Digital Forensics Process Model
Digital Forensics Process Model
Introduction
The correct collection and documentation of digital evidence are vital for ensuring its admissibility in court.
Unlike what is shown in TV shows, actual investigations involve thorough paperwork starting at the crime
scene.
Detecting digital evidence can be difficult, especially with small devices like memory cards. Examiners often
deal with multiple devices such as running computers and wireless equipment, requiring careful handling.
Given the volatile nature of digital evidence, a forensic image or clone of the media is created for examination
to preserve the original data.
Handling digital crime scenes varies based on the case—criminal, civil, or administrative—but certain core
practices remain consistent.
Securing evidence is the first step, ensuring it is protected from accidental or intentional damage.
This includes:
• Limiting physical access to the crime scene from people like news media, nosy neighbours, and police
supervisors. Ensured by stringing crime scene tape, posting guards, or simply asking people to leave.
• Isolating digital devices from networks to prevent tampering.
○ For example, unplugging Ethernet cables or disconnecting wireless devices.
Devices must be properly isolated to prevent remote access and data compromise.
Removable Media
Removable storage media, such as memory cards, DVDs, external hard drives, and thumb drives, can store
massive amounts of data.
A single 64 GB memory card can hold around 7,000 complete Harry Potter book sets, highlighting the need
for careful search and examination.
Cell Phones
Cell phones often contain valuable data like texts, emails, and call logs.
These items can be used to show intent, determine the last person to come in contact with a murder victim,
establish alibis, determine approximate locations, and more.
However, they are vulnerable to remote wiping by the owner or provider.
Order of Volatility
This structured approach ensures critical volatile data is preserved first, minimizing the risk of loss.
Documentation methods include photographs, written notes, and sometimes video. The documentation
process begins as soon as investigators arrive at the scene, noting key details such as the date and time of
arrival, individuals present, and a thorough description of the evidence.
Photography
Photography is a vital component of documentation, capturing the scene before any evidence is disturbed.
Photos are often described as telling a story, which could help investigators walk a judge or jury through the
crime scene later.
Chain of Custody
Before evidence is presented in court, it must adhere to strict legal requirements, particularly a well-
documented chain of custody. This process is essential to ensure that the evidence is both reliable and
admissible.
For digital evidence, such as computers, it is crucial to document each instance where the evidence changes
hands or locations. Key steps in this process include:
• Collection at the crime scene
• Logging the item in at the lab
• Storage in secure facilities
• Checkout for analysis
• Check-in for storage again after analysis
Each of these steps must be meticulously recorded to maintain the integrity of the evidence. Without proper
documentation, the evidence may be considered inadmissible in court.
Marking Evidence
The first "link" in the chain of custody is the person collecting the evidence.
In some cases, IT staff or other personnel may be the first link in civil cases.
Cloning
A forensic clone, or bitstream image, is an exact, bit-for-bit copy of a hard drive, capturing every bit (1 or 0)
New Section 3 Page 3
A forensic clone, or bitstream image, is an exact, bit-for-bit copy of a hard drive, capturing every bit (1 or 0)
onto a separate, forensically clean media.
Purpose of Cloning
Given the volatility of digital evidence, it's crucial to avoid examining the original drive unless absolutely
necessary.
Cloning allows for a safe examination of the data, providing a “mulligan” if something goes wrong. Ideally,
the original drive is preserved securely, used only if needed for reimaging.
Hard drives are susceptible to failure. Having two clones gives you one to examine and one to fall back on.
Ideally, all examination is done on a clone as opposed to the original.
Value in eDiscovery
“[t]he process of identifying, preserving, collecting, preparing, reviewing, and producing electronically stored
information ‘ESI’) in the context of the legal process” - eDiscovery definition by Sedona Conference
Forensic cloning is valuable in the eDiscovery process, ensuring the preservation of relevant electronic data
(ESI). It serves as the gold standard, maintaining all data on media, not just active files. However, cloning can
be expensive and impractical in some situations.
Evidence in RAM
Volatile memory (RAM) can contain valuable evidence, including:
• Running processes
Hashing Example
To illustrate the impact of minor changes on hash values, consider the following example using SHA1:
• Original Phrase: "Go Steelers!"
SHA1 Hash: c924 4cac 47b3 4335 5aed 06f3 cc85 ea82 885f 9f3e
• Modified Phrase: "Go steelers!" (changed "S" to lowercase)
SHA1 Hash: 1a10 ffd1 db12 c88f 88e6 b070 561f 6124 f632 26ec
The significant difference in hash values demonstrates how even a small change alters the output drastically,
underscoring the reliability of hashes for verifying data integrity.
Uses of Hashing
1. Verification of Cloning: After creating a clone of an evidence drive, hash values can confirm that the clone is
an exact duplicate.
2. Integrity Checks: Hashes serve as integrity checks at various stages of the forensic process to ensure evidence
remains unaltered.
3. Exchange of Forensic Images: When sharing forensic images with other examiners (especially opposing sides),
the hash value can be compared with the original to verify that the image is a bit-for-bit copy.
4. Identification of Files: Hash values can identify specific files, aiding in the investigation process.
5. Documentation: All relevant hash values generated during the investigation should be recorded in the final
report, as they play a vital role in demonstrating the integrity of the evidence.
A well-structured report that balances technical details with readability is essential for the successful presentation
of forensic findings.