Are the results reported supported by the evidence?
• Administrative review
– Ensures all paperwork is present and completed correctly
Proficiency Testing
• Case File
– Case submission forms
– Requests for assistance
– Chain of custody reports
– Examiner's notes
– Crime scene reports
– Examiner's final reports
– Copy of search authorizatity
– All collected in a case file
• Preprinted forms help maintain uniformity
Examiner Notes
• Cloning devices
• Cell phone acquisition devices
• Write blockers
• Portable storage devices
• Adapters
• Cables
• Much more
• From textbook
Computer
Recommendations
• Multiple multicore processors
• As much RAM as possible
• Large, fast hard drives
• FTK 4 recommends:
– 64-bit processor, Quad core
– 8 GB RAM
– A dedicated 150 GB hard disk for the PostgreSQL database; SSD
or RAID preferred
– 1 GB network
Non-PC Hardware
• Cellebrite's UFED
– Supports over 3,000 phones
Paraben
• Competes with
Cellebrite
• Supports more
than 4,000 phones,
PDAs, and GPS
units
Cloners and Kits
• Hardware Cloners
– Faster, can clone multiple drives at once
– Provide write protection, hash authentication, drive wiping, audit trail…
• Crime scene kits
– Preloaded with supplies to collect digital evidence
– Pens, digital camera, forensically clean storage media, evidence bags,
evidence tape, report forms, markers…
Software: Open-Source
• Search tools
– E-mail addresses
– Names
– Phone numbers
– Keywords
– Web addresses
– File types
– Date ranges
Don't Trust Tools
• Mac Tools
– Softblock
– Macquisition
– Blacklight
– BlackBag
– Mac Marshall
Other Tools
http://fpt.edu.vn 05/20/24 50