Week(3)-Understanding the Computer Forensic Process
Week(3)-Understanding the Computer Forensic Process
2
Objectives
3
Preparing a Digital Forensics Investigation
• to gather evidence.
• to conduct the investigation by processing digital evidence
• Preserve the evidence on a different computer
• to prove that a suspect committed a crime or violated a company policy
• the investigator must then summarize the findings in a report, and when
required, present the findings (to the prosecutor; in a court; to a
company executive; etc.)
4
Preparing a Digital Forensics Investigation
Chain of custody
• Route the evidence takes from the time you find it until the case is closed or goes
to court
5
An Overview of a Computer Crime
6
An Overview of a Computer Crime
7
An Overview of a Company Policy Violation
8
Taking a Systematic Approach
10
Planning Your Investigation (1 of 4)
11
Planning Your Investigation (2 of 4)
• An evidence custody form helps you document what has been done
with the original evidence and its forensics copies
• Also called a chain-of-evidence form
• Two types
• Single-evidence form
• Lists each piece of evidence on a separate page
• Multi-evidence form a broken chain of custody
can throw out your case.
Therefore, documenting
evidence is very important
during a forensics analysis.
12
Planning Your Investigation (3 of 4)
• Which investigator
retrieved the evidence
from the locker to process
it?
• What have you done with
the evidence?
13
Planning Your Investigation (4 of 4)
14
Securing Your Evidence (1 of 2)
16
Procedures for Private-Sector High-Tech Investigations
17
Employee Termination Cases
18
Internet Abuse Investigations (1 of 3)
19
Internet Abuse Investigations (2 of 3)
20
Internet Abuse Investigations (3 of 3)
4. Compare the data recovered from forensic analysis to the proxy server log
data to confirm that they match.
a) If the URL data matches the proxy server log and the forensic disk examination; continue
analyzing the suspect computer’s drive data, and collect any relevant downloaded
inappropriate pictures or Web pages that support the allegation.
b) If there are no matches between the proxy server logs, and the forensic
examination shows no contributing evidence, report that the allegation is
unsubstantiated.
5. Continue analyzing the computer’s disk drive data
21
E-mail Abuse Investigations (1 of 2)
22
E-mail Abuse Investigations (2 of 2)
• For computer-based e-mail data files: use the standard forensic analysis
techniques and procedures
• For server-based e-mail data files: contact the e-mail server administrator and
obtain an electronic copy of the suspect and victim’s e-mail folder or data.
• For Web-based e-mail investigations: such as Hotmail or Gmail, use tools such as
Forensic Toolkit’s Internet keyword search option to extract all related e-mail
address information.
• Examine header data of all messages of interest to the investigation.
23
Media leak investigations (1 of 4)
24
Media leak investigations (2 of 4)
• Examine e-mail
• Examine Internet message boards
• Examine proxy server logs
• Examine known suspects’ workstations
• Examine all company telephone records
25
E-mail Abuse Investigations (3 of 4)
Staff needed:
• Digital investigator who is responsible for disk
forensic examinations
• Technology specialist who is knowledgeable of
the suspected compromised technical data
• Network specialist who can perform log
analysis and set up network sniffers
• Threat assessment specialist (typically an
attorney)
28
Industrial Espionage Investigations (2 of 5)
1. Gather all personnel assigned to the investigation and brief them on the plan and
any concerns.
2. Gather the resources needed to conduct the investigation.
3. Start the investigation by placing surveillance systems, such as cameras and
network monitors, at key locations.
30
E-mail Abuse Investigations (2 of 2)
4. Discreetly gather any additional evidence, such as the suspect's computer drive,
and make a bit-stream image for follow-up examination.
5. Collect all log data from networks and e-mail servers, and examine them for
unique items that might relate to the investigation.
6. Report regularly to management and corporate attorneys on your investigation's
status and current findings.
7. Review the investigation's scope with management and corporate attorneys to
deter mine whether it needs to be expanded and more resources added
31
Interviews and Interrogations in High-Tech Investigations (1 of 2)
• Interview
• Usually conducted to collect information from a
witness or suspect
• Interrogation
• Process of trying to get a suspect to confess
33
Additional Recourses