SlideShare a Scribd company logo
1 of 50
Intro to Computer Forensics
Mr. Islahuddin Jalal
MS (Cyber Security) ā€“ UKM Malaysia
Research Title ā€“ 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ā€«ŲØŲ§Ų®ŲŖŲ±Ł¾ŁˆŁ‡Ł†ŲŖŁˆŁ†ā€¬ ā€«ŲÆā€¬
Outline
ā€¢ Searching and Seizing Computers
ā€¢ Searching and Seizing Computers without warrant
ā€¢ The Fourth Amendmentā€™s (Reasonable Expectation of Privacy)
ā€¢ Consent
ā€¢ Private Sector Workplace Searches
ā€¢ Searching and Seizing Computers with a warrant
ā€¢ Basic strategies for executing Computer Searches
ā€¢ The Privacy Protection Act
What is search and Seizure?
ā€¢ Search
ā€¢ Expectation of privacy
ā€¢ Seizure
ā€¢ Individual
ā€¢ When a person believes he is not free to ignore the governmentā€™s presence
ā€¢ Property
ā€¢ Meaningful interference with an individualā€™s possessory interest
Search and Seizure Separate
ā€¢ Examples:
ā€¢ Person seized and searched
ā€¢ Person seized but not searched
ā€¢ Traffic citation
ā€¢ Person searched but not seized
ā€¢ Thermal Scans, X-rays etc
Searching and seizing computer related
evidence
ā€¢ Traditional Problems Associated with Finding Digital Evidence
-Digital evidence is especially volatile & voluminous, susceptible to
climate or environmental factors as well as human error.
- It may be affected by power outages, electromagnetic fields, or
extreme temperatures
Continuedā€¦.
ā€¢ -Unlike traditional evidence in which analysis of small samples is
utilized to preserve the totality of the evidence, assessment of digital
evidence requires evaluation of the whole, making one investigative
mistake very costly.
- The potential of liability for criminal investigators because of the loss
of critical data.
- The volume of digital evidence further complicates it's recovery,
making it virtually impossible to conduct a full on-scene analysis.
Continuedā€¦..
ā€¢ Digital evidence can be concealed by individuals by hiding information
ā€¢ The new level of software production, encryption and steganography in order
to hide files
ā€¢ Self-destructive or remote programs are used to erase data by pre-
programmed commands
ā€¢ Resources and computer related devices are hard to replace due to lack of
funds and approval from the administrator
Pre Search Activities
ā€¢ The creation of a technologically sound computer forensic laboratory
ā€¢ A temperature controlled evidence storage facility with security
ā€¢ A listed & recorded personnel need for the search & seizure
ā€¢ Pre-Search intelligence information & reports
ā€¢ On-Scene equipment & evidence retrieval packaging
ā€¢ Note:
ā€¢ A safety backup plan in case the initial search & seizure activities are foiled by
the suspect or exigent circumstances
On-site vs off-site searches
ā€¢ Determined by the lead investigator or supervisor on the case
- On-site allows for immediate interviewing of the suspect due to developing
evidence at the crime scene
- Off-site may be impossible due to mass amounts of storage or computer devices
- Off-site searches are more relaxed, time consuming, and no evidence is
overlooked
- Legal issues vary on the possibility of a secondary warrant and off-site storage of
the secondary evidence
Searching and Seizing Computers
ā€¢ To find out evidence from computer by looking it from different
aspects and captured that for further off-site searching thoroughly.
ā€¢ Searching and seizing computers can be with warrant or without
warrant
Continuedā€¦.
ā€¢ Searching and seizing computers with or without warrant depends
upon the constitution of respective country
ā€¢ Constitutions of the countries are different from each other due to
several reasons
ā€¢ Geographical
ā€¢ Cultural
ā€¢ Ethnics
ā€¢ Religious differences
ā€¢ etc
Searching and Seizing Computers without warrant
No legal documents requiredā€¦ā€¦ā€¦
Reasons for (without warrant)
ā€¢ According to the Fourth amendments of US
ā€¢ The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated, and
no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.
ā€¢
Analytical Model
ā€¢ This model is used to determine if a search and/or seizure has
occurred, and If it has occurred, was it reasonable (legal)
1) WHO conducted the search/seizure?
2) WHAT has been searched/seized?
3) Was there a SEARCH/SEIZURE?
4) If so, was it REASONABLE
1) WHO conducted the search and/or seizure?
Agency or official of the government
2) WHAT has been searched and/or seized?
Was it a person, house, paper and/or ā€œeffectā€ (other possesion)
3) Was there a SEARCH and/or SEIZURE?
The Supreme Court has defined ā€œSearchā€ as any governmental
intrusion into something in which a person has a reasonable
expectation of privacy. A ā€œseizureā€ is any taking into possession,
custody or control
4) If there was a search and/or seizure, was it REASONABLE?
ā€¢ Was there a valid search or seizure warrant?
ā€¢ Or, did one of the exceptions to the warrant requirement apply?
Cases: Search and/or Seizure?
1) Lucy breaks into her ex boyfriendā€™s apartment and
steals some of her old love letters to him.
2) The police order Joe to have a blood test to
determine how much alcohol he has in his
bloodstream
Cases: Search and/or Seizure?
3) Officer Jones stops Tim and asks him what he is
doing, then looks through the suitcase Tim is
carrying.
4) Tim is arrested and taken to jail.
5) The FBI puts a wiretap on Ellenā€™s telephone and
listens to her conversations.
Reasonable vs Unreasonable
ā€¢ For a search/seizure to be reasonable there must be a
warrant issued by a judge or magistrate
ā€¢ The police must have probable cause to convince a
judge to sign a warrant
ā€¢ There are also some exceptions to the warrant
requirement.
Probable Cause
There must be good reason to believe that that a crime has
been, is being, or is about to be committed, and that the
person, place or thing which is to be searched or seized is
involved in some way.
Exceptions to the
Warrant Requirement
1) Search Incident to a Lawful Arrest
extends to everything w/in arresteeā€™s immediate control
2) Stop and Frisk
can frisk outer layer of clothing with ā€œarticulable suspicionā€ of crime
3) Emergency Situations
Bomb threats, burning buildings, etc.
4) Hot Pursuit
Warrant not required for places police follow suspect into.
5) Items connected with crime in Plain View
If police had a right to be there in the first place
Exceptions to the
Warrant Requirement
6) Consent
A person may ā€˜knowingly and voluntarilyā€™ let police search w/o a
warrant. Fraud and deception are excepted. Must be that personā€™s or
common property. In some case eg. parent/child, teacher/student, a
person may legally let police search someone elseā€™s property
7) Abandoned Property
Once you abandon something you give up the expectation of privacy.
8) Border & Airline Searches
Customs Agents may search w/o warrant OR probable cause. Airline
personnel may search passengers and carry on luggage with metal
detectors and/or x-rays
9) Vehicle Searches
Police may search a vehicle WITH Probable Cause W/O Warrant
Searching and Seizing Computers with a warrant
legal documents requiredā€¦ā€¦ā€¦
Warrant preparation
ā€¢ Warrants: Should be prepared and reviewed by legal specialists &
computer division commanders. It ensures that all language,
protections, equipment, media, and incidentals, which may be
brought up in a court of law are stated. It also breeds familiarity with
the investigators, & ensures judicial approval.
Probable Cause: Must state that a crime has been committed, there
is evidence of the crime, & evidence resides at a particular location
Seizing Equipment: The proper seizing of all hardware & software
items at the scene of the crime
Reference
Most of the slides are exactly copied and taken from the CHFI Slides
Notesā€¦ā€¦..
Thank You
For Your PatienceFor Your Patience

More Related Content

What's hot

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
Ā 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
Ā 
Forensic imaging
Forensic imagingForensic imaging
Forensic imagingDINESH KAMBLE
Ā 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint developmentfaraharooj
Ā 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
Ā 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impressionSURYAKANT MISHRA
Ā 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
Ā 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime ScenesDon Caeiro
Ā 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
Ā 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics abdullah roomi
Ā 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
Ā 
Gait forensic science
Gait forensic scienceGait forensic science
Gait forensic scienceNupur Walia
Ā 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementShreyas Patel
Ā 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)Shreyas Patel
Ā 
Murder Case Studies - Investigation Insights
Murder Case Studies - Investigation InsightsMurder Case Studies - Investigation Insights
Murder Case Studies - Investigation Insightsafentisforensics
Ā 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensicsprimeteacher32
Ā 

What's hot (20)

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Ā 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Ā 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
Ā 
Geoforensic
Geoforensic Geoforensic
Geoforensic
Ā 
conventional methods of fingerprint development
conventional methods of fingerprint developmentconventional methods of fingerprint development
conventional methods of fingerprint development
Ā 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Ā 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Ā 
Forensic analysis of foot wear impression
Forensic analysis of foot wear impressionForensic analysis of foot wear impression
Forensic analysis of foot wear impression
Ā 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ā 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
Ā 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
Ā 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
Ā 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
Ā 
Network forensic
Network forensicNetwork forensic
Network forensic
Ā 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Ā 
Gait forensic science
Gait forensic scienceGait forensic science
Gait forensic science
Ā 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
Ā 
Age of documents (Questioned Document)
Age of  documents (Questioned Document)Age of  documents (Questioned Document)
Age of documents (Questioned Document)
Ā 
Murder Case Studies - Investigation Insights
Murder Case Studies - Investigation InsightsMurder Case Studies - Investigation Insights
Murder Case Studies - Investigation Insights
Ā 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
Ā 

Similar to Lect 5 computer forensics

Fourth amendment
Fourth amendmentFourth amendment
Fourth amendmentbayotr
Ā 
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...Michael DeBlis III, Esq., LLM
Ā 
Chapter 8
Chapter 8Chapter 8
Chapter 8glickauf
Ā 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersBoyarMiller
Ā 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
Ā 
Digital Public Records
Digital Public RecordsDigital Public Records
Digital Public RecordsRyan Thornburg
Ā 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writingFerdinand Camilo Kimura
Ā 
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual FreedomDocuments of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual Freedomaswitzer1
Ā 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
Ā 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeBoyarMiller
Ā 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationBillyCheuk
Ā 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policePaul Bradshaw
Ā 
Criminal Investigation Process
Criminal Investigation ProcessCriminal Investigation Process
Criminal Investigation ProcessMr Shipp
Ā 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
Ā 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic EvidenceTara Smith
Ā 
Criminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxCriminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxfaithxdunce63732
Ā 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
Ā 

Similar to Lect 5 computer forensics (20)

Fourth amendment
Fourth amendmentFourth amendment
Fourth amendment
Ā 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
Ā 
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
Ā 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
Ā 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Ā 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Ā 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
Ā 
Digital Public Records
Digital Public RecordsDigital Public Records
Digital Public Records
Ā 
Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
Ā 
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual FreedomDocuments of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
Ā 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
Ā 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
Ā 
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationACCA-IIA Singapore Seminar 2015 Part 5 Investigation
ACCA-IIA Singapore Seminar 2015 Part 5 Investigation
Ā 
BLANK PPT.pptx
BLANK PPT.pptxBLANK PPT.pptx
BLANK PPT.pptx
Ā 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy police
Ā 
Criminal Investigation Process
Criminal Investigation ProcessCriminal Investigation Process
Criminal Investigation Process
Ā 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
Ā 
Forensic Evidence
Forensic EvidenceForensic Evidence
Forensic Evidence
Ā 
Criminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docxCriminalistics DB1NameClassDateProfessor.docx
Criminalistics DB1NameClassDateProfessor.docx
Ā 
Digital investigation
Digital investigationDigital investigation
Digital investigation
Ā 

More from Kabul Education University

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Kabul Education University
Ā 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Kabul Education University
Ā 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Kabul Education University
Ā 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Kabul Education University
Ā 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Kabul Education University
Ā 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Kabul Education University
Ā 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Kabul Education University
Ā 

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Ā 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
Ā 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
Ā 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
Ā 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
Ā 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
Ā 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
Ā 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Ā 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
Ā 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Ā 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
Ā 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Ā 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
Ā 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
Ā 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Ā 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
Ā 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
Ā 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
Ā 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Ā 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
Ā 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
Ā 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
Ā 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
Ā 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Ā 

Recently uploaded (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Ā 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Ā 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Ā 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
Ā 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Ā 

Lect 5 computer forensics

  • 1. Intro to Computer Forensics Mr. Islahuddin Jalal MS (Cyber Security) ā€“ UKM Malaysia Research Title ā€“ 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ā€«ŲØŲ§Ų®ŲŖŲ±Ł¾ŁˆŁ‡Ł†ŲŖŁˆŁ†ā€¬ ā€«ŲÆā€¬
  • 2. Outline ā€¢ Searching and Seizing Computers ā€¢ Searching and Seizing Computers without warrant ā€¢ The Fourth Amendmentā€™s (Reasonable Expectation of Privacy) ā€¢ Consent ā€¢ Private Sector Workplace Searches ā€¢ Searching and Seizing Computers with a warrant ā€¢ Basic strategies for executing Computer Searches ā€¢ The Privacy Protection Act
  • 3. What is search and Seizure? ā€¢ Search ā€¢ Expectation of privacy ā€¢ Seizure ā€¢ Individual ā€¢ When a person believes he is not free to ignore the governmentā€™s presence ā€¢ Property ā€¢ Meaningful interference with an individualā€™s possessory interest
  • 4. Search and Seizure Separate ā€¢ Examples: ā€¢ Person seized and searched ā€¢ Person seized but not searched ā€¢ Traffic citation ā€¢ Person searched but not seized ā€¢ Thermal Scans, X-rays etc
  • 5. Searching and seizing computer related evidence ā€¢ Traditional Problems Associated with Finding Digital Evidence -Digital evidence is especially volatile & voluminous, susceptible to climate or environmental factors as well as human error. - It may be affected by power outages, electromagnetic fields, or extreme temperatures
  • 6. Continuedā€¦. ā€¢ -Unlike traditional evidence in which analysis of small samples is utilized to preserve the totality of the evidence, assessment of digital evidence requires evaluation of the whole, making one investigative mistake very costly. - The potential of liability for criminal investigators because of the loss of critical data. - The volume of digital evidence further complicates it's recovery, making it virtually impossible to conduct a full on-scene analysis.
  • 7. Continuedā€¦.. ā€¢ Digital evidence can be concealed by individuals by hiding information ā€¢ The new level of software production, encryption and steganography in order to hide files ā€¢ Self-destructive or remote programs are used to erase data by pre- programmed commands ā€¢ Resources and computer related devices are hard to replace due to lack of funds and approval from the administrator
  • 8. Pre Search Activities ā€¢ The creation of a technologically sound computer forensic laboratory ā€¢ A temperature controlled evidence storage facility with security ā€¢ A listed & recorded personnel need for the search & seizure ā€¢ Pre-Search intelligence information & reports ā€¢ On-Scene equipment & evidence retrieval packaging ā€¢ Note: ā€¢ A safety backup plan in case the initial search & seizure activities are foiled by the suspect or exigent circumstances
  • 9. On-site vs off-site searches ā€¢ Determined by the lead investigator or supervisor on the case - On-site allows for immediate interviewing of the suspect due to developing evidence at the crime scene - Off-site may be impossible due to mass amounts of storage or computer devices - Off-site searches are more relaxed, time consuming, and no evidence is overlooked - Legal issues vary on the possibility of a secondary warrant and off-site storage of the secondary evidence
  • 10. Searching and Seizing Computers ā€¢ To find out evidence from computer by looking it from different aspects and captured that for further off-site searching thoroughly. ā€¢ Searching and seizing computers can be with warrant or without warrant
  • 11. Continuedā€¦. ā€¢ Searching and seizing computers with or without warrant depends upon the constitution of respective country ā€¢ Constitutions of the countries are different from each other due to several reasons ā€¢ Geographical ā€¢ Cultural ā€¢ Ethnics ā€¢ Religious differences ā€¢ etc
  • 12. Searching and Seizing Computers without warrant No legal documents requiredā€¦ā€¦ā€¦
  • 13. Reasons for (without warrant) ā€¢ According to the Fourth amendments of US ā€¢ The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. ā€¢
  • 14. Analytical Model ā€¢ This model is used to determine if a search and/or seizure has occurred, and If it has occurred, was it reasonable (legal) 1) WHO conducted the search/seizure? 2) WHAT has been searched/seized? 3) Was there a SEARCH/SEIZURE? 4) If so, was it REASONABLE
  • 15. 1) WHO conducted the search and/or seizure? Agency or official of the government
  • 16. 2) WHAT has been searched and/or seized? Was it a person, house, paper and/or ā€œeffectā€ (other possesion)
  • 17. 3) Was there a SEARCH and/or SEIZURE? The Supreme Court has defined ā€œSearchā€ as any governmental intrusion into something in which a person has a reasonable expectation of privacy. A ā€œseizureā€ is any taking into possession, custody or control
  • 18. 4) If there was a search and/or seizure, was it REASONABLE? ā€¢ Was there a valid search or seizure warrant? ā€¢ Or, did one of the exceptions to the warrant requirement apply?
  • 19. Cases: Search and/or Seizure? 1) Lucy breaks into her ex boyfriendā€™s apartment and steals some of her old love letters to him. 2) The police order Joe to have a blood test to determine how much alcohol he has in his bloodstream
  • 20. Cases: Search and/or Seizure? 3) Officer Jones stops Tim and asks him what he is doing, then looks through the suitcase Tim is carrying. 4) Tim is arrested and taken to jail. 5) The FBI puts a wiretap on Ellenā€™s telephone and listens to her conversations.
  • 21. Reasonable vs Unreasonable ā€¢ For a search/seizure to be reasonable there must be a warrant issued by a judge or magistrate ā€¢ The police must have probable cause to convince a judge to sign a warrant ā€¢ There are also some exceptions to the warrant requirement.
  • 22. Probable Cause There must be good reason to believe that that a crime has been, is being, or is about to be committed, and that the person, place or thing which is to be searched or seized is involved in some way.
  • 23. Exceptions to the Warrant Requirement 1) Search Incident to a Lawful Arrest extends to everything w/in arresteeā€™s immediate control 2) Stop and Frisk can frisk outer layer of clothing with ā€œarticulable suspicionā€ of crime 3) Emergency Situations Bomb threats, burning buildings, etc. 4) Hot Pursuit Warrant not required for places police follow suspect into. 5) Items connected with crime in Plain View If police had a right to be there in the first place
  • 24. Exceptions to the Warrant Requirement 6) Consent A person may ā€˜knowingly and voluntarilyā€™ let police search w/o a warrant. Fraud and deception are excepted. Must be that personā€™s or common property. In some case eg. parent/child, teacher/student, a person may legally let police search someone elseā€™s property 7) Abandoned Property Once you abandon something you give up the expectation of privacy. 8) Border & Airline Searches Customs Agents may search w/o warrant OR probable cause. Airline personnel may search passengers and carry on luggage with metal detectors and/or x-rays 9) Vehicle Searches Police may search a vehicle WITH Probable Cause W/O Warrant
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Searching and Seizing Computers with a warrant legal documents requiredā€¦ā€¦ā€¦
  • 42. Warrant preparation ā€¢ Warrants: Should be prepared and reviewed by legal specialists & computer division commanders. It ensures that all language, protections, equipment, media, and incidentals, which may be brought up in a court of law are stated. It also breeds familiarity with the investigators, & ensures judicial approval. Probable Cause: Must state that a crime has been committed, there is evidence of the crime, & evidence resides at a particular location Seizing Equipment: The proper seizing of all hardware & software items at the scene of the crime
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. Reference Most of the slides are exactly copied and taken from the CHFI Slides Notesā€¦ā€¦..
  • 50. Thank You For Your PatienceFor Your Patience

Editor's Notes

  1. Subjective expectation of privacy: Person mush have taken some action to ensure his privacy
  2. Exigent: Needing urgent attention