2004 USA Paper-The Enhanced Digital Investigation Process Model
2004 USA Paper-The Enhanced Digital Investigation Process Model
By
DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics
research. Ever since it organized the first open workshop devoted to digital forensics
in 2001, DFRWS continues to bring academics and practitioners together in an
informal environment.
As a non-profit, volunteer organization, DFRWS sponsors technical working groups,
annual conferences and challenges to help drive the direction of research and
development.
http:/dfrws.org
The Enhanced Digital Investigation Process
Model
Abstract Computer crimes are on the rise and unfortunately less than two percent of
the reported cases result in conviction. The process (methodology and approach) one adopts
in conducting a digital forensics investigation is immensely crucial to the outcome of such
an investigation. Overlooking one step or interchanging any of the steps may lead to incom-
plete or inconclusive results hence wrong interpretations and conclusions. A computer crime
culprit may walk Scot-free or an innocent suspect may suffer negative consequences (both
monetary and otherwise) simply on account of a forensics investigation that was inadequate
or improperly conducted. In this paper, we present a brief overview of forensic models and
propose a new model based on the Integrated Digital Investigation Model.
Keywords Computer Forensics, Crime Scene Investigation, Forensic Process model, Ab-
stract Digital Forensic Model, Integrated Digital Investigation Model.
1 Introduction
Computer forensics emerged in response to the escalation of crimes committed by the use
of computer systems either as an object of crime, an instrument used to commit a crime or
a repository of evidence related to a crime. Computer forensics can be traced back to as
early as 1984 when the FBI laboratory and other law enforcement agencies begun developing
programs to examine computer evidence. Research groups like the Computer Analysis and
Response Team (CART), the Scientific Working Group on Digital Evidence (SWGDE), the
Technical Working Group on Digital Evidence (TWGDE), and the National Institute of
Justice (NIJ) have since been formed in order to discuss the computer forensic science as a
1
discipline including the need for a standardized approach to examinations[2].
Digital forensics has been defined as the use of scientifically derived and proven methods
towards the preservation, collection, validation, identification, analysis, interpretation and
presentation of digital evidence derived from digital sources for the purpose of facilitating
or furthering the reconstruction of events found to be criminal or helping to anticipate
the unauthorized actions shown to be disruptive to planned operations [3]. One important
element of digital forensics is the credibility of the digital evidence. Digital evidence includes
computer evidence, digital audio, digital video, cell phones, digital fax machines etc. The
legal settings desire evidence to have integrity, authenticity, reproductivity, non-interference
and minimization.
Since computer forensics is a relatively new field compared to other forensic disciplines,
which can be traced back to the early 1920s, there are ongoing efforts to develop examination
standards and to provide structure to computer forensic examinations. This paper attempts
to address the methodology of a computer forensic investigation.
2 Previous work
Computer and network forensics methodologies consist of three basic components that Kruse
and Heiser[4] refer to as the three As of computer forensics investigations. These are: acquir-
ing the evidence while ensuring that the integrity is preserved; authenticating the validity of
the extracted data, which involves making sure that it is as valid as the original and analyz-
ing the data while keeping its integrity. Some process models that put the three factors into
consideration include the Forensics Process Model [5], the Abstract Digital Forensics Model
[6] and the Integrated Digital Investigation Model[7].
2
2.2 The Abstract Digital Forensics Model
The Abstract Digital Forensics model [6] proposes a standardized digital forensics process
that consists of nine components:
1. Identification; which recognizes an incident from indicators and determines its type.
2. Preparation; which entails the preparation of tools, techniques, search warrants, and
monitoring authorizations and management support.
3. Approach strategy; that develops a procedure to use in order to maximize the collection
of untainted evidence while minimizing the impact to the victim.
4. Preservation; which involves the isolation, securing and preservation of the state of
physical and digital evidence.
5. Collection; that entails the recording of the physical scene and duplicate digital evi-
dence using standardized and accepted procedures.
6. Examination; which involves an in-depth systematic search of evidence relating to the
suspected crime.
7. Analysis; which involves determination of the significance, reconstructing fragments of
data and drawing conclusions based on evidence found.
8. Presentation; that involves the summary and explanation of conclusions.
9. Returning evidence; that ensures physical and digital property is returned to proper
owner.
Although this model is generally a good reflection of the forensic process, it is open to at
least one criticism. Its third phase (the approach strategy) is to an extent a duplication of
its second phase (the preparation phase). This is because at the time of responding to a
notification of the incident, the identification of the appropriate procedure will likely entail
the determination of techniques to be used.
4
5. Reconstruction phase; which includes putting the pieces of a digital puzzle together,
and developing investigative hypotheses.
6. Presentation phase; that involves presenting the digital evidence that was found to the
physical investigative team.
The IDIP model does well at illustrating the forensic process, and also conforms to the
cyber terrorism capabilities [8] which require a digital investigation to address issues of data
protection, data acquisition, imaging, extraction, interrogation, ingestion/normalisation,
analysis and reporting. It also highlights the reconstruction of the events that led to the
incident and emphasizes reviewing the whole task, hence ultimately building a mechanism
for quicker forensic examinations.
However, the IDIP model is open to some criticisms. First, despite encompassing all
the earlier models, there is reason to question the IDIP model’s practicality. It for instance
depicts the deployment phase which consists of confirmation of the incident as being indepen-
dent of the physical and digital investigation phase. In practice however, it seems impossible
to confirm a digital or computer crime unless and until some preliminary physical and digital
investigation is carried out. Secondly, it does not offer sufficient specificity and does not, for
instance, draw a clear distinction between investigations at the victim’s (secondary crime)
scene and those at the suspect’s (primary crime) scene. Neither does it reflect the process
of arriving at the latter. Since a computer can be used both as a tool and as a victim [9] , it
is common for investigations to be carried out at both ends so that accurate reflections are
made. Henry Lee [10] defines the primary crime scene as the place where the first criminal
act occurred. The process of tracing back to it can be challenging when dealing with larger
networks and in particular, the Internet [9].
4 MODEL DISCUSSION
The Enhanced Digital Investigation model (EIDIP) separates the investigations at the pri-
mary and secondary crime scenes while depicting the phases as iterative instead of linear. It
is based on the IDIP model and expands the deployment phase in the IDIP model to include
the physical and digital crime investigations while introducing a new phase dedicated to
tracing back to the computer(the primary crime scene) that was used as a tool to commit
the offense. In this proposed model the reconstruction is only made after all investigations
have taken place instead of having two reconstructions which might be inconsistent.
5 CONCLUSION
The Enhanced Integrated Digital Investigation Process (EIDIP) model is an enhanced version
of the Integrated Digital Investigation Process Model and seeks to redefine the forensic
process and its progression. It describes the development right from the point when the
initial infrastructure is put in place, to investigations when the incident is reported, through
the traceback phases that would lead to the point where the crime was committed and finally
to the ultimate investigations that would lead to conclusive interpretations of the evidence
collected. Thus EIDIP model is suitable for cyber crime investigations.
References
[1] InterGOV International(2002). International Web statistics report 2002.
http://www.intergov.org/public information/general information/latest web stats.html.
[2] Michael Noblett, Mark.M.Pollitt and Lawrence Presley. (2000) Recovering and Ex-
amining Computer Forensic Evidence, Forensic Science Communications, Volume
2, Number 4.
[3] Gary L Palmer.(2001). A Road Map for Digital Forensic Research. Technical Re-
port DTR-T0010-01, DFRWS. Report for the First Digital Forensic Research Workshop
(DFRWS).
[4] Kruse II, Warren and Jay, G. Heiser (2002) Computer Forensics: Incident Re-
sponse Essentials. Addison-Wesley.
[5] National Institute of Justice.(July 2001) Electronic Crime Scene Investigation A
Guide for First Responders. http://www.ncjrs.org/pdffiles1/nij/187736.pdf.
[6] Mark Reith, Clint Carr and Gregg Gunsch.(2002)An Examination of Digital Foren-
sic Models International Journal of Digital Evidence, Fall 2002,Volume 1, Issue 3.
[7] Brian Carrier and Eugene H Spafford,(2003) Getting Physical with the Investiga-
tive Process International Journal of Digital Evidence.Fall 2003,Volume 2, Issue 2.
[8] National Institute of Justice. (2002).Results from Tools and Technology Working
Group, Governors Summit on Cybercrime and Cyberterrorism, Princeton NJ.
8
[9] Joseph Migga Kizza. (2003) Ethical and Social Issues in the Information
Age,Second Edition, Springer .
[10] Henry Lee, Timothy Palmbach, and Marilyn Miller(2001)Henry Lee’s Crime Scene
Handbook, Academic Press.
[11] Criminal Justice Academy notes available at http://scdps.org/cja/csr-csmgmt.htm.
[12] Michael Pastore,(2003),Security + Study Guide,SYBEX Inc
[13] http://www.ip-tp-location.com
[14] http://whatismyipaddress.net.