DF-L02-Understanding The Digital Forensics Profession and Investigations
DF-L02-Understanding The Digital Forensics Profession and Investigations
and Investigations
Sixth Edition
Chapter 1
Understanding The Digital Forensics Profession
and Investigations
1
Objectives
• Describe the field of digital forensics
• Explain how to prepare computer investigations and
summarize the difference between public-sector and private-
sector investigations
• Explain the importance of maintaining professional conduct
• Describe how to prepare a digital forensics investigation by
taking a systematic approach
• Describe procedures for private-sector digital investigations
• Explain requirements for data recovery workstations and
software
• Summarize how to conduct an investigation, including
critiquing a case
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 2
classroom use.
What is digital forensics
Definition
•The application of computer science and
investigative procedures for a legal purpose
involving the analysis of digital evidence
after
•proper search authority,
•chain of custody (Evidence Transmittal Letter)
•validation with mathematics (hash function),
•use of validated tools,
•repeatability,
•reporting,
•possible expert presentation.
NIST definition of Digital Forensics
The application of science to
• identification,
• collection,
• examination, and
• analysis
of data while
• preserving the integrity of the information and
• maintaining a strict chain of custody of the data
• In October 2012, an ISO standard for digital forensics
was ratified - ISO 27037 Information technology -
Security techniques
Digital Forensics and Other Related
Disciplines (1 of 3)
• Investigating digital devices includes:
• Collecting data securely
• Examining suspect data to determine details such as origin and
content
• Presenting digital information to courts
• Applying laws to digital device practices
• Digital forensics is different from data recovery
• Which involves retrieving information that was deleted by
mistake or lost during a power surge or server crash
• Forensics investigators often work as part of a team,
known as the investigations triad
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 6
classroom use.
Digital Forensics and Other Related
Disciplines (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 7
classroom use.
Digital Forensics and Other Related
Disciplines (3 of 3)
•Vulnerability/threat assessment and risk
management
• Tests and verifies the integrity of stand-along
workstations and network servers
•Network intrusion detection and incident
response
• Detects intruder attacks by using automated tools and
monitoring network firewall logs
•Digital investigations
• Manages investigations and conducts forensics analysis
of systems suspected of containing evidence
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 8
classroom use.
A Brief History of Digital Forensics
• By the early 1990s, the International Association of
Computer Investigative Specialists (IACIS) introduced
training on software for digital forensics
• IRS created search-warrant programs
• ASR Data created Expert Witness for Macintosh
• ILook is currently maintained by the IRS Criminal
Investigation Division
• AccessData Forensic Toolkit (FTK) is a popular commercial
product
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 9
classroom use.
Understanding Case Law
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 10
classroom use.
Developing Digital Forensics Resources
To supplement your knowledge:
1. Develop and maintain contact with computing,
network, and investigative professionals
2. Join computer user groups in both the pubic and
private sectors
Example:
Computer Technology Investigators Network (CTIN)
meets to discuss problems with digital forensics
examiners encounter
3. Consult outside experts
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 11
classroom use.
Preparing for Digital Investigations (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 12
classroom use.
Preparing for Digital Investigations (2 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 13
classroom use.
Preparing for Digital Investigations (3 of 3)
•Public-sector investigations involve government
agencies responsible for criminal investigations
and prosecution
•Fourth Amendment to the U.S. Constitution
• Restrict government search and seizure
•The Department of Justice (DOJ) updates
information on computer search and seizure
regularly
•Private-sector investigations focus more on policy
violations
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 14
classroom use.
Understanding Law Enforcement Agency
Investigations
•When conducting public-sector investigations, you
must understand laws on computer-related crimes
including:
• Standard legal processes
• Guidelines on search and seizure
• How to build a criminal case
•The Computer Fraud and Abuse Act was passed in
1986
• Specific state laws were generally developed later
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 15
classroom use.
Following Legal Processes (1 of 2)
•A criminal investigation usually begins when
someone finds evidence of or witnesses a crime
• Witness or victim makes an allegation to the police
•Police interview the complainant and writes a
report about the crime
•Report is processed and management decides to
start an investigation or log the information in a
police blotter
• Blotter is a historical database of previous crimes
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 16
classroom use.
Following Legal Processes (2 of 2)
• Digital Evidence First Responder (DEFR)
• Arrives on an incident scene, assesses the situation, and takes
precautions to acquire and preserve evidence
• Digital Evidence Specialist (DES)
• Has the skill to analyze the data and determine when another
specialist should be called in to assist
• Affidavit - a sworn statement of support of facts about
or evidence of a crime
• Must include exhibits that support the allegation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 17
classroom use.
Understanding Private-Sector Investigations
(1 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 18
classroom use.
Understanding Private-Sector Investigations
(2 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 19
classroom use.
Understanding Private-Sector Investigations
(3 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 20
classroom use.
Understanding Private-Sector Investigations
(4 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 21
classroom use.
Understanding Private-Sector Investigations
(5 of 8)
Sample text that can be used in internal warning
banners:
• Use of this system and network is for official business
only
• Systems and networks are subject to monitoring at any
time by the owner
• Using this system implies consent to monitoring by the
owner
• Unauthorized or illegal users of this system or network
will be subject to discipline or prosecution
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 22
classroom use.
Understanding Private-Sector Investigations
(6 of 8)
•Businesses are advised to specify an authorized
requester who has the power to initiate
investigations
•Examples of groups with authority
• Corporate security investigations
• Corporate ethics office
• Corporate equal employment opportunity office
• Internal auditing
• The general counsel or legal department
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 23
classroom use.
Understanding Private-Sector Investigations
(7 of 8)
•During private investigations, you search for
evidence to support allegations of violations of a
company’s rules or an attack on its assets
•Three types of situations are common:
• Abuse or misuse of computing assets
• E-mail abuse
• Internet abuse
•A private-sector investigator’s job is to minimize
risk to the company
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 24
classroom use.
Understanding Private-Sector Investigations
(8 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 25
classroom use.
Maintaining Professional Conduct
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 26
classroom use.
Preparing a Digital Forensics Investigation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 27
classroom use.
An Overview of a Computer Crime
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 29
classroom use.
Planning Your Investigation (1 of 5)
A basic investigation plan should include the following
activities:
• Acquire the evidence
• Complete an evidence form and establish a chain of
custody
• Transport the evidence to a computer forensics lab
• Secure evidence in an approved secure container
• Prepare your forensics workstation
• Retrieve the evidence from the secure container
• Make a forensic copy of the evidence
• Return the evidence to the secure container
• Process the copied evidence with computer forensics tools
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 30
classroom use.
Planning Your Investigation (2 of 5)
~ During a crime scene, should the computer be
shutdown and unplugged to collect evidence?
• Case dependant
• Incase of ddos attack the system must be unplugged
and then shutdown
• Operating system’s internal memory process
handles, open files, open ports, open connections
are recorded before unplugging the computer
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 31
classroom use.
Planning Your Investigation (3 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 32
classroom use.
Planning Your Investigation (4 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 33
classroom use.
Planning Your Investigation (5 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 34
classroom use.
Securing Your Evidence (1 of 2)
• Use evidence bags to secure and catalog the evidence
• Use computer safe products when collecting computer evidence
-Antistatic bags
-Antistatic pads
• Use well padded containers
• Use evidence tape to seal all openings
• CD drive bays
• Insertion slots for power supply electrical cords and USB cables
• Write your initials on tape to prove that evidence has not been
tampered with
• Consider computer specific temperature and humidity ranges
• Make sure you have a safe environment for transporting and
storing it until a secure evidence container is available
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 35
classroom use.
Procedures for Private-Sector High-Tech
Investigations
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 36
classroom use.
Employee Termination Cases
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 37
classroom use.
Internet Abuse Investigations (1 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 38
classroom use.
Internet Abuse Investigations (2 of 2)
• Recommended steps
• Use standard forensic analysis techniques and procedures
• Use appropriate tools to extract all Web page URL information
• Contact the network firewall administrator and request a proxy
server log
• Compare the data recovered from forensic analysis to the proxy
server log
• Continue analyzing the computer’s disk drive data
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 39
classroom use.
E-mail Abuse Investigations (1 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 40
classroom use.
E-mail Abuse Investigations (2 of 2)
• Recommended steps
• Use the standard forensic analysis techniques
• Obtain an electronic copy of the suspect’s and victim’s e-mail
folder or data
• For Web-based e-mail investigations, use tools such as FTK’s
Internet Keyword Search option to extract all related e-mail
address information
• Examine header data of all messages of interest to the
investigation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 41
classroom use.
Attorney-Client Privilege Investigations (1 of
4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 42
classroom use.
Attorney-Client Privilege Investigations (2 of
4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 43
classroom use.
Attorney-Client Privilege Investigations (3 of
4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 44
classroom use.
Attorney-Client Privilege Investigations (4 of
4)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 45
classroom use.
Industrial Espionage Investigations (1 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 46
classroom use.
Industrial Espionage Investigations (2 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 47
classroom use.
Industrial Espionage Investigations (3 of 5)
• Guidelines (cont’d)
• Determine goal and scope of the investigation
• Initiate investigation after approval from management
• Planning considerations
• Examine all e-mail of suspected employees
• Search Internet newsgroups or message boards
• Initiate physical surveillance
• Examine facility physical access logs for sensitive areas
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 48
classroom use.
Industrial Espionage Investigations (4 of 5)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 49
classroom use.
Industrial Espionage Investigations (5 of 5)
• Steps (cont’d)
• Place surveillance systems at key locations
• Discreetly gather any additional evidence
• Collect all log data from networks and e-mail servers
• Report regularly to management and corporate attorneys
• Review the investigation’s scope with management and
corporate attorneys
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 50
classroom use.
Interviews and Interrogations in High-Tech
Investigations (1 of 2)
• Interrogation
• Process of trying to get a suspect to confess
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 51
classroom use.
Interviews and Interrogations in High-Tech
Investigations (2 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 52
classroom use.
Understanding Data Recovery Workstations
and Software
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 53
classroom use.
Setting Up Your Workstation for Digital
Forensics (1 of 2)
• Basic requirements
• A workstation running Windows 7 or later
• A write-blocker device
• Digital forensics acquisition tool
• Digital forensics analysis tool
• Target drive to receive the source or suspect disk data
• Spare PATA or SATA ports
• USB ports
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 54
classroom use.
Setting Up your Workstation for Digital
Forensics (2 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 55
classroom use.
Conducting an Investigation
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 56
classroom use.
Gathering the Evidence
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 57
classroom use.
Acquiring an Image of Evidence Media
•First rule of computer forensics
• Preserve the original evidence
•Conduct your analysis only on a copy of the data
•Several vendors provide MS-DOS, Linux, and
Windows acquisition tools
• Windows tools require a write-blocking device when
acquiring data from FAT or NTFS file systems
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 58
classroom use.
Acquiring an image of evidence media (1 of 2)
• Bit-stream copy
• Bit-by-bit copy of the original
storage medium File1 File2 Deleted file
• Exact copy of the original disk
• copy deleted files, e-mail
messages or recover file
Bit-stream copy
fragments
• known as “image” or “image
file”
• Backup copy backup copy
• Backup software only copy
known files
• Backup software cannot copy
deleted files, e-mail messages or
recover file fragments
59
Acquiring an image of evidence media (2 of 2)
Copy image file to a target disk that matches the
original disk’s manufacturer, size and model
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 60
classroom use.
Analyzing Your Digital Evidence (1 of 8)
• Your job is to recover data from:
• OS, applications, logs
• Deleted files
• File fragments
• Complete files
• Memory
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 61
classroom use.
Analyzing Your Digital Evidence (2 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 62
classroom use.
Analyzing Your Digital Evidence (3 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 63
classroom use.
Analyzing Your Digital Evidence (4 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 64
classroom use.
Analyzing Your Digital Evidence (5 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 65
classroom use.
Analyzing Your Digital Evidence (6 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 66
classroom use.
Analyzing Your Digital Evidence (7 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 67
classroom use.
Analyzing Your Digital Evidence (8 of 8)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 68
classroom use.
Completing the Case (1 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 69
classroom use.
Completing the Case (2 of 2)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 70
classroom use.
Critiquing the Case
•Ask yourself the following questions:
• How could you improve your performance in the case?
• Did you expect the results you found? Did the case
develop in ways you did not expect?
• Was the documentation as thorough as it could have
been?
• What feedback has been received from the requesting
source?
• Did you discover any new problems? If so, what are they?
• Did you use new techniques during the case or during
research?
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 71
classroom use.
Summary (1 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 72
classroom use.
Summary (2 of 3)
• Always use a systematic approach to your investigations
• Always plan a case taking into account the nature of the
case, case requirements, and gathering evidence
techniques
• Both criminal cases and corporate-policy violations can
go to court
• Plan for contingencies for any problems you might
encounter
• Keep track of the chain of custody of your evidence
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 73
classroom use.
Summary (3 of 3)
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 74
classroom use.