0% found this document useful (0 votes)
87 views31 pages

Forensic Soundness in Digital Crimes

The document provides an overview of digital forensics, detailing its history, classifications, and the role of forensic investigators in recovering and analyzing digital evidence. It highlights the importance of forensic soundness in evidence collection and the challenges faced in the field due to evolving technology and anti-forensics techniques. Additionally, it outlines the objectives of digital forensics and the types of digital evidence that can be used in legal contexts.

Uploaded by

Memoona Asif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views31 pages

Forensic Soundness in Digital Crimes

The document provides an overview of digital forensics, detailing its history, classifications, and the role of forensic investigators in recovering and analyzing digital evidence. It highlights the importance of forensic soundness in evidence collection and the challenges faced in the field due to evolving technology and anti-forensics techniques. Additionally, it outlines the objectives of digital forensics and the types of digital evidence that can be used in legal contexts.

Uploaded by

Memoona Asif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Digital Forensics

Lecture 1
Anum Hasan
Outline
• Overview of Computer Forensic
• Forensic Soundness
Forensic Science
• What is Forensic?
– Originated from latin “Forensis”  Debate or public
discussion
– The American Heritage Dictionary defines forensics as
“the use of science and technology to investigate and
establish facts in criminal or civil courts of law.”
• What is Science?
– A systematic study of the structure and behaviour of
physical and natural world through observation and
experiment.

• What is Forensic Science?


– Application of scientific method to aid in solving crimes
– Forensics is the use of science to process evidence
so you can establish the facts of a case
A Brief History of Computer
Forensics
• By the 1970s, electronic crimes were increasing, especially in the
financial sector
– Most law enforcement officers didn’t know enough about
computers to ask the right questions
• Or to preserve evidence for trial
• One-half cent crime

• 1980s
– PCs gained popularity and different OSs emerged
– Disk Operating System (DOS) was available
– Forensics tools were simple, and most were generated by
government agencies
A Brief History of
Computer Forensics
• Mid-1980s
(continued)
– Xtree Gold appeared on the market
• Recognized file types and retrieved lost or deleted files
– Norton DiskEdit soon followed
• And became the best tool for finding deleted file

• 1987
– Apple produced the Mac SE
• A Macintosh with an external EasyDrive hard disk with 60
MB of storage
A Brief History of
Computer Forensics
• Early 1990s (continued)
– Tools for computer forensics were available

– International Association of Computer Investigative


Specialists (IACIS)
• Training on software for forensics investigations

– IRS created search-warrant programs

– ExpertWitness for the Macintosh


• First commercial GUI software for computer forensics
• Created by ASR Data
A Brief History of Computer
Forensics (continued)
• Early 1990s (continued)
– ExpertWitness for the Macintosh
• Recovers deleted files and fragments of deleted files
• Later one partner of ASR left and developed EnCase
• Large hard disks posed problems for investigators
• Now
– iLook
• Maintained by the IRS, limited to law enforcement
• Can analyze and read special files that are copies of the disk
– EnCase
• Available for public or private use
– AccessData Forensic Toolkit (FTK)
• Available for public or private use (Most Popular)
Introduction
• Media also report wide diversity of cases that involve digital evidence

• The University of California at Berkeley notified students and


alumni that an intruder had gained unauthorized access to a
database containing medical records of over 160,000 individuals.

• Computers seized during military operations in Iraq contained


details about enemy operations

• David Goldenberg, an executive of AMX Corp, pled guilty to


gaining unauthorized access to and stealing sensitive business
information from the e-mail systems of a marketing firm that was
working for a competitor, Crestron Electronics.
Digital Forensics?
• A sub-category of Forensic Science

• Concerned with the systematic recovery verification


and investigation of a digital data.

Note: Forensic examiners are


neutral finders of fact, not
advocates for any side
Classifications
Field of Digital Forensics
• Military: Uses digital forensics for intelligence gathering from captured computers
during military actions.
• Government Agencies: FIA, and foreign agencies employ digital forensics for
investigating computer-related crimes.
• Criminal Prosecutors: Utilize digital evidence to link incriminating documents to
crimes such as drug trafficking, embezzlement, financial fraud, homicide, and child
abuse.
• Academia: Engages in forensic research and education, with many universities
offering degrees in digital forensics and online criminal justice.
• Data Recovery Firms: Apply digital forensics techniques to recover data after
hardware or software failures and data loss.
• Corporations: Use digital forensics for employee termination and prosecution related
to intellectual property theft, trade secrets, fraud, embezzlement, harassment, and
network intrusions.
• Insurance Companies: Rely on digital evidence to detect possible fraud in accident,
arson, and workers’ compensation cases.
• Individuals: Hire forensic specialists for cases like wrongful termination,or age
discrimination to support their claims.
Overview
Computer Forensic
• Computer forensics is a branch of digital forensic science pertaining
to evidence found in computers and digital storage media. The goal of
computer forensics is to examine digital media in a forensically sound
manner with the aim of identifying, preserving, recovering, analyzing
and presenting facts and opinions about the digital information.
Reconstructs events from
digital traces on a device such
as
•Computer, Router, Switch,
Cell-phone, SIM-card, GPS
system (car accident
investigation), Servers, etc…

Remember that any device that can store


data is a potential subject
of computer forensics
Computer Crimes
• As computer and networks becomes an integral part
of our daily lives. Most of the cases have an
associated digital side.

• Following crimes usually involve computers.


• Drug Trafficking
• Financial Fraud
• Murder
• Harassment
• Child Abuse
Challenges & Directions
• Criminals are becoming more aware
• Anti-Forensics Techniques
• Designed to conceal activities and destroy the evidences
• Data unreadable format, tunneling, onion routing, steganography
• Data Encryption
• In OS may challenge
• Advances in the field demand improvement in technical knowledge
and standards of practice.
• New forensic tool are being created to acquisition of
• Volatile data
• Inspection of remote system and analysis of network traffic
• Embedded systems
• Enterprise networks and mobile telecommunications
systems
Objectives

 Identify, gather, and preserve the evidence of a cybercrime


 Identify and gather evidence of cybercrimes in a forensically sound
manner
 Track and prosecute the perpetrators in a court of law
 Interpret, document, and present the evidence such that it is admissible
during prosecution
 Estimate the potential impact of malicious activity on the victim and
assess the intent of the perpetrator
 Find vulnerabilities and security loopholes that help attackers
 Understand the techniques and methods used by attackers to avert
prosecution and overcome them
 Recover deleted files, hidden files, and temporary data that can be
used as evidence
 Perform incident response (IR) to prevent further loss of intellectual
property, finances, and reputation during an attack
 Know the laws of various regions and areas, as digital crimes are
widespread and remote
Objectives

• Know the process of handling multiple platforms, data types, and


operating systems
• Learn to identify and use the appropriate tools for forensic
investigations
• Offer ample protection to data resources and ensure regulatory
compliance
• Protect the organization from similar incidents in the future
• Support the prosecution of the perpetrator of a cybercrime
Digital Evidence

Exculpatory Evidence
• Evidence that can prove a defendant’s innocence or reduce their
culpability.
• Example: An email or message proving the suspect was in a
different location during the crime.
Inculpatory Evidence
• Evidence that establishes or increases the likelihood of a person’s
involvement in a crime.
• Example: Chat logs indicating the suspect planned the criminal
act.
Digital Evidence

Direct Evidence
• Evidence that directly proves a fact without requiring inference. It is
straightforward and directly links a person to a crime or event.
• Example: A security camera recording showing a suspect
committing the crime.
Circumstantial Evidence
• Evidence that suggests a fact or event occurred but requires
inference to connect it to the conclusion.
• Example: Metadata showing a suspect’s phone was near the
crime scene at the time of the crime.
Types of digital Evidence
Sources of Evidence
Rules for Evidence
Forensic Soundness

• Computer Forensic evolved from primary dealing with HDD


(generally accepted practices) and one of the most fundamental
challenges has been updating the general practice.

• Requirement of a generally accepted practice to balance the needs


to extract most useful evidence efficiently and to acquire the
precise copy of all the data without any modification.

• The purpose of a forensically sound authentication process is to


support identification and authentication of evidence.
• What you claim and has not been altered or substituted since
collection.
Forensic Soundness

• Generally, due to improper processing of digital evidence, violate


the soundness of evidence
For example:
• Evidence was collected from several identical computer but not
documented, making it very difficult to determine which evidence
came from which system.
• During acquiring data overwritten by Zeros.
• Misinterpretation of data either by tool/person

• ‘Preserve everything but change nothing’


• The evidence that what you claim and has not been altered or
substituted since collection.
Forensic Soundness
Challenges
• New technology Challenges
• Volatile memory, mobile devices and embedded system.
• Quantity of digital evidence grows and case backlogs mount, difficult to in-
depth analysis
• Integrity preservation is not possible with Mobile devices and Network of
systems.
• Modern investigators deal with networked systems (international
scope, organized criminal groups) so forensically acquiring all the
data is not possible for signal system.
• Quantity of data is increasing due to local level logs etc.
• As realized, utilizing more volatile data can be helpful in investigation (i.e.
Password) and various techniques are developed to recover data from RAM
in turnoff mode.
• Recover data from RAM chips after a computer has been turned off
• Mobile devices has gained more attention (Embedded system analysis)
Forensic Soundness

• Forensics soundness does not end with acquisition but


continues to all the subsequent sub-processes.
• Need to follow processes that Reliability, Repeatability,
Documentation, Preservation and Checking for Possible
Errors.

Forensic Soundness can be achieved by


• Documenting unique characteristics of the evidence, like
device IDs and MD5 hashes of acquired data, and showing
continuous possession and control throughout its lifetime.
Forensic Soundness
• Chain of Custody
• A process that tracks the movement of evidence through its
collection, safeguarding, and analysis lifecycle by documenting each
person who handled the evidence, the date/time it was collected or
transferred, and the purpose for the transfer.

• Some worst-case scenarios resulting from sufficiently large breaks


in chain of custody include misidentification of evidence,
contamination of evidence, and loss of evidence or pertinent
elements (e.g., metadata).

• Forensic practitioners, should careful to preserve the selected digital


evidence completely and accurately, document the process thoroughly,
and check their work objectively for possible errors or omissions, these
kinds of failures can be avoided or overcome.
Forensic Soundness
• Protecting Digital Evidence Integrity
by Using Smart Cards
Digital Forensics
Investigator
• Investigators often work as a team to make
computers and networks secure in an
organization

Digital Investigations
Role of Forensics Investigator
Forensics and Legal Compliance
Forensic Analysis Fundamentals

• As an investigator, how to obtain data


using forensic tool ? Is it enough?
• For an investigator it is important to:
• Know how the underlying technology
works.
• Know how the data is arranged.
• Know how the tool interpret and display
the info.

You might also like