Module
Module
SEMI-FINAL MODULE
TOPICS:
Digital Forensics
Historical Background of Digital Forensics
DEVELOPMENT OF FORENSIC TOOLS
DIGITAL FORENSICS
Digital forensics, also known as Digital Forensic Science, is a field of forensic
science that deals with the recovery and processing of information stored in digital files,
usually in the context of cyber crime (Reith, M. et al). (2002). The term digital forensics
was first used as a synonym for electronic forensics, but it has since expanded to
encompass all applications capable of storing digital data (Carrier, B., 2001). The
discipline grew in a risky way during the 1990s, with roots in the personal computer
revolution of the late 1970s and early 1980s, and national policies did not emerge until the
early twenty-first century.
There are a number of uses in digital forensics investigations. Supporting or refuting a
hypothesis before criminal or civil courts is the most common one. Crime cases include
the alleged violation of laws specified by laws imposed by the police and prosecuted by
the state, such as murder, robbery and attack against the individual. On the other hand,
civil cases deal with the defense of the rights and property of persons (often related to
family disputes), but can also concern contractual disputes between private entities where
there may be a type of digital forensics called electronic discovery.
In addition to finding direct facts of a crime, digital forensics may be used to assign
evidence to individual persons, validate alibis or claims, assess motive, locate origins (as
in copyright cases), or authenticate records (Various, 2009). Investigations are far broader
in complexity than most types of forensic investigation, often requiring complicated
timelines or theories (where the normal goal is to answer a set of simpler questions)
(Carrier, 2006).
HISTORICAL BACKGROUND
1978, Florida
2
The first electronic crimes were recognized in the 1978 Florida Computer Crimes
Act, which contained laws against the unlawful manipulation or destruction of data on a
computer device. Over the next two years, the number of computer crimes committed
grew, and legislation was passed to address copyright, privacy/ harassment concerns like
cyberbullying, happy slapping, cyber hacking, online predators, and child pornography
(Casey, E.,2004).
1980s
Federal statutes are beginning to include cyber offences (Phillip, A. et al. 2009).
Canada was the first country to enact law in 1983. The US Federal Computer Fraud and
Abuse Act was passed in 1986, followed by Australian changes to its criminal laws in
1989, and the British Computer Misuse Act in 1990. (Casey, E., 2004).
1980s-1990s
Specialist departments were formed to manage the technological aspects of
inquiries.
In 1984, the FBI formed a Data Analysis and Response Team, and the British
Metropolitan Police fraud squad established a computer crime section the next year. Many
of the early founders of these associations were not only law enforcement officers, but
also tech hobbyists who were responsible for the field's initial study and direction (Mohay,
G. 2003).
Cliff Stoll's investigation of hacker Markus Hess in 1986 was one of the first realistic
or at least well- publicized cases of digital forensics (Sommer, P., 2004).
The word "computer forensics" did not appear in scholarly literature until 1992 (though it
had been in use informally before that); Collier and Spaul tried to defend this emerging
discipline to the field of forensic science in a paper published in 1992. (Reith, M., et al.
2002).
Since the late 1990s, mobile devices have been more commonly available, moving past
mere contact devices and being discovered to be rich sources of data, including for crimes
not typically identified with digital forensics (SG Punja, 2008). Despite this, due to
problems with the proprietary design of computers, digital phone research has lagged
behind conventional computing media. Throughout the 1990s, there was a strong demand
for these fresh and essential investigation services. The pressure on central units
contributes to the formation of state and even local level organizations to better handle the
burden.
2000s
2001
To build a nationwide cyber crime system, the British National Hi-Tech Crime Unit
was formed with personnel both centrally based in London and with the numerous regional
police forces. In 2006, the unit was (SOCA). absorbed by the Serious Organized Crime
Organization
The ad-hoc instruments and techniques created by these hobbyist practitioners during this
time period gave rise to the science of digital forensics. This is in contrast to other
forensics fields that have been built on the backs of modern research.
3
2002
In addition to the several agencies and associations have released digital forensics
standards. The Scientific Working Group on Digital Evidence published a report titled
"Best practices for Computer Forensics" (SWGDE).
2004
The European Lead International Treaty on Cybercrime has come into effect, with
the aim of bringing together national laws on computer crime, forensic procedures, and
international collaboration. The treaty has been signed by 43 countries (including the
United States, Canada, Japan, South Africa, the United Kingdom, and other European
nations) and ratified by 16. (Eoghan, C., 2004).
2005
The ISO standard (ISO 17025), General (ISO 17025), requirements for the
competence of testing and calibration laboratories was published.
2009
Paris A paper by Peterson and Shenoi, "Digital Forensic Research: The Good, the
Bad and the Unaddressed" established a bias against Windows operating systems in
digital forensics research (Peterson, G. and Shenoi, S.,2009).
2010
A February 2010 report by the United States Joint varo Forces Command
concluded:
Through cyberspace, enemies will target industry, arve academies, government, as
well as the military obrin the air, land, maritime, and space domains. In much the same
way that air power transformed the battlefield of World War II, cyberspace has Biber
fractured the physical barriers that shield a nation from attacks on its commerce and
communication.
2003). These tools allowed examiners to produce an exact copy of a piece of digital media
to work on, leaving the original disk intact for verification.
By the end of the 1990s, as demand for digital evidence grew more advanced
commercial tools such as EnCase and FTK were created, enabling analysts to analyze
copies of media without using any live forensics (Eoghan, C.,2004). More recently, a
movement towards "live memory forensics" has evolved resulting in the availability of tools
such as Windows SCOPE.
BRANCHES OF DIGITAL FORENSICS
Digital forensics investigation is not restricted to collect data merely from the
computer, as laws are violated by the offenders and small digital devices (e.g. laptops,
smartphones, flash drives) are now widely used. Some of these devices have volatile
memory and some have non-volatile memory.
Suficient methodologies are available to retrieve data from volatile memory,
however, there is lack of comprehensive methodology or a structure for data retrieval from
non-volatile memory sources (Wayne, J. 2004). (Wayne, J., 2004). Depending on the type
of computers, media or objects, digital forensics investigaton is branched into different
forms.
1. COMPUTER FORENSICS
Data forensics determining the actual status of a digital item, such as a computer,
storage media, or electronic record (Yasinsac, A., et al., 2003). (A. Yasinsac et al, 2003)
Computers, embedded systems (digital nachines with limited computing capacity and on
board memory), and static memory (such as USB pen drives) are all examples of this
discipline such as USB pen drives). Computer forensics san handle a wide variety of data,
from logs (such as internet history) to the individual files on the hard drive.
2. MOBILE DEVICE FORENSICS
The retrieval of digital evidence or data from a mobile device is the subject of
mobile device forensics, which is a sub-branch of digital computer forensics, handheld
devices have built-in networking systems and, in most cases, proprietary retrieval
mechanisms. Rather than in-depth retrieval of lost records, investigations typically rely on
basic data such as call data and correspondence (SMS/ Email) (Eoghan, C., 2004).
Mobile devices may also provide position data, either through built-in gps/location
monitoring or through cell site logs, which monitor the devices within their range.
3. NETWORK FORENSICS
Network forensics is concerned with the tracking and analysis of computer network
data, both local and WAN/internet, for the purposes of collecting intelligence, obtaining
data, or detecting intrusions (Palmer, G. 2001). G. Palmer, G. Palmer, G. Palmer, G.
Palmer, G. Palmer, G. Palmer, G. In most cases, traffic is detected at the packet stage
and then saved for further processing or filtered in real time. Data on the network is always
unreliable and seldom logged.
4. FORENSIC DATA ANALYSIS
Digital forensics has a division called forensic data analysis. It looks at organized
data with the aim of uncovering and examining patterns in financial crime-related fraud.
5. DATABASE FORENSICS
5
Database forensics is a subset of digital forensics that deals with the investigaton of
databases and their metadata (Olivier M., 2009). To build a timeline or recover relevant
records, investigators use database contents, log files, and in-RAM data.
LEARNING ASSESSMENT
Instruction: Read carefully and answer the following questions. Observe correct spelling
and grammar.
1. Briefly discuss the law enforcement response to and electronic evidence.
__________________________________________________________________
_________________________________________________________________.
2. Explain in 3 sentences why is it called electronic evidence?
__________________________________________________________________
_________________________________________________________________.
3. Make a one paragraph discussion on Digital Forensics.
__________________________________________________________________
__________________________________________________________________.
CYBERCRIME INVESTIGATION
including, but not limited to, hacking, cracking, dissemination of viruses and malware,
DDoS attacks, internet fraud, identity theft and social engineering.
Digital Forensics
When ample data on cybercrime has been obtained by investigators, it is time to
analyze the digital networks that were affected or those that were supposed to be involved
in the origin of the attack. This method includes analyzing raw data, hard drives, file
systems, caching devices, RAM memory, and more from the network link. When the
forensic work begins, the participating investigator can monitor all the paths involved in
searching for fingerprints in device archives, network and service logs, emails, web
browsing history, and etc.
Address books
E-mail files
Audio/video files
Image/graphics files
Calendars
9
Internet bookmarks/favorites
Database files
Spreadsheet files
Documents or text files
USER-PROTECTED FILES
In a number of ways, users have the ability to hide evidence. They can, for
instance, encrypt or password-protect information that is important to them. They can also
hide files on a hard disk or inside other files or, under an innocuous name, intentionally
hide incriminating proof files.
Compressed files.
Misnamed files.
Encrypted files.
Password-protected files.
Hidden files.
Steganography.
Proof can also be found in files and other data areas created as a routine function
of the computer's operating system. In certain cases, the user is not aware that data is
being written in these areas. Passwords, Internet behavior, and temporary backup files are
some examples of data that can also be recovered and analyzed.
NOTE:
Evidence value can be given for file components, including date and time of
creation, modification, deletion, access, user name or identity, and file attributes. You can
change all of this information even by turning on the machine.
COMPUTER-CREATED FILES
Backup files.
Log files.
Configuration files.
Printer spool files.
Cookies.
Swap files.
Hidden files.
System files.
History files.
Temporary files.
OTHER DATA AREAS
Bad clusters
Computer date, time, and password.
Deleted files.
Free space.
Hidden partitions.
Lost clusters.
Metadata.
Other partitions.
Reserved areas
10
Slack space.
Software registration information.
System areas
Unallocated space.
MEMORY
Description:
Within the computer's removable circuit board(s). When the machine is shut off,
information stored here is normally not kept.
Primary Uses:
Stores user's programs and data while computer is in operation.
Potential Evidence:
The device itself may be evidence of component theft, counterfeiting, or remarking.
Answering Machines
Description:
An electronic device that is part of a telephone or connected between a telephone
and the landline connection. Some models use a magnetic tape or tapes, while others use
an electronic (digital) recording system.
Primary Uses:
Records caller voice messages when the caller is unavailable or decides not to
respond to a telephone call. Typically, before recording the message, a message from the
calling party is played.
Potential Evidence:
Voice messages and, in some situations, time and date information about when the
message was left can be stored by responding machines. Other voice recordings can also
include them.
Caller identification information
Deleted messages.
Last number called.
Memo. Phone numbers and
names.
Tapes.
Digital Cameras
Description:
The camera is a digital image and video recording system with associated storage
media and conversion hardware capable of converting images and video to computer
media.
Primary Uses:
Digital cameras record pictures and/or video in a or editing to computer storage
devices. RA digital format that is easily transferred for viewing and/
Potential Evidence:
12
Images.
Time and date stamp.
Removable cartridges.
Video.
Sound.
Handheld Devices (Personal Digital Assistants [PDAs], Electronic Organizers)
Description:
A small interface that can provide computing, telephone/fax, paging, networking,
and other features is a private digital assistant (PDA). Normally, it is used as a personal
organizer. A portable machine exceeds a desktop computer system's maximum
functionality. Some can contain PC card slots that can hold a modem, hard drive, or other
device, but some do not contain disk drives. They generally have the ability to synchronize
their data with other computer systems, most often via a cradle connection (see photo).
Try to locate the associated handheld device if a cradle is present.
Primary Uses:
Handheld computing, storage, and communication devices capable of storage of
information.
Potential Evidence:
Address book.
Appointment calendars/information.
Documents.
E-mail.
Handwriting.
Password.
Phone book.
Text messages.
Voice messages.
Hard Drives
Description:
A sealed box with rigid plates (disks) coated with a material capable of magnetically
storing data. In the case of a PC, it can be found both externally and in a standalone case.
Primary Uses:
Storage of information such as computer programs, text, pictures, video,
multimedia files, etc Potential Evidence:
See potential evidence under computer systems.
Memory Cards
Description:
13
Removable electronic storage devices which, when power is removed from the
card, do not lose information. Recovery of deleted images from memory cards can also be
possible. Memory cards in a credit card module can store hundreds of pictures. Used on a
wide range of devices, such as laptops, digital cameras and PDAS. Memory sticks, smart
cards, flash memory and flash cards are examples.
Primary Uses:
Provides additional, removable methods of storing and transporting information.
Potential Evidence:
See potential evidence under computer systems.
Modems
Description:
Modems, internal and external (analog, DSL, ISDN, cable), wireless modems, PC
cards.
Primary Uses:
A modem is used to promote promote electronic communication by allowing other
computers and/ or networks to be accessed by a computer through telephone, wireless or
other means of communication.
Potential Evidence:
The device itself.
Network
Local Area Network (LAN) Card or Network Interface Card (NIC)
Description:
Network cards, associated cables. Network cards also can be wireless.
Primary Uses:
A LAN/NIC card is used to connect computers. Cards allow for the exchange of
information and resource sharing.
Potential Evidence:
The device itself, MAC (media access control) access address.
Routers, Hubs, and Switches
Description:
In networked computer networks, networks, certain computers or networks is
provided by routers, switches, electronic devices are used. A means of linking various and
hubs. The existence of several cable connections will often identify them.
Primary Uses:
Equipment used to distribute and facilitate the distribution of data through networks.
Potential Evidence:
14
Ink cartridges.
Network identity/information. Superimposed images on the roller. Time and date
stamp.
Scanners
Description:
An optical device connected to a computer, which passes a document past a
scanning device (or vice versa) and sends it to the computer as a file.
Primary Uses:
Converts documents, pictures, etc., to electronic files, which can then be viewed,
manipulated, or transmitted on a computer.
Potential Evidence:
Proof may be the unit itself. Getting the ability to search may help show criminal
activity (e.g., child pornography, check fraud, counterfeiting, identity theft). In addition,
imperfections such as marks on the glass can allow a scanner used to process documents
to be identified uniquely.
Telephones
Description:
A handset that is either on its own (like mobile phones) or a remote base station
(wireless) or directly connected to a landline device. It draws power from the internal
battery, the electrical plug-in, or the telephone device directly.
Primary Uses:
Two-way communication from one instrument to another using land lines, radio
transmission, cellular networks, or a combination. Phones are capable of retrieving
information.
15
Potential Evidence:
Names, phone numbers, and caller id information can be stored on several
telephones. In addition, some mobile phones may store information about appointments,
receive electronic mail and sites, and can serve as a voice recorder.
Appointment calendars/information.
Password.
Caller identification information.
Phone book.
Electronic serial number
Text messages.
E-mail.
Voice mail
Memo.
Web browsers.
Copiers
Some copiers keep records of user access and the history of copies made.
Once/print scan copiers with many features allow documents to be scanned into memory
once and then printed later.
Potential Evidence:
Documents.
User usage log.
Time and date stamp.
E-mail.
Facsimile Machines
Preprogrammed phone numbers and a history of sent and received documents can
be stored by facsimile (fax) machines. In addition, some contain memory that allows
scanning and sending multiple-page faxes at a later time, as well as enabling incoming
faxes to be stored in memory and printed later. Some can store incoming and/or outgoing
faxes on hundreds of pages.
Potential Evidence:
Documents.
Phone numbers.
Film cartridge.
Send/receive log.
Global Positioning Systems (GPS)
Via destination information, way points, and routes, Global Global Positioning
Systems may provide information on prior travel. Some store the prior destinations
automatically and provide travel logs.
Potential Evidence:
Home.
Way point coordinates.
Previous destinations.
Way point name.
Travel logs.
Departments should provide processing software for general crime scenes (e.g.,
cameras, notepads, sketchpads, evidence forms, crime scene tape, markers)
Additional elements that may be helpful at an electronic crime scene are as follows.
Documentation Tools
Cable tags.
Indelible felt tip markers.
Stick-on labels.
Disassembly and Removal Tools
A variety of nonmagnetic sizes and types of:
Flat-blade and Philips-type screwdrivers.
Hex-nut drivers.
Needle-nose pliers.
Secure-bit drivers.
Small tweezers.
Specialized screwdrivers (manufacturer-specific, e.g., Compaq, Macintosh).
Standard pliers.
Star-type nut drivers.
Wire cutters.
Package and Transport Supplies
Antistatic bags.
Antistatic bubble wrap.
Cable ties.
Evidence bags.
Evidence tape.
Packing materials (avoid materials that can produce static electricity such as
styrofoam or styrofoam peanuts).
Packing tape. sbivong bluoda at da etnomtisq
Sturdy boxes of various sizes.
Other Items
Items that also should be included within a department's tool kit are:
Gloves.
Hand truck.
Large rubber bands.
List of contact telephone numbers for assistance.
Magnifying glass.
Printer paper.
Seizure disk.
Small flashlight.
LEARNING ACTIVITTY
18
Instruction: Read carefully the questions and answer based in your own words. Observe
correct spelling and grammar.
1. Differentiate Cybercrime Investigation from Criminal Investigation.
__________________________________________________________________
________________________________________________________________.
Measures should be taken by the first respondent to ensure the safety of all
individuals at the scene and to protect the integrity of all data, both conventional
electronic. All operations should comply with departmental policy, state, and local laws.
PROCEDURE:
After securing the scene and all personnel on the scene, possible evidence, both
traditional (physical) and electronic, should be visually detected by the first responder and
determined whether perishable evidence remains. The first responder should determine
and devise a search plan for the scene.
1. Secure and Evaluate the Scene:
a. Follow the jurisdictional policy to safeguard the crime scene. This will require
ensuring that all individuals from the immediate area from which evidence is to be
obtained are excluded. At this stage in the investigation, do not alter the state of any
electronic system: if it is off, leave it off. If it is on, keep it on.
b. Secure perishable records, physically and electronically. Perishable data can be
found on pagers, caller ID boxes, electronic organizers, mobile phones, and other similar
items. The first responder should always bear in mind that any computer containing
perishable data should be protected, recorded, and/or photographed immediately.
c. Identify device-attached telephone lines, such as caller ID boxes and modems.
Log disconnect and mark each telephone line from the wall instead of the device, where
19
feasible. There may also be other communication lines present for LAN/ethernet
connections.
Contact the required personnel/agency in all situations.
TAKE NOTE:
On keyboards, the computer mouse, CDs, or 0981 other components, residual
fingerprints or other physical traces may be preserved. Chemicals used processing latent
prints may impair equipment and data. Latent prints should then be collected after
electronic evidence recovery is complete.
3. Documenting the Scene
By documentation of the scene, permanent historical record of the scene is created.
Reporting is a continuous operation does throughout the investigation. It is important to
accurately document the location and condition of computers, storage media, other
electronic devices, and traditional evidence.
PROCEDURE:
The scene should be documented in detail.
1. Initial documentation of the physical scene:
a. Observe and record the physical scene, such as the position of the cursor and
the location of pieces relative to each other (e.g., a mouse on the left side of the
computer may indicate a left-handed user).
b. Document the computer system's condition and position, including the
computer's power status (on, off, or in sleep mode). There are status lights on most
computers that show that the machine is on. Similarly, the machine is presumably
on if fan noise is detected. In addition, if the computer device is warm, it could also
mean that it is on or has recently been switched off.
20
c. Identify relevant electronic components that will not be collected and document
them.
d. Photograph the entire scene as noted by the first responder to create a visual
record. Where possible, the complete room should be captured with 360 degrees of
coverage.
e. Photograph the front of the computer as well as the screen of the monitor and
other items. Take written notes on what happens on the display screen as well.
Active programs can require videotaping or more comprehensive display screen
operation documentation.
2. Evidence Collection
A search warrant may include the search for and collection of evidence at an
electronic crime scene.
Computer evidence must be treated cautiously and in a way that maintains its evidentiary
value, as all other evidence. This applies not only to an object or device's physical
integrity, but also to the electronic data it holds.
Therefore, some kinds of computer proof require special collection, packaging, and
transport. Data that may be susceptible to damage or alteration from electromagnetic
fields, such as those produced by static electricity, magnets, radio transmitters and other
devices, should be considered to be safe.
According to According to departmental guidelines, electronic evidence should be
gathered. The following procedures are suggested in the absence host of departmental
guidance detailing procedures for electronic processing of evidence.
Note:
It is presumed that location and documentation have been completed before the
compilation of evidence. Recognize that there might be other forms of evidence, such as
trace, biological, or latent prints. Destructive methods (e.g., the use of chemical
processing fingerprints) also should be delayed until the retrieval of electronic evidence is
completed.
Non-Electronic Evidence
In the prosecution of electronic crime, retrieving non-electronic evidence may be
critical. Proper care should be taken to ensure the recovery and preservation of such
evidence. There may be other types of objects appropriate for subsequent review of
electronic evidence (e.g. written passwords and other handwritten documents, blank
indented paper pads, hardware and software manuals, schedules, literature, text or
graphic machine prints, and photographs) and should be protected and stored for future
analysis.
Such items are often in close proximity to the system or associated hardware
objects. In accordance with departmental policies, all proof should be found, protected,
and stored.
Procedure:
a. All actions you take and any modifications you find resulting from your actions on
the display, screen, printer, or other peripherals are documented in notes.
b. Observe the monitor and decide whether, on or off, it is in sleep mode. Then
identify which of the following circumstances refers to that situation and follow the
steps.
Situation 1: Monitor is on and work product and/or desktop is visible.
1. Photograph screen and record information displayed.
Situation 2: Monitor is on and screen is blank (sleep mode) or screen saver (picture) is
visible.
1. Slightly move the mouse (without pushing buttons). The screen will adjust and display a
work item or request a password.
2. DO NOT execute any other keystrokes or mouse operations if mouse movement
doesnot trigger a change in the screen .
3. Photograph your computer and record the displayed detail.
Situation 3: Monitor is off.
1. Make a note of the status of "off."
2. Switch on the monitor, then decide if the monitor status in either situation 1 or 2 above
is as stated and follow those steps.
3. Remove the power source cable from the monitor - NOT from the wall socket -
regardless of the power state of the computer (on, off, or sleep mode). When dealing with
a laptop, remove the battery pack, in addition to removing the power cord. The battery is
removed to prevent the device from having any power. In lieu of a floppy drive or CD drive,
some laptops have a second battery in the multipurpose bay. Check for this possibility and
remove that battery as well.
4. Check for connectivity outside (e.g., telephone modem, cable, ISDN, DSL). Try to locate
the telephone number if a telephone connection is present.
5. Remove any floppy disks that are present, package the disc separately, and mark the
package to prevent harm to possible evidence. Insert either a seizure or a blank floppy
disk, if appropriate. Do NOT uninstall CDs or touch the drive on the CD.
6. Put tape over all the slots of the drive and over the power connector.
7. Make a record, model, and serial numbers. 8. Photograph and diagram the contacts
and the related cables of the device.
22
9. Mark all connectors and cable ends (including peripheral system connections) in order
to enable precise reassembly at a later time. Mark unused communication ports as
"unused." an attempt to classify other storage media, identify laptop computer docking
stations.
10. According to departmental procedures, record or log facts.
11. Package the components as fragile cargo if transport is necessary.
PACKAGING, TRANSPORTATION, AND STORAGE
Data stored on a device or other medium should not be added, changed, or lost by actions
taken. Computers are susceptible to temperature, humidity, physical shock, static
electricity, and magnetic sources, are fragile electronic instruments. Therefore, and when
packing, shipping, and storing electronic data, special precautions should be taken.
Documenting its packaging, shipping, and storage to preserve the chain of custody of
electronic data.
Ensure that appropriate protocols for the packaging, transport and storage of
electronic evidence are followed to prevent data modification, loss, physical harm or
destruction.
PACKAGING PROCEDURE:
1. Ensure that all electronic data obtained is correctly registered, labeled, inventorized
prior to packaging.
2. Pay careful attention to latent or trace proof and take steps to maintain it.
3. In antistatic packaging, box magnetic media (paper or antistatic plastic bags).
4. Stop the use of materials, such as regular plastic bags, that can generate static
electricity.
5. Stop folding computer media, bending, or scratching them.
6. Ensure proper labeling of all containers used to store proof.
Note:
When collecting multiple computer systems, as found (e.g. System A-mouse,
keyboard, monitor, mark each system so that it can be reassembled main base unit;
System B-mouse, keyboard, monitor, main base unit).
TRANSPORTATION PROCEDURE:
a. Keep magnetic sources away from electronic data. Examples of objects that can
destroy electronic evidence are radio transmitters, speaker magnets and heated seats.
b. For lengthy periods of time, stop storing electronic evidence in vehicles. Electronic data
may be impaired by conditions of extreme heat, cold, or the humidity.
c. To prevent shock and unnecessary movements, ensure that computers and other
components which are not packaged in containers are secured in the car. Computers can,
for example, be positioned on the vehicle floor and monitors may be placed with the
screen down on the seat and protected by a seat belt.
23
STORAGE PROCEDURE:
a. Ensure that proof is stored in compliance with departmental policies.
b. In a safe area away from extremes of temperature and humidity, store proof.
Shield it from moisture, dust and other harmful particles or pollutants from magnetic
sources.
Note:
Be mindful that, as a result of prolonged storage, possible evidence such as dates, times,
and device configurations can be lost. As batteries have a limited life, if they fail, data may
be lost. Reasonable staff (e.g. evidence custodian, laboratory chief, forensic examiner)
should also be told that a battery-powered system is in need of urgent attention.
IDENTIFICATION
In the identification phase, preliminary knowledge of the cybercrime case is
collected before collecting digital data. This preliminary information is the same as that
requested during a typical criminal investigation. The investigator seeks to answer the
questions below: Who was involved?
a. What happened?
b. When did the cybercrime occur?
c. Where did the cybercrime occur?
d. How did the cybercrime occur?
24
The answers to these questions will provide investigators with guidance on how to
proceed with the case.
COLLECTION
With regard to cybercrime, the scene of the crime is not limited to the physical
location of digital devices used in cybercrime commissions and/or threatened by
cybercrime.
The cybercrime crime scene also includes:
25
ACQUISITION
Different approaches to acquisition performance exist. The approach adopted
depends on the digital device type. The procedure for obtaining evidence from a computer
hard drive, for example, differs from the procedure needed for obtaining digital evidence
from mobile devices, such as smartphones.
Evidence is extracted from the seized digital devices at the forensic laboratory
unless live acquisition is performed (static acquisition). Digital evidence should be
acquired at the forensics laboratory in a way that preserves the integrity of the evidence
(ensuring that the data is unaltered), that is, in a forensically sound manner. To achieve
this, the tools and techniques used to acquire digital evidence must prevent, or at least
27
minimize, changes to the data when this is not possible. The instruments and methods
used should be valid and reliable. Before their use, the limitations of these instruments
and techniques should be identified and considered.
As the primary source of evidence, the seized digital devices are considered. No
data from the primary source is obtained by the digital forensics analyst. Instead, the
contents of that device are made into a duplicate and the analyst works on the copy. In
order to maintain the integrity of digital evidence, this duplicate copy of the content of the
digital device (imaging) is created before a static acquisition is carried out.
A cryptographic hash value is calculated for the original to check if the duplicate is
an exact copy of the original, and a duplicate is calculated using mathematical
computations; if it matches, the contents of the copy are a mirror image (duplicate) of the
original material. In order to prevent the modification of data during the copying process, a
write blocker designed to prevent the alteration of data during the copying process should
be used before extraction wherever possible. It is important to remember that the above
mentioned acquisition process applies specifically to computers. A different method is
followed when collecting data from cell phones and similar devices, where the memory
storage can not be physically removed from the device to create an image.
There are two types of extraction performed: the
1. Physical Extraction
This includes looking for and collecting evidence from the place inside a digital
system where the evidence resides, such as a computer's hard drive (Maras, 2014). A
physical extraction may be conducted by:
a. Keyword Searches (based on terms provided by the investigator)
b. File Carving (search "based on the header, footer, and other identifiers"),
c. Examining Unallocated Space (space available on a system because it was
never used or because the information in it was deleted and partitions, which
separates segments of the hard drive from each other.
2. Logical Extraction
This includes looking for and collecting proof from the position it resides relative to
a computer operating system's file system, which is used to keep track of the names and
locations of files located on a storage medium, such as a hard disk (Maras, 2014).
The type of logical extraction that is carried out depends on the digital computer,
the file system, the device apps, and the operating system. Logical extraction requires
collecting data from active and deleted files, file systems, unallocated and unused space,
and data that is compressed, encrypted and password protected (Nelson, et al., 2015).
There should be documentation of the entire acquisition process. This paperwork should
contain (Maras, 2014):
1. Detailed information about the digital devices from which evidence was extracted
2. The hardware and software used to acquire the Analysis evidence
3. The manner in which the evidence was acquired (how it was obtained),
4. When it was obtained
28
PRESERVATION
Preservation of data aims to safeguard digital evidence from alteration. In each step
of the handling of digital evidence (ISO/IEC 27037), the credibility of digital evidence
should be maintained.
First responders, investigators, crime scene technicians and/or specialists in digital
forensics must show, whenever possible, that during the identification, processing and
acquisition process, digital evidence has not been altered; the ability to do so, of course,
depends on the digital device (computer and cell phones) and the situations they meet
(need to quickly preserve data).
A chain of custody (the mechanism by which police protect the scene of the crime
(or incident) and evidence over the life cycle of a case) must be preserved to illustrate this
(Maras, 2014). It includes information about:
a. Who collected the evidence.
b. Where and how the evidence was collected.
c. Which individuals took possession of the evidence; and
d. When they took possession of it.
In the chain of custody the following must be documented:
a. Names, titles, and contact information of the individuals who identified, collected,
and acquired the evidence.
b. Any other individuals the evidence was transferred.
c. Details about the evidence that was transferred.
d. The time and date of transfer; and
e. The purpose of the transfer.
ANALYSIS PHASE
29
The system's digital history is collected, data is stored, and events are recreated.
Before analyzing the digital evidence, the laboratory's computer forensics analyst must be
mindful of the search's targets, as well as any background information of the case and all
other specifics obtained during the examination that may aid the forensics analyst in this
phase (IP address or MAC addresses).
Different types of assessments are performed depending on the type of digital proof
sought, such as network, file system, program, film, photograph, and media analysis
(analysis of data on storage device). Files are analysed to identify their sources, as well as
when and where data was created, modified, viewed, copied, or uploaded, as well as to
connect these files to remote storage devices, such as cloud-based storage (Carrier,
2005). Depending on the cybercrime situation, different types of digital proof are found
(emails, text messages, geolocation, word processing documents, photos, images, and
chat logs).
The aim of these experiments is to reconstruct the criminal justice system (or event
reconstruction). Through the identification, collection, and connection of evidence, the
reconstruction of the occurrence seeks to determine who was responsible for the accident,
what happened, where the event occurred, when the event occurred, and how the event
occurred (revealing the "big picture" or essence of an event).
LEARNING ACTIVITY
Instructor: Read carefully the questions and give the best answer in your own words.
Observe correct spelling and grammar.
A. Discuss the procedures in conducting the following investigative process.
1. Securing and Evaluating the Scene
__________________________________________________________________
__________________________________________________________________.
4. Evidence Collection
__________________________________________________________________
__________________________________________________________________.
5. Retrieval of Non-Electronic Evidence
__________________________________________________________________
__________________________________________________________________.
6. Packaging, Transportation, and Storage of Electronic Evidences
__________________________________________________________________
________________________________________________________________.
B. Instruction: Read carefully the questions and give the best answer in your own
words. Observe correct spelling and grammar.
1. Discuss comprehensively the FOUR PHASES involved in the initial handling of digital
evidence
31
a. Identification
b. Collection
c. Acquisition
d. Preservation
2. Explain the importance of reporting and discuss how are you going to write a report of
your findings oil on the investigation of Electronic Evidence.
3. What is the importance of knowing and observing the Legal and Ethical Obligations of a
Cyber Crime Investigator?
Reference:
Caballero, N.S. (2022). Basics of Cybercrime Investigation and Environmental Laws and
Protection: A learning and Teaching Module for Criminology Students and Instructors.
https://www.collegesidekick.com/study-docs/1287336