Gcfi6e Im Ch01
Gcfi6e Im Ch01
Chapter 1
Understanding the Digital Forensics Profession and
Investigations
At a Glance
Objectives
Teaching Tips
Quick Quizzes
Additional Projects
Additional Resources
Key Terms
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-2
Lecture Notes
Overview
Chapter 1 introduces you to digital forensics and explains computer investigation.
Students will learn how to prepare a computer investigation. Next, students will apply a
systematic approach to an investigation. This chapter also describes procedures for
corporate high-tech investigation. In addition, Chapter 1 explains requirements for data
recovery workstations and software. Students will also learn how to conduct an
investigation. Finally, Chapter 1 explains how to complete and critique a case.
Chapter Objectives
Describe the field of digital forensics
Explain how to prepare for computer investigations and summarize the difference between
public-sector and private-sector investigations
Explain the importance of maintaining professional conduct
Describe how to prepare a digital forensics investigation by taking a systematic approach
Describe procedures for private-sector digital investigations
Explain requirements for data recovery workstations and software
Summarize how to conduct an investigation, including critiquing a case
Teaching Tips
An Overview of Digital Forensics
1. Explain that digital forensics involves obtaining and analyzing digital information for
use as evidence in civil, criminal, or administrative cases.
2. Point out that an International Organization for Standardization (ISO) standard for
digital forensics was ratified in October 2012.
3. Mention that the FBI Computer Analysis and Response Team (CART) was formed in
1984 to handle the increasing number of cases involving digital evidence.
Teaching For more details about the FBI Computer Analysis and Response Team (CART),
Tip visit: https://www.fbi.gov/news/stories/piecing-together-digital-evidence.
4. Explain that the Fourth Amendment to the U.S. Constitution protects everyone’s rights
to be secure in their person, residence, and property from search and seizure.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-3
1. Explain that digital forensics investigates data that can be retrieved from a computer’s
hard disk or other storage media. Network forensics yields information about how a
perpetrator or an attacker gained access to a network.
Teaching
Read more about digital forensics at: http://www.digitalforensicsmagazine.com/
Tip
2. Mention that data recovery involves retrieving information from a computer that was
deleted by mistake or lost during a power surge or server crash. Typically, you know
what you’re looking for. Digital forensics is the task of recovering data that users have
hidden or deleted and using it as evidence. This evidence can be inculpatory
(“incriminating”) or exculpatory.
4. Mention that investigators often work as a team to make computers and networks secure
in an organization. Use Figure 1-1 to explain the investigations triad. Point out that in
smaller companies, one group might perform all the tasks shown in the investigations
triad.
5. Explain that when you work in the vulnerability assessment and risk management
group, you test and verify the integrity of standalone workstations and network servers.
Professionals in this group have skills in network intrusion detection and incident
response.
6. Explain that the network intrusion detection and incident response group detects
intruder attacks by using automated tools and monitoring firewall logs.
7. Define the digital investigations group as a team that manages investigations and
conducts forensics analysis of systems suspected of containing evidence related to an
incident or a crime.
1. Explain that by the 1970s, electronic crimes were increasing, especially in the financial
sector. Most law enforcement officers didn’t know enough about computers to ask the
right questions or to preserve evidence for trial.
2. Mention that in the early 1980s, PCs gained popularity and different OSs emerged. Disk
Operating System (DOS) was available in many varieties. Forensics tools were simple,
and most were generated by government agencies. Use Figure 1-2 to illustrate a typical
1980s computer.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-4
3. By the mid-1980s, Xtree Gold appeared on the market and recognized file types and
retrieved lost or deleted files. Norton DiskEdit soon followed and became the best tool
for finding deleted files.
4. Mention that in 1987, Apple produced the Mac SE, a Macintosh with an external
EasyDrive hard disk with 60 MB of storage. Use Figure 1-3 to illustrate your
explanation.
5. Explain that by the early 1990s, specialized tools for computer forensics were available.
The International Association of Computer Investigative Specialists (IACIS) introduced
training on software for forensics investigations and the IRS created search-warrant
programs.
Teaching
Read more about IACIS at: http://www.iacis.com/.
Tip
6. Mention that ExpertWitness, created by ASR Data for the Macintosh, was the first
commercial GUI software for computer forensics. ExpertWitness could recover deleted
files and fragments of deleted files.
7. Mention that the introduction of large hard disks posed new problems for investigators.
Other software that was developed for computer forensics includes ILook and
AccessData Forensic Toolkit (FTK).
1. Explain that since technology is evolving at an exponential pace, existing laws and
statutes can’t keep up with the rate of change.
2. Explain that when statutes or regulations don’t exist, case law is used. Case law allows
legal counsel to use previous cases similar to the current one because the laws don’t yet
exist. Each new case is evaluated on its own merit and issues.
1. Explain that you must be familiar with more than one computing platform, such as
DOS, Windows 9x, Linux, Macintosh, and current Windows platforms.
2. Mention that you should join as many computer user groups as you can. The Computer
Technology Investigators Network (CTIN) meets to discuss problems that digital
forensics examiners encounter.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-5
3. Point out that the High Technology Crime Investigation Association (HTCIA),
International Information Systems Security Certification Consortium (ISC²), and
InfraGard have local chapters open to professionals in most major cities.
4. Mention that user groups can be especially helpful when you need information about
obscure OSs.
5. Explain that it is recommended that you build a network of computer forensics experts
and other professionals, and keep in touch through e-mail. Outside experts can provide
detailed information you need to retrieve digital evidence.
1. Explain that digital investigations fall into two distinct categories: public-sector
investigations and private-sector investigations. Use Figure 1-4 to illustrate your
explanation.
2. Explain that public investigations involve government agencies responsible for criminal
investigations and prosecution. These organizations must observe legal guidelines. For
example, the law of search and seizure protects the rights of all people, including people
suspected of crimes. Use Figure 1-5 to illustrate your explanation.
3. Explain that private or corporate investigations deal with private companies, non-law-
enforcement government agencies, and lawyers. Private investigations aren’t governed
directly by criminal law or Fourth Amendment issues. They are governed by internal
policies that define expected employee behavior and conduct in the workplace.
1. Explain that in a criminal case, a suspect is tried for a criminal offense such as burglary,
murder, molestation, or fraud. Computers and networks are tools that can be used to
commit crimes.
2. Mention that many states have added specific language to criminal codes to define
crimes involving computers.
3. Many serious crimes involve computers, smartphones, and other digital devices.
1. Explain that the legal processes depend on local custom, legislative standards, and rules
of evidence. Criminal case follows three stages: the complaint, the investigation, and
the prosecution.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-6
2. Explain that a criminal case begins when someone finds evidence of an illegal act. The
complainant makes an allegation, an accusation or supposition of fact.
3. Next, a police officer interviews the complainant and writes a report about the crime.
The police blotter provides a record of clues to crimes that have been committed
previously. Point out that blotters now are generally electronic files. An investigator
delegates, collects, and processes the information related to the complaint.
4. Discuss the difference between a Digital Evidence First Responder (DEFR) and a
Digital Evidence Specialist (DES).
5. Mention that after you build a case, the information is turned over to the prosecutor.
7. Mention that a judge must approve and sign a search warrant before you can use it to
collect evidence.
1. Explain that private-sector investigations involve private companies and lawyers who
address company policy violations and litigation disputes.
3. Explain that one way to avoid litigation is to publish and maintain policies that
employees find easy to read and follow. Published company policies provide a line of
authority for a business to conduct internal investigations.
4. Mention that well-defined policies give computer investigators and forensic examiners
the authority to conduct an investigation.
5. Explain that another way to avoid litigations is to display warning banners. A warning
banner usually appears when a computer starts or connects to the company intranet,
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-7
network, or virtual private network. It informs end users that the organization reserves
the right to inspect computer systems and network traffic at will. A warning banner
establishes the right to conduct an investigation. Use Figure 1-7 to illustrate your
explanation.
6. Mention that an authorized requester has the power to conduct investigations, and this
policy should be defined by executive management.
7. Describe the groups that should have direct authority to request computer
investigations, including:
a. Corporate security investigations
b. Corporate ethics office
c. Corporate equal employment opportunity office
d. Internal auditing
e. The general counsel or legal department
8. Describe the most common type of situations that require conducting security
investigations in a corporate environment, including:
a. Abuse or misuse of corporate assets
b. E-mail abuse
c. Internet abuse
9. Mention that you should be sure to distinguish between a company’s abuse problems
and potential criminal problems.
10. Explain that the Federal Rules of Evidence are the same for civil and criminal matters.
11. Explain that many company policies distinguish between personal and company
computer property. One area that’s difficult to distinguish involves cell phones,
smartphones, personal notebooks and tablet computers. Mention that some companies
state that if you connect a personal device to the business network, it falls under the
same rules as company property.
1. Explain that your professional conduct as a digital investigation and forensics analyst is
critical because it determines your credibility. It includes ethics, morals, and standards
of behavior.
2. Explain that maintaining objectivity means you must form and sustain unbiased
opinions of your cases. Maintain an investigation’s credibility by keeping the case
confidential. In the corporate environment, confidentiality is critical.
3. Mention that in rare instances, your corporate case might become a criminal case as
serious as murder.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-8
4. Explain that you can enhance your professional conduct by continuing your training,
attending workshops, conferences, and vendor courses. Also, membership in
professional organizations adds to your credentials.
5. Mention that you are expected to achieve a high public and private standing and
maintain honesty and integrity.
Quick Quiz 1
1. ____ involves obtaining and analyzing digital information for use as evidence in civil,
criminal, or administrative cases.
Answer: Digital forensics
3. A sworn statement of support of the facts about or evidence of a crime is known as a(n)
_____.
Answer: affidavit
4. ____ allows legal counsel to use previous cases similar to the current one because the
laws don’t yet exist.
Answer: Case law
5. A(n) _____ usually appears when a computer starts and informs end users that the
organization reserves the right to inspect computer systems and network traffic at will.
Answer: warning banner
2. Explain that collecting evidence that can be offered in court or at a corporate inquiry
includes investigating the suspect’s computer and preserving the evidence on a different
computer.
3. Define chain of custody as the route the evidence takes from the time you find it until
the case is closed or goes to court.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-9
1. Explain to your students that information contained on a computer can help solve a
case.
3. You may need to define the roles of acquisitions officers and investigating officers.
4. Point your students to the U.S. Department of Justice (DoJ) Web page (www.usdoj.gov)
for proper documentation on acquisition of digital evidence.
5. Explain the importance of tools like Autopsy from Sleuth Kit for a digital forensics
investigator, especially when dealing with intact, deleted, and hidden files.
1. Explain to your students that when employees misuse company resources, i.e., not
following company policies, it can cost companies millions of dollars. Misuse includes:
a. Surfing the Internet
b. Sending personal e-mails
c. Using company computers for personal tasks during work hours
2. Do not forget to mention that the amount of time and effort for each step varies
depending on the case you investigate.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-10
1. Recall that when assessing a case, you first need to outline the case before determining
the case requirements.
2. Remind your students that a broken chain of custody can throw out your case.
Therefore, documenting evidence is very important during a forensics analysis.
3. Use Figures 1-9 and 1-10 to explain the use of evidence custody forms, either single-
evidence or multi-evidence, and the fields typically included in these forms:
a. Case number
b. Investigating organization
c. Investigator
d. Nature of the case
e. Location evidence was obtained
f. Description of evidence
g. Vendor name
h. Model number or serial number
i. Evidence recovered by
j. Date and time
k. Evidence placed in locker
l. Item #/Evidence processed by/Disposition of evidence/Date/Time
m. Page
1. Point out some of the considerations to follow when handling computer evidence:
a. Static electricity
b. Padding to prevent damage during transportation
c. Sealing openings with evidence tape
d. Writing initials on tape to prevent evidence from being altered
e. Temperature and humidity ranges
1. This section explains how to develop formal procedures and informal checklists to
cover all issues important to high-tech investigations.
1. Mention that the majority of investigative work for termination cases involves
employee abuse of corporate assets.
c. For Web-based e-mail investigations, use tools such as FTK’s Internet Keyword
Search option to extract all related e-mail address information
d. Examine header data of all messages of interest to the investigation
1. Explain that under attorney-client privilege (ACP) rules for an attorney, you must keep
all findings confidential.
2. Mention that many attorneys want printouts of the data you have recovered. You need
to persuade and educate many attorneys on how digital evidence can be viewed
electronically. You can also encounter problems if you find data as binary files.
5. If you have difficulty complying with the directions, contact the attorney and explain
the problem.
1. Mention that all suspected industrial espionage cases should be treated as criminal
investigations.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-14
1. Mention that becoming a skilled interviewer and interrogator can take many years of
experience.
1. Introduce your students to the concept of a digital forensics lab or data-recovery lab.
3. Explain to the students the concept of a digital forensics workstation and its role on a
forensics analysis.
4. Illustrate the different kinds of problems you may encounter when working with
different operating systems. In addition, strongly recommend the use of write-blocker
devices when performing a forensics analysis.
Conducting an Investigation
1. Explain that you should start by gathering the resources you identified in your
investigation plan.
1. Explain that when you gather the evidence, you should avoid damaging the evidence.
1. Define a bit-stream copy as a bit-by-bit copy of the original drive or storage medium.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-16
4. Explain to the students why the target disk must match the original disk. Use Figure 1-
11 to illustrate your explanation.
1. Mention that the first rule of digital forensics is to preserve the original evidence.
Conduct your analysis only on a copy of the data.
1. Remind your students that the job of a digital forensics investigator is to recover data
from deleted files, files fragments, and complete files.
2. Mention that deleted files linger on the disk until new data is saved at the same physical
location.
3. Use Figures 1-12 through 1-14 to show the steps to load and acquire an image into
Autopsy.
4. Use Figures 1-15 through 1-17 to show how to display the contents of the acquired data.
6. Use Figures 1-18 through 1-19 to explain how to perform the following tasks with
ProDiscover Basic:
a. Search for keywords of interest in the case
b. Display the results in a search results window in the work area
c. Click each file in the search results window and examine its content in the data
area
1. Use Figure 1-20 to show how to display binary (nonprintable) data in Autopsy’s
Content Viewer.
1. Discuss the questions that need to be answered in order to write the final report.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-17
3. Stress that if by repeating the process described in a report you cannot achieve the same
results, that work has no value as evidence. This characteristic is known as repeatable
findings.
4. Mention to your students that the final report should be prepared accordingly to the
expected readers.
Quick Quiz 2
1. During the _____________ step for problem solving you review the decisions you’ve
made and the steps you have already completed
Answer: test the design
3. Of all the Microsoft operating systems, ____ is the least intrusive in terms of changing
data.
Answer: MS-DOS 6.22
5. In any computing investigation, you should be able to repeat the steps you took and
produce the same results. This capability is referred to as ____.
Answer: repeatable findings
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-18
3. Several Linux distributions can run entirely from a CD, DVD or even a USB drive.
Discuss the possibility of using a Live distribution as a forensic boot disk.
Additional Projects
1. Have students practice the use of single-evidence and multi-evidence custody forms.
2. Have students investigate several computer forensics tools for use on a UNIX/Linux
based workstation.
Additional Resources
1. How to Keep a Digital Chain of Custody:
http://www.csoonline.com/article/2118807/investigations-forensics/how-to-keep-a-
digital-chain-of-custody.html
4. Write-blockers:
b. No Write™ , www.mykeytech.com/nowrite.html
Key Terms
affidavit — A notarized document, given under penalty of perjury, that investigators
create to detail their findings. This document is often used to justify issuing a warrant or
to deal with abuse in a corporation. Also called a “declaration” when the document is
unnotarized.
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-19
allegation — A charge made against someone or something before proof has been
found.
approved secure container — A fireproof container locked by a key or combination.
attorney-client privilege (ACP) — Communications between an attorney and client
about legal matters is protected as confidential communications. The purpose of having
confidential communications is to promote honest and open dialogue between an
attorney and client. This confidential information must not be shared with unauthorized
people.
authorized requester — In a private-sector environment, the person who has the right
to request an investigation, such as the chief security officer or chief intelligence
officer.
bit-stream copy — A bit-by-bit duplicate of data on the original storage medium. This
process is usually called “acquiring an image” or “making an image.”
bit-stream image — The file where the bit-stream copy is stored; usually referred to as
an “image,” “image save,” or “image file.”
chain of custody — The route evidence takes from the time the investigator obtains it
until the case is closed or goes to court.
Computer Technology Investigators Network (CTIN) — A nonprofit group based in
Seattle-Tacoma, WA, composed of law enforcement members, private corporation
security professionals, and other security professionals whose aim is to improve the
quality of high-technology investigations in the Pacific Northwest.
data recovery — Retrieving files that were deleted accidentally or purposefully.
Digital Evidence First Responder (DEFR) — A professional who secures digital
evidence at the scene and ensures its viability while transporting it to the lab.
Digital Evidence Specialist (DES) — An expert who analyzes digital evidence and
determines whether additional specialties are needed.
digital forensics — Applying investigative procedures for a legal purpose; involves the
analysis of digital evidence as well as obtaining search warrants, maintaining a chain of
custody, validating with mathematical hash functions, using validated tools, ensuring
repeatability, reporting, and presenting evidence as an expert witness.
digital investigations — The process of conducting forensic analysis of systems
suspected of containing evidence related to an incident or a crime.
evidence bags — Nonstatic bags used to transport thumb drives, hard drives, and other
computer components.
evidence custody form — A printed form indicating who has signed out and been in
physical possession of evidence.
exculpatory evidence — Evidence that indicates the suspect is innocent of the crime.
exhibits — Evidence that indicates the suspect is innocent of the crime.
forensics workstation — A workstation set up to allow copying forensic evidence,
whether on a hard drive, flash drive, or the cloud. It usually has software preloaded and
ready to use.
Fourth Amendment — The Fourth Amendment to the U.S. Constitution in the Bill of
Rights dictates that the government and its agents must have probable cause for search
and seizure.
hostile work environment — An environment in which employees cannot perform
their assigned duties because of the actions of others. In the workplace, these actions
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.
Guide to Computer Forensics and Investigations, Sixth Edition 1-20
© 2019 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for
use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for school-approved
learning management system or classroom use.