Collecting Evidence
Collecting Evidence
Collecting Evidence
Topics
Crime scenes
Documenting
Chain of Custody
Forensic cloning
Live and Dead Systems
Hashing
Final Report
Crime Scenes and
Collecting Evidence
Securing the Scene
Unnecessary people must be kept out
Network connections place data at risk
Once it is assured that volatile data won't
be lost, disconnect network cables
Isolate seized phoned from network
Image from
crimescenecleanupdetroit.com
Removable Media
Valuable evidence
Text messages, email, call logs, contacts
Interacting with the phone can change
data
Apple's "Find My iPhone" app can be used to remotely
wipe the phone
Isolating Cell Phones
Photographs
Written notes
Video
Record precise details
Type, make, model, serial number
Whether a device is on or off
Network connections
Peripheral connections like printers
Document and label cables
Photography
No set standard
Chronological is common
Those notes will guide you in court
later
Notescan be discoverable and may be
seen by other side
Don't draw conclusions or speculate
Chain of Custody
Marking Evidence
Proprietary
EnCase (.E01) – Actually "Expert Witness"
AccessData Custom Content Image (.AD1)
Open
Advanced Forensics Format (AFF)
Open format, see link Ch 4a
Raw (.dd or .001)
Direct uncompressed disk image
Risks and Challenges