CH 02
CH 02
Objectives
Explain how to prepare a computer investigation Apply a systematic approach to an investigation Describe procedures for corporate high-tech investigations Explain requirements for data recovery workstations and software Describe how to conduct an investigation Explain how to complete and critique a case
Law enforcement officers should follow proper procedure when acquiring the evidence
Digital evidence can be easily altered by an overeager investigator
10
11
Multi-evidence form
12
13
14
16
17
19
20
Many attorneys like to have printouts of the data you have recovered
You need to persuade and educate many attorneys on how digital evidence can be viewed electronically
You can also encounter problems if you find data in the form of binary files
Guide to Computer Forensics and Investigations 21
Other guidelines
Minimize written communications with the attorney Any documentation written to the attorney must contain a header stating that its Privileged Legal CommunicationConfidential Work Product
24
Always keep an open line of verbal communication If youre communicating via e-mail, use encryption
25
26
Identify media source that published the information Review company phone records Obtain a list of keywords related to the media leak Perform keyword searches on proxy and e-mail servers
27
Expand the discreet forensic disk acquisition and analysis Consolidate and review your findings periodically Routinely report findings to management
Guide to Computer Forensics and Investigations 28
Planning considerations
Examine all e-mail of suspected employees Search Internet newsgroups or message boards Initiate physical surveillance Examine facility physical access logs for sensitive areas
31
Steps
Gather all personnel assigned to the investigation and brief them on the plan Gather resources to conduct the investigation
32
33
Interrogation
Trying to get a suspect to confess
34
Conducting an Investigation
Gather resources identified in investigation plan Items needed
Original storage media Evidence custody form Evidence container for the storage media Bit-stream imaging tool Forensic workstation to copy and examine your evidence Securable evidence locker, cabinet, or safe
39
40
Bit-stream image
File containing the bit-stream copy of all data on a disk or partition Also known as forensic copy
Guide to Computer Forensics and Investigations 41
42
Conduct your analysis only on a copy of the data Using ProDiscover Basic to acquire a thumb drive
Create a work folder for data storage Steps
On the thumb drive locate the write-protect switch and place the drive in write-protect mode Start ProDiscover Basic
43
Deleted files linger on the disk until new data is saved on the same physical location Tool
ProDiscover Basic
44
45
46
Summary
Always use a systematic approach to your investigations Always plan a case taking into account the nature of the case, case requirements, and gathering evidence techniques Both criminal cases and corporate-policy violations can go to court Plan for contingencies for any problems you might encounter Keep track of the chain of custody of your evidence
Guide to Computer Forensics and Investigations 48
Summary (continued)
Internet and media leak investigations require examining server log data For attorney-client privilege cases, all written communication should remain confidential A bit-stream copy is a bit-by-bit duplicate of the original disk Always maintain a journal to keep notes on exactly what you did You should always critique your own work
49