1. Discuss the validation requirements for the technology used in digital forensics. 2. List the ways suspects use the Internet in computer related crimes discussed in the lecture notes. 3. Discuss th

Berkeley College Cyber Crime

Lecture Notes-Chapter 12

PROCESSING OF EVIDENCE AND REPORT PREPARATION

  1. Digital Forensics: Science and Technology


  1. What Makes Digital Forensics a Science?

The processes used must be repeatable and proven.

If the examiner does a process that is haphazard or too varied from one examination to the next it is not scientific.


  1. Validation of Technology in Digital Forensic Investigations

1.Selecting a Forensic Tool:

  1. Is it read only? Yes or No.

  2. Can the examiner repeat results? What are the validation steps?

  3. Is the data verified and if so how?

  4. Was it designed for forensics, and are the images gathered valid?

Is it a commercial tool that is being used in forensics?

How is the image file created?


2. Designing a Proper Test Plan or Validation Plan

a. Scope of the Plan.

b. How often will the test be redone.

c. Create baseline for test.

d. Establish base parameters for tool.

e. Evaluate base parameters against manufacturer.

f. Run test image of baseline.

g. Compare results with tool manufacturer if available.

h. Repeat process and note differences.

  1. Aspects of Data Technology

1.Documentation Requirement: Analysts should continue the documentation process that was initiated by the evidence technicians at the crime scene.

2. Using a variety of software packages, it is now possible to thoroughly analyze

all of the information on each piece of storage media.

3. Investigators should properly document all forensic software utilized.

4. All media used in the analysis of computer evidence must be sterile prior to

analysis.

5. Licenses for all forensic software that is used in the analysis should be verified.

6. Examiners should note the condition of the suspect equipment prior to analysis.

7. Analysts should ensure that they are conducting the analysis on an image of the

suspect data and not the original. The original should be forensically pure.

8. Analysts should utilize appropriate manipulation techniques to defeat passwords

if traditional password cracking software doesn’t work.

9. Investigators may use software capable of restoring files that suspects attempted

to erase or hide.

10. Examiners should list all the file on the suspect drive after the recovery as part

of the documentation process.

  1. Evidence from Internet Activity and Smartphones

    1. Internet Activity: most cases will involve the Internet in some way.

1.Investigators must be able to document a relationship between the suspect and the evidence.

Links may include: IP addresses, domain names and e-mails.


2. Suspects may use the Internet for a variety of reasons:

a. Trading or sharing information.

b. Concealing their identity.

c. Assuming another identity.

d. Identifying or gathering information on victims.

e. Distributing information or misinformation.

f. Coordinating meetings, meeting sites or parcel drops.

    1. Smartphones and GPS Forensics:

Smartphones have become like minicomputers and may contain criminal evidence:

Read Only Memory (ROM)

Random Access memory(RAM)

Support memory cards

  1. Forensic Reports

All reports involving data analysis should include the date, time and

identification of investigative personnel for the following events:


  1. Evidence seizure: description of the physical condition of the seized evidence.

  2. Digital imaging and verification: software used.

  3. Application of forensic software: text searching, restoration of files, indexing, file reviewers, data carving, e-mail viewers.

  4. Special techniques or unique problems encountered.

  5. Consultation with outside sources.

HOMEWORK QUESTIONS CHAPTER 12

  1. Discuss the validation requirements for the technology used in digital forensics.

  2. List the ways suspects use the Internet in computer related crimes discussed in the lecture notes.

  3. Discuss the reporting requirements for forensic investigators described in the lecture notes.

  4. What makes digital forensics a science?