0% found this document useful (0 votes)
57 views34 pages

FALLSEM2023-24 CSE4004 ETH VL2023240103594 2023-09-01 Reference-Material-I

Uploaded by

lol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views34 pages

FALLSEM2023-24 CSE4004 ETH VL2023240103594 2023-09-01 Reference-Material-I

Uploaded by

lol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Seizing Digital Evidence at

the Scene
Seizing Digital Evidence at the Scene
• Law enforcement can seize evidence
• With a proper warrant
• When seizing computer evidence in criminal
investigations
• Follow U.S. DoJ standards for seizing digital data
• Civil investigations follow same rules
• Require less documentation though
• Consult with your attorney for extra guidelines
Preparing to Acquire Digital Evidence
• The evidence you acquire at the scene depends on the nature of the
case
• And the alleged crime or violation
• Ask your supervisor or senior forensics examiner in your organization
the following questions:
• Do you need to take the entire computer and all peripherals and media in the
immediate area?
• How are you going to protect the computer and media while transporting
them to your lab?
• Is the computer powered on when you arrive?
Preparing to Acquire Digital Evidence
(continued)
• Ask your supervisor or senior forensics examiner in your organization
the following questions (continued):
• Is the suspect you’re investigating in the immediate area of the computer?
• Is it possible the suspect damaged or destroyed the computer, peripherals, or
media?
• Will you have to separate the suspect from the computer?
Processing an Incident or Crime Scene
• Guidelines
• Keep a journal to document your activities
• Secure the scene
• Be professional and courteous with onlookers
• Remove people who are not part of the investigation
• Take video and still recordings of the area around the
computer
• Pay attention to details
• Sketch the incident or crime scene
• Check computers as soon as possible
Handling a Running Computer
• Old rule: pull the plug
• Don’t cut electrical power to a running system unless it’s an older Windows 9x
or MS-DOS system
• Perform a live acquisition if possible
• When shutting down Win XP or later, or Linux/Unix, perform a normal
shutdown, to preserve log files
• Save data from current applications as safely as possible
• Record all active windows or shell sessions
• Photograph the screen
Handling a Running Computer
• Make notes of everything you do when copying data from a live suspect
computer
• Save open files to an external hard drive or a network share
• If that is not possible, save them with new names
• Close applications and shut down the computer
Processing an Incident or Crime Scene
(continued)
• Guidelines (continued)
• Bag and tag the evidence, following these steps:
• Assign one person to collect and log all evidence
• Tag all evidence you collect with the current date and time, serial numbers or unique
features, make and model, and the name of the person who collected it
• Maintain two separate logs of collected evidence
• Maintain constant control of the collected evidence and the crime or incident scene
Processing an Incident or Crime Scene
(continued)
• Guidelines (continued)
• Look for information related to the investigation
• Passwords, passphrases, PINs, bank accounts
• Look at papers, in drawers, in trash cans
• Collect documentation and media related to the investigation
• Hardware, software, backup media, documentation, manuals
Processing Data Centers with RAID Systems
• Sparse acquisition
• Technique for extracting evidence from large systems
• Extracts only data related to evidence for your case from allocated files
• And minimizes how much data you need to analyze
• Drawback of this technique
• It doesn’t recover data in free or slack space

Unallocated space is free space on a hard drive that can be used to store data. It
is a discrete number of clusters. Slack space is the unused space between the
end of the actual file and the end of the cluster.
Using a Technical Advisor
• Technical advisor
• Can help you list the tools you need to process the incident or crime scene
• Person guiding you about where to locate data and helping you extract log
records
• Or other evidence from large RAID servers
• Can help create the search warrant by itemizing what you need for the
warrant
Technical Advisor Responsibilities
• Know aspects of the seized system
• Direct investigator handling sensitive material
• Help secure the scene
• Help document the planning strategy for search and seizure
• Conduct ad hoc trainings
• Document activities
• Help conduct the search and seizure
Documenting Evidence in the Lab
• Record your activities and findings as you work
• Maintain a journal to record the steps you take as you
process evidence
• Goal is to be able to reproduce the same results
• When you or another investigator repeat the steps you
took to collect evidence
• A journal serves as a reference that documents the
methods you used to process digital evidence
Processing and Handling Digital Evidence
• Maintain the integrity of digital evidence in the lab
• As you do when collecting it in the field
• Steps to create image files:
• Copy all image files to a large drive
• Start your forensics tool to analyze the evidence
• Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital
hash
• Secure the original media in an evidence locker
Storing Digital Evidence
Storing Digital Evidence
• The media you use to store digital evidence usually
depends on how long you need to keep it
• CD-Rs or DVDs
• The ideal media
• Capacity: up to 17 GB
• Lifespan: 2 to 5 years
• Magnetic tapes
• Capacity: 40 to 72 GB
• Lifespan: 30 years
• Costs: drive: $400 to $800; tape: $40
Storing Digital Evidence (continued)
Evidence Retention and Media Storage Needs

• To help maintain the chain of custody for digital


evidence
• Restrict access to lab and evidence storage area
• Lab should have a sign-in roster for all visitors
• Maintain logs for a period based on legal requirements
• You might need to retain evidence indefinitely
• Check with your local prosecuting attorney’s office or
state laws to make sure you’re in compliance
• You cannot retain child pornography evidence, however
Evidence Retention and Media Storage Needs
(continued)
Documenting Evidence
• Create or use an evidence custody form
• An evidence custody form serves the following functions:
• Identifies the evidence
• Identifies who has handled the evidence
• Lists dates and times the evidence was handled
• You can add more information to your form
• Such as a section listing MD5 and SHA-1 hash values
Documenting Evidence (continued)
• Include any detailed information you might need to reference
• Evidence bags also include labels or evidence forms you can use to
document your evidence
Obtaining a Digital Hash
Obtaining a Digital Hash
• Cyclic Redundancy Check (CRC)
• Mathematical algorithm that determines whether a file’s contents have
changed
• Most recent version is CRC-32

• Message Digest 5 (MD5)


• Mathematical formula that translates a file into a hexadecimal code value, or
a hash value
• If a bit or byte in the file changes, it alters the digital hash
Obtaining a Digital Hash (continued)
• Three rules for forensic hashes:
• You can’t predict the hash value of a file or device
• No two hash values can be the same
• If anything changes in the file or device, the hash value must change
Obtaining a Digital Hash (continued)
• In both MD5 and SHA-1, collisions have occurred
• Most computer forensics hashing needs can be
satisfied with a nonkeyed hash set
• A unique hash number generated by a software tool, such
as the Linux md5sum command
• Keyed hash set
• Created by an encryption utility’s secret key
• You can use the MD5 function in FTK Imager to
obtain the digital signature of a file
• Or an entire drive
Obtaining a Digital Hash (continued)
Reviewing a Case
Reviewing a Case
• General tasks you perform in any computer forensics case:
• Identify the case requirements
• Plan your investigation
• Conduct the investigation
• Complete the case report
• Critique the case
Sample Civil Investigation
• Most cases in the corporate environment are
considered low-level investigations
• Or noncriminal cases
• Common activities and practices
• Recover specific evidence
• Suspect’s Outlook e-mail folder (PST file)
• Covert surveillance
• Its use must be well defined in the company policy
• Risk of civil or criminal liability
• Sniffing tools for data transmissions
Covert Surveillance Tools

• Spector
• WinWhatWhere
• EnCase Enterprise Edition
Sample Criminal Investigation
• Computer crimes examples
• Fraud
• Check fraud
• Homicides
• Need a warrant to start seizing evidence
• Limit searching area
Sample Criminal Investigation (continued)
Reviewing Background Information for a Case
• Company called Superior Bicycles
• Specializes in creating new and inventive modes of human-driven
transportation
• Two employees, Chris Murphy and Nau Tjeriko, have been missing for
several days
• A USB thumb drive has been recovered from Chris’s office with
evidence that he had been conducting a side business using company
computers
Identifying the Case Requirements
• Identify requirements such as:
• Nature of the case
• Suspect’s name
• Suspect’s activity
• Suspect’s hardware and software specifications

You might also like