CH 01
CH 01
INVESTIGATIONS
6TH EDITION
CHAPTER 1
UNDERSTANDING THE DIGITAL FORENSICS PROFESSION AND INVESTIGATIONS
Digital Forensics is the application of
computer science and
investigative procedures for a
legal purpose involving the
analysis of digital evidence
(information of probative value that is
https://www2.fbi.gov/hq/lab/org/cart.htm
DIGITAL FORENSICS
VS. OTHER RELATED
DISCIPLINES
DIGITAL FORENSICS VS NETWORK FORENSICS
Network Forensics
yields information about how attackers gain access
Digital Forensics: to a network along with files they might have
copied
investigate data that can be retrieved examined
from a or tampered with
computer’s hard drive or other storage examiners use log files to determine:
media when users logged on
information retrieved might already be which URLs users accessed
on the drive, but it might not be easy to how they logged on to
find or decipher the network
and from what location.
Determines:
what tracks or new files were left behind on a victim’s
computer
what changes were made
DIGITAL FORENSICS VS DATA RECOVERY
By the 1970s, electronic crimes were increasing, especially in the financial sector
Most law enforcement officers didn’t know enough about computers to ask the right questions
Or to preserve evidence for trial
One-half cent crime
1980s
PCs gained popularity and different OSs emerged
Disk Operating System (DOS) was available
Forensics tools were simple, and most were generated by government agencies
HISTORY OF DIGITAL FORENSICS (2/6)
Mid-1980s
Xtree Gold appeared on the market
Recognized file types and retrieved lost or deleted files
Norton DiskEdit soon followed
And became the best tool for finding deleted file
1987
Apple produced the Mac SE
A Macintosh with an external EasyDrive hard disk with 60 MB of storage
HISTORY OF DIGITAL FORENSICS (3/6)
HISTORY OF DIGITAL FORENSICS (4/6)
Early 1990s
Tools for computer forensics were available
International Association of Computer Investigative Specialists (IACIS)
Training on software for forensics investigations
IRS created search-warrant programs
ExpertWitness for the Macintosh
First commercial GUI software for computer forensics
Created by ASR Data
HISTORY OF DIGITAL FORENSICS (156)
Now
iLook
Maintained by the IRS, limited to law enforcement
Can analyze and read special files that are copies of the disk
EnCase
Available for public or private use
AccessData Forensic Toolkit (FTK)
Available for public or private use (Most Popular)
LAWS AND
RESOURCES
CASE LAW
Case law allows legal counsel to use previous cases similar to the current one
Because the laws don’t yet exist
Computers and networks are sometimes only tools that can be used to commit
crimes
Not different then lockpick in a burglar case
Many states have added specific language to criminal codes to define crimes involving computers,
such as theft of computer data
Affidavit
Sworn statement of support of facts about or evidence of a crime
Submitted to a judge to request a search warrant
Have the affidavit notarized under sworn oath
Well-defined policies
Give computer investigators and forensic examiners the authority to conduct an
investigation
HOW TO REDUCE THE
RISK OF LITIGATION ? (2/5)
Displaying Warning Banners
Another way to avoid litigation
Warning banner
Usually appears when a computer starts or
connects to the company intranet, network, or
virtual private network
Informs end users that the organization
reserves the right to inspect computer systems
and network traffic at will
Establishes the right to conduct an
investigation
Removes expectation of privacy
One area that’s difficult to distinguish involves PDAs, cell phones, and personal
notebook computers
The safe policy is to not allow any personally owned devices to be connected to
company-owned resources
Limiting the possibility of commingling personal and company data
PREPARING
DIGITAL
FORENSIC
INVESTIGATIO
N
SYSTEMATIC APPROACH
When preparing a case, you can apply standard systems
analysis steps :
Make an initial assessment about the type of case
you’re investigating
Determine a preliminary design or approach to the
case
Create a detailed checklist
Determine the resources you need
Obtain and copy an evidence drive
Identify the risks
Mitigate or minimize the risks
Test the design
Analyze and recover the digital evidence
Investigate the data you recover
Complete the case report
Critique the case
EXAMPLE (DIGITAL
FORENSICS CASE 1)
Manager Steve Billings has been receiving
complaints from customers about the job
performance of one of his sales representatives,
George Montgomery. George has worked as a
representative for several years. He’s been absent
from work for two days but hasn’t called in sick or
told anyone why he wouldn’t be at work. Another
employee, Martha, is also missing and hasn’t
informed anyone of the reason for her absence.
Steve asks the IT Department to confiscate
George’s hard drive and all storage media in his
work area. He wants to know whether any
information on George’s computer and storage
media might offer a clue to his whereabouts and job
performance concerns. To help determine George’s
and Martha’s whereabouts, you must take a
systematic approach to examining and analyzing
the data found on George’s desk.
SOLUTION (DIGITAL FORENSICS CASE 1) (1/5)
Reliable digital
Now what does investigator need? forensic tool for:
• Duplicating USB
drive
• Finding deleted and
hidden files
SOLUTION (DIGITAL FORENSICS CASE 1) (4/5)
BIT STREAM
COPIES
ANALYZING DIGITAL EVIDENCE
https://sourceforge.net/projects/autopsy/files/autopsy/4.3.0/
COMPLETING THE CASE