eti_script
eti_script
"It’s late at night, and a multinational company suddenly notices that millions of dollars have disappeared from
their accounts. Their security team scrambles to find out what happened. Was it an insider job? A sophisticated
hacker? Or just a system error? Panic spreads through the company, and all eyes turn to a special team—Digital
Forensics Investigators. Their mission? To uncover the truth, trace digital footprints, and find the culprit before
it’s too late."
"If you were in charge of this investigation, where would you start? Would you check the emails? Look into the
network logs? Or maybe examine the deleted files?"
"In today’s digital world, every click, every login, and even deleted files leave traces. Cybercriminals think they
can hide, but digital forensics can reveal the truth. In this presentation, we will explore how investigators solve
crimes in the digital world, just like detectives solve cases in the real world!"
Slide 2:
Digital Evidence
Digital evidence is any electronic data that can be used to prove a crime or suspicious activity.
It includes documents, emails, chat messages, images, videos, browsing history, and system logs.
This evidence is found in computers, mobile devices, cloud storage, and network systems.
Just like physical evidence (fingerprints or DNA), digital evidence helps investigators understand what
happened, when, and who was involved.
Digital Forensics
Digital forensics is the process of identifying, collecting, analyzing, and preserving digital evidence.
Experts use special tools to recover deleted or hidden data from devices.
It helps in solving cybercrimes, data breaches, hacking cases, financial fraud, and identity theft.
The goal is to ensure the evidence is reliable and legally acceptable in court.
Investigators follow strict procedures to maintain the integrity of the evidence and prevent tampering.
In 1984, The FBI formed the Computer Analysis and Response Team (CART) for cyber investigations.
In 1997, The International Organization on Computer Evidence (IOCE) set forensic guidelines.
In 1998, Cybercrime laws were introduced, and forensic tools became widely used.
In 1999, The Scientific Working Group on Digital Evidence (SWGDE) defined digital evidence rules.
In 2000, Courts started accepting digital evidence, and tools like EnCase and FTK were developed.
In 2003, The Patriot Act increased digital surveillance, and mobile forensics became important.
1. Identification: The first step is to detect and recognize digital evidence from different sources like
computers, mobile phones, emails, network logs, or cloud storage. Investigators must determine what type of
data is relevant to the case.
2. Collection: After identification, evidence is collected and securely stored to avoid alteration or loss.
Specialized forensic tools are used to make exact copies (bit-by-bit images) of the data.
3. Preservation: The collected evidence must be protected from tampering, unauthorized access, or accidental
loss. Hash values (unique digital fingerprints) are generated to maintain integrity and prove that the evidence
has not been altered.
4. Analysis: Experts examine and extract useful information from the data. Deleted files, hidden data, encrypted
files, or suspicious activities are analyzed using forensic tools. The goal is to find clues that connect digital
evidence to the crime.
5. Documentation: Investigators record all findings, steps taken, and tools used in a detailed forensic report.
Proper documentation ensures that the process is transparent and follows legal standards.
6. Presentation: The final step is to present the findings in court or to law enforcement agencies. The report
must be clear, well-structured, and easy to understand for judges, lawyers, or investigators. Investigators may be
asked to explain technical details in simple terms to help legal professionals understand the evidence.
Slide 6:
This slide presents the Abstract Digital Forensic Model (ADFM), which describes the step-by-step process of
handling digital evidence in forensic investigations.
1. Identification: In identification step, it finds and recognizes the digital evidences related to the crime.
2. Preservation: In Preservation step, it Protects evidence from being changed, deleted, or damaged. Also it
makes copies of data to ensure that the original data remains untouched.
3. Collection: After preservation the identified evidences are collected carefully and securely. Also it maintains
records of who handles the evidence to ensure authenticity.
4. Examination: In this step, it inspects and extracts important data from collected evidence to recover hidden,
deleted, or encrypted files.
5. Analysis: After examination it studies the extracted data to find clues about the crime.
6. Reconstruction: In this it rebuilds the sequence of events using analyzed data to understand how and when
the crime took place.
7. Documentation: As it says, it records all findings, methods, and tools used in the investigation.
8. Presentation: In this it presents the evidences and findings in court or to law enforcement and explains the
results in a clear and understandable way.
9. Returning Evidences: At last it gives back the evidence to its owner if allowed by law to ensure proper legal
procedures are followed.
1. Readiness: In this step, Investigators prepare tools, techniques, and training. Rules are set for handling
evidence properly.
2. Deployment: The investigation team is sent to the crime scene. Necessary tools and technology are set up.
3. Physical Crime Investigation: The crime scene is examined for physical evidence. Items like fingerprints,
documents, or devices are collected.
4. Digital Crime Investigation: Electronic devices are analyzed for digital evidence. Emails, chats, browsing
history, and files are checked.
5. Review: The entire process is evaluated for accuracy. Investigators improve methods for future cases.
5. Search for Identify Evidence: Finding possible digital evidence from devices.
6. Collection of Evidence: Gathering digital proof carefully.
1. Be Honest: He should always tell the truth and avoid misleading information.
2. Keep Information Private: He should not share sensitive data with unauthorized people.
3. Follow the Law: He should always work within legal boundaries and respect laws.
4. Protect Evidence: He should keep digital evidence safe and prevent any tampering.
5. Record Everything: He should maintain proper records of all actions and findings.
2. Sharing Secrets: He should not reveal private or confidential data without permission.
3. Breaking Laws: He should not ignore or violate legal rules which will lead to serious consequences.
4. Not Keeping Records: If he fails to keep document then it may cause confusion and mistakes.
5. Using Data Wrongly: He should not misuse digital information for personal gain.