0% found this document useful (0 votes)
114 views66 pages

Processing Crime and Incident Scenes

Uploaded by

n02019697m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views66 pages

Processing Crime and Incident Scenes

Uploaded by

n02019697m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 66

Digital Forensics

Lecture 5
Processing Crime and Incident Scenes
Objectives
• Explain the rules for digital evidence
• Describe how to collect evidence at
private-sector incident scenes
• Explain guidelines for processing law
enforcement crime scenes
• List the steps in preparing for an evidence
search
• Describe how to secure a computer
incident or crime scene
Objectives (continued)
• Explain guidelines for seizing digital
evidence at the scene
• List procedures for storing digital evidence
• Explain how to obtain a digital hash
• Review a case to identify requirements
and plan your investigation
Identifying Digital Evidence
• Digital evidence
– Can be any information stored or transmitted
in digital form
• Some courts like accept digital evidence
as physical evidence
– Digital data is a tangible object
• Some require that all digital evidence be
printed out to be presented in court
Identifying Digital Evidence
• General tasks investigators perform when
working with digital evidence:
– Identify digital information or artifacts that can
be used as evidence
– Collect, preserve, and document evidence
– Analyze, identify, and organize evidence
– Rebuild evidence or repeat a situation to
verify that the results can be reproduced
reliably
• Collecting computers and processing a
criminal or incident scene must be done
systematically
Understanding Rules of
Evidence
• Consistent practices help verify your work
and enhance your credibility
• Comply with your state’s rules of evidence
or with the Federal Rules of Evidence
• Evidence admitted in a criminal case can
be used in a civil suit, and vice versa
• Keep current on the latest rulings and
directives on collecting, processing,
storing, and admitting digital evidence
Understanding Rules of Evidence
• Data you discover from a forensic
examination falls under your state’s rules
of evidence
• Digital evidence is unlike other physical
evidence because it can be changed more
easily
– The only way to detect these changes is to
compare the original data with a duplicate
• Most courts have interpreted computer
records as hearsay evidence
– Hearsay is secondhand or indirect evidence
Understanding Rules of
Evidence (continued)
• When attorneys challenge digital evidence
– Often they raise the issue of whether
computer-generated records were altered
• Or damaged after they were created
• One test to prove that computer-stored
records are authentic is to demonstrate
that a specific person created the records
– The author of a Microsoft Word document can
be identified by using file metadata
Demo: Metadata in FTK
• Save a Word document
• In FTK:
– Click No, OK, OK through the demo warning
boxes
– Go directly to working with program
– File, Add Evidence
– Enter your name, Next, Next
– Click "Add Evidence" button
– Click "Individual File", Continue
– Navigate to Word document,double-click it
– OK, Next, Continue
FTK Demo
• In "File Category", click the Documents
button
• Select the document in the lower pane
• "View files in native format" shows the
text typed into the Word document
• "View files in filtered text format" shows
the metadata, such as the registered
owner of the program
Understanding Rules of
Evidence (continued)
• The process of establishing digital
evidence’s trustworthiness originated with
written documents and the best evidence
rule
• Best evidence rule states:
– To prove the content of a written document,
recording, or photograph, ordinarily the
original writing, recording, or photograph is
required
Understanding Rules of
Evidence (continued)
• Rules of Evidence
– Allow a duplicate instead of originals when it
is "produced by the same impression as the
original … by mechanical or electronic re-
recording … or by other equivalent techniques
which accurately reproduce the original."
• As long as bit-stream copies of data are
created and maintained properly
– The copies can be admitted in court, although
they aren’t considered best evidence
When a Copy is All You Have
• If the hard drive crashes after you make
the copy
• If removing the original computers is not
possible, because it would cause harm to
a business or its owner, who might be an
innocent bystander
– Steve Jackson Games was harmed in this
manner when the Secret Service seized all
computers because BBS users placed
evidence of a crime on them
– The company sued and won (link Ch 5a)
Collecting Evidence in Private-
Sector Incident Scenes
• Private-sector organizations include:
– Businesses and government agencies that aren’t
involved in law enforcement
• Agencies must comply with state public disclosure
and federal Freedom of Information Act (FOIA) laws
– And make certain documents available as public
records
• FOIA allows citizens to request copies of public
documents created by federal agencies
Collecting Evidence in Private-
Sector Incident Scenes
• A special category of private-sector businesses
includes ISPs and other communication companies
• ISPs can investigate computer abuse committed by
their employees, but not by customers
– Except for activities that are deemed to create an
emergency situation
• Investigating and controlling computer incident
scenes in the corporate environment
– Much easier than in the criminal environment
– Incident scene is often a workplace
Collecting Evidence in Private-
Sector Incident Scenes
• Typically, businesses have inventory databases of
computer hardware and software
– Help identify the computer forensics tools needed to
analyze a policy violation
• And the best way to conduct the analysis
• Corporate policy statement about misuse of computing
assets
– Allows corporate investigators to conduct covert
surveillance with little or no cause
– And access company systems without a warrant
Collecting Evidence in Private-
Sector Incident Scenes

(continued)
Companies should display a warning
banner or publish a policy, or both
– Stating that they reserve the right to inspect
computing assets at will
• Corporate investigators should know
under what circumstances they can
examine an employee’s computer
– Every organization must have a well-defined
process describing when an investigation can
be initiated
Collecting Evidence in Private-
Sector Incident Scenes

(continued)
If a corporate investigator finds that an
employee is committing or has committed
a crime
– Employer can file a criminal complaint with the
police
• Employers are usually interested in
enforcing company policy
– Not seeking out and prosecuting employees
• Corporate investigators are, therefore,
primarily concerned with protecting
Collecting Evidence in Private-
Sector Incident Scenes

(continued)
If you discover evidence of a crime during
a company policy investigation
– Determine whether the incident meets the
elements of criminal law
– Inform management of the incident
– Stop your investigation to make sure you
don’t violate Fourth Amendment restrictions
on obtaining evidence
– Work with the corporate attorney to write an
affidavit confirming your findings
Becoming an Agent of Law
Enforcement
• If law enforcement officers ask you to find
more information, you are at legal risk
– Don’t do any further investigation until you
receive a subpoena or court order
Processing Law Enforcement
Crime Scenes
• You must be familiar with criminal rules of
search and seizure
• You should also understand how a search
warrant works and what to do when you process
one
• Law enforcement officer may search for and
seize criminal evidence only with probable
cause
– Facts or circumstances that lead a reasonable
person to believe a crime has been committed
or is about to be committed
Processing Law Enforcement
Crime Scenes (continued)
• With probable cause, a police officer can
obtain a search warrant from a judge
– That authorizes a search and seizure of
specific evidence related to the criminal
complaint.
Understanding Concepts and
Terms Used in Warrants
• Innocent information
– Unrelated information
– Often included with the evidence you’re trying
to recover
• Judges often issue a limiting phrase to
the warrant
– Allows the police to separate innocent
information from evidence
Understanding Concepts and
Terms Used in Warrants
• Plain view doctrine
– Objects falling in plain view of an officer who
has the right to be in position to have that
view
• Are subject to seizure without a warrant and may
be introduced in evidence
• “Knock and announce”
– With few exceptions, warrants require that
officers knock and announce their identity
• When executing a warrant
Sample Criminal Investigation
• Computer crimes examples
– Fraud
– Check fraud
– Homicides
• Need a warrant to start seizing evidence
– Limit searching area
Sample Criminal Investigation
(continued)
Preparing for a Search
• Preparing for a computer search and
seizure
– Probably the most important step in
computing investigations
• To perform these tasks
– You might need to get answers from the victim
and an informant
• Who could be a police detective assigned to the
case, a law enforcement witness, or a manager or
coworker of the person of interest to the
investigation
Identifying the Nature of the
Case
• When you’re assigned a computing
investigation case
– Start by identifying the nature of the case
• Including whether it involves the private or public
sector
• The nature of the case dictates how you
proceed
– And what types of assets or resources you
need to use in the investigation
Identifying the Type of
Computing System
• For law enforcement
– This step might be difficult because the crime
scene isn’t controlled
• If you can identify the computing system
– Estimate the size of the drive on the suspect’s
computer
• And how many computers to process at the scene
• Determine which OSs and hardware are
involved
Determining Whether You Can
Seize a Computer
• The type of case and location of the evidence
– Determine whether you can remove
computers
• Law enforcement investigators need a warrant to
remove computers from a crime scene
– And transport them to a lab
• If removing the computers will irreparably harm a
business
– The computers should not be taken offsite
Determining Whether You Can
Seize a Computer (continued)
• An additional complication is files stored
offsite that are accessed remotely
• If you aren’t allowed to take the computers
to your lab
– Determine the resources you need to acquire
digital evidence and which tools can speed
data acquisition
Obtaining a Detailed Description
of the Location
• Get as much information as you can
• Identify potential hazards
– Interact with your HAZMAT team
• HAZMAT guidelines
– A HAZMAT technician may need to acquire the
image, following your instructions
– You may need to put the target drive in a
special HAZMAT bag
– HAZMAT technician can decontaminate the bag
– Check for high temperatures
Determining Who Is in Charge
• Corporate computing investigations
– Require only one person to respond
• Law enforcement agencies
– Handle large-scale investigations
– Designate lead investigators
Using Additional Technical
Expertise
• Look for specialists
– OSs
– RAID servers
– Databases
• Finding the right person can be a
challenge
• Educate specialists in investigative
techniques
– Prevent evidence damage
Determining the Tools You Need
• Prepare tools using incident and crime
scene information
• Initial-response field kit
– Lightweight
– Easy to transport
• Extensive-response field kit
– Includes all tools you can afford
Preparing the Investigation
Team
• Review facts, plans, and objectives with
the investigation team you have
assembled
• Goals of scene processing
– Collect evidence
– Secure evidence
• Slow response can cause digital evidence
to be lost
Securing a Computer Incident or
Crime Scene
• Goals
– Preserve the evidence
– Keep information confidential
• Define a secure perimeter
– Use yellow barrier tape
– Legal authority: keep unnecessary people out
but don’t obstruct justice or fail to comply with
police officers
• Professional curiosity can destroy evidence
– Involves police officers and other professionals
who aren’t part of the crime scene processing
team
Seizing Digital Evidence at the
Scene
• Law enforcement can seize evidence
– With a proper warrant
• Corporate investigators rarely can seize evidence
• When seizing computer evidence in criminal
investigations
– Follow U.S. DoJ standards for seizing digital
data
• Civil investigations follow same rules
– Require less documentation though
• Consult with your attorney for extra guidelines
Preparing to Acquire Digital
Evidence
• The evidence you acquire at the scene depends on
the nature of the case
– And the alleged crime or violation
• Ask your supervisor or senior forensics examiner in
your organization the following questions:
– Do you need to take the entire computer and all
peripherals and media in the immediate area?
– How are you going to protect the computer and
media while transporting them to your lab?
– Is the computer powered on when you arrive?
Processing an Incident or Crime
Scene
• Guidelines
– Keep a journal to document your activities
– Secure the scene
• Be professional and courteous with onlookers
• Remove people who are not part of the
investigation
– Take video and still recordings of the area
around the computer
• Pay attention to details
– Sketch the incident or crime scene
– Check computers as soon as possible
Handling a Running Computer
• Old rule: pull the plug
– Don’t cut electrical power to a running system
unless it’s an older Windows 9x or MS-DOS
system
• Perform a live acquisition if possible
• When shutting down Win XP or later, or
Linux/Unix, perform a normal shutdown, to
preserve log files
• Save data from current applications as
safely as possible
Processing Data Centers with
RAID Systems
• Sparse acquisition
– Technique for extracting evidence from large
systems
– Extracts only data related to evidence for your
case from allocated files
• And minimizes how much data you need to
analyze
• Drawback of this technique
– It doesn’t recover data in free or slack space
Using a Technical Advisor
• Technical advisor
– Can help you list the tools you need to
process the incident or crime scene
– Person guiding you about where to locate
data and helping you extract log records
• Or other evidence from large RAID servers
– Can help create the search warrant by
itemizing what you need for the warrant
Technical Advisor
Responsibilities
• Know aspects of the seized system
• Direct investigator handling sensitive
material
• Help secure the scene
• Help document the planning strategy for
search and seizure
• Conduct ad hoc trainings
• Document activities
• Help conduct the search and seizure
Documenting Evidence in the
Lab
• Record your activities and findings as you
work
– Maintain a journal to record the steps you
take as you process evidence
• Goal is to be able to reproduce the same
results
– When you or another investigator repeat the
steps you took to collect evidence
• A journal serves as a reference that
documents the methods you used to
Processing and Handling Digital
Evidence
• Maintain the integrity of digital evidence in
the lab
– As you do when collecting it in the field
• Steps to create image files:
– Copy all image files to a large drive
– Start your forensics tool to analyze the
evidence
– Run an MD5 or SHA-1 hashing algorithm on
the image files to get a digital hash
– Secure the original media in an evidence
locker
Storing Digital Evidence
• The media you use to store digital
evidence usually depends on how long
you need to keep it
• CD-Rs or DVDs
– The ideal media
– Capacity: up to 17 GB
– Lifespan: 2 to 5 years
• Magnetic tapes
– Capacity: 40 to 72 GB
– Lifespan: 30 years
Storing Digital Evidence
(continued)
Evidence Retention and Media
Storage Needs
• To help maintain the chain of custody for digital
evidence
– Restrict access to lab and evidence storage
area
• Lab should have a sign-in roster for all visitors
– Maintain logs for a period based on legal
requirements
• You might need to retain evidence indefinitely
– You cannot retain child pornography evidence,
however
Evidence Retention and Media
Storage Needs (continued)
Documenting Evidence
• Create or use an evidence custody form
• An evidence custody form serves the
following functions:
– Identifies the evidence
– Identifies who has handled the evidence
– Lists dates and times the evidence was
handled
• You can add more information to your form
– Such as a section listing MD5 and SHA-1
hash values
Documenting Evidence
(continued)
• Include any detailed information you might
need to reference
• Evidence bags also include labels or
evidence forms you can use to document
your evidence
Obtaining a Digital Hash
• Cyclic Redundancy Check (CRC)
– Mathematical algorithm that determines
whether a file’s contents have changed
– Most recent version is CRC-32
– Not considered a forensic hashing algorithm
• Message Digest 5 (MD5)
– Mathematical formula that translates a file into
a hexadecimal code value, or a hash value
– If a bit or byte in the file changes, it alters the
digital hash
Obtaining a Digital Hash
(continued)
• Secure Hash Algorithm version 1 (SHA-
1)
– A newer hashing algorithm
– Developed by the National Institute of
Standards and Technology (NIST)
Obtaining a Digital Hash
(continued)
• Three rules for forensic hashes:
– You can’t predict the hash value of a file or
device
– No two hash values can be the same
– If anything changes in the file or device, the
hash value must change
Obtaining a Digital Hash
(continued)
Reviewing a Case
• General tasks you perform in any
computer forensics case:
– Identify the case requirements
– Plan your investigation
– Conduct the investigation
– Complete the case report
– Critique the case
Sample Civil Investigation
• Most cases in the corporate environment
are considered low-level investigations
– Or noncriminal cases
• Common activities and practices
– Recover specific evidence
• Suspect’s Outlook e-mail folder (PST file)
– Covert surveillance
• Its use must be well defined in the company
policy
• Risk of civil or criminal liability
– Sniffing tools for data transmissions
Covert Surveillance Tools

• Spector
• WinWhatWhere
• EnCase Enterprise Edition
Thank You!

You might also like