SCI4201 Lecture 2 - Investigative Process
SCI4201 Lecture 2 - Investigative Process
Dr. P. Nyoni
Lecture 2
The Investigative Process
Objectives
• Explain how to prepare a computer
investigation
• Apply a systematic approach to an
investigation
• Describe procedures for corporate high-tech
investigations
• Explain requirements for data recovery
workstations and software
• Describe how to conduct an investigation
• Explain how to complete and critique a case
Preparing a Computer
Investigation
Preparing a Computer
Investigation
• Role of computer forensics professional is
to gather evidence to prove that a suspect
committed a crime or violated a company
policy
• Collect evidence that can be offered in
court or at a corporate inquiry
– Investigate the suspect’s computer
– Preserve the evidence on a different computer
Preparing a Computer
Investigation
• Follow an accepted procedure to prepare
a case
• Chain of custody
– Route the evidence takes from the time you
find it until the case is closed or goes to court
Taking a Systematic Approach
• Steps for problem solving
– Make an initial assessment about the type of
case you are investigating
– Determine a preliminary design or approach
to the case
– Create a detailed checklist
– Determine the resources you need
– Obtain and copy an evidence disk drive
Taking a Systematic Approach
(continued)
• Steps for problem solving (continued)
– Identify the risks
– Mitigate or minimize the risks
– Test the design
– Analyze and recover the digital evidence
– Investigate the data you recover
– Complete the case report
– Critique the case
Assessing the Case
• Guidelines
– Determine whether this investigation involves
a possible industrial espionage incident
– Consult with corporate attorneys and upper
management
– Determine what information is needed to
substantiate the allegation
– Generate a list of keywords for disk forensics
and sniffer monitoring
– List and collect resources for the
investigation
Industrial Espionage
Investigations (continued)
• Steps (continued)
– Place surveillance systems
– Discreetly gather any additional evidence
– Collect all log data from networks and e-mail
servers
– Report regularly to management and
corporate attorneys
– Review the investigation’s scope with
management and corporate attorneys
Interviews and Interrogations in
High-Tech Investigations
• Becoming a skilled interviewer and
interrogator can take many years of
experience
• Interview
– Usually conducted to collect information from
a witness or suspect
• About specific facts related to an investigation
• Interrogation
– Trying to get a suspect to confess
Interviews and Interrogations in
High-Tech Investigations
• Role as a computing investigator
– To instruct the investigator conducting the
interview on what questions to ask
• And what the answers should be
• Ingredients for a successful interview or
interrogation
– Being patient throughout the session
– Repeating or rephrasing questions to zero in
on specific facts from a reluctant witness or
suspect
– Being tenacious
Understanding Data Recovery
Workstations and Software
• Investigations are conducted on a computer
forensics lab (or data-recovery lab)
• Computer forensics and data-recovery are
related but different
• Computer forensics workstation
– Specially configured personal computer
– Loaded with additional bays and forensics
software
• To avoid altering the evidence use:
– Forensics boot floppy disk OR cd
– Write-blocker devices
Write Blocker
• Connects a
hard drive in
trusted read-
only mode
• There are also
Linux boot CDs
that mount all
drives read-
only, such as
Helix and some
Knoppix
distributions
Setting Up your Computer for
Computer Forensics
• Basic requirements
– A workstation running Windows XP or Vista
– A write-blocker device
– Computer forensics acquisition tool
• Like FTK Imager
– Computer forensics analysis tool
• Like FTK
– Target drive to receive the source or suspect
disk data
– Spare PATA or SATA ports
– USB ports
Setting Up your Computer for
Computer Forensics (continued)
• Additional useful items
– Network interface card (NIC)
– Extra USB ports
– FireWire 400/800 ports
– SCSI card
– Disk editor tool
– Text editor tool
– Graphics viewer program
– Other specialized viewing tools
Conducting an Investigation
• Gather resources identified in
investigation plan
• Items needed
– Original storage media
– Evidence custody form
– Evidence container for the storage media
– Bit-stream imaging tool
– Forensic workstation to copy and examine
your evidence
– Securable evidence locker, cabinet, or safe
Gathering the Evidence
• Avoid damaging the evidence
• Steps
– Meet the IT manager to interview him
– Fill out the evidence form, have the IT
manager sign
– Place the evidence in a secure container
– Complete the evidence custody form
– Carry the evidence to the computer forensics
lab
– Create forensics copies (if possible)
– Secure evidence by locking the container
Acquiring an Image of Evidence
Media
• First rule of computer forensics
– Preserve the original evidence
• Conduct your analysis only on a copy of
the data