SlideShare a Scribd company logo
1 of 26
Forensic Computing Operational Procedures Allan Watt Dip Policing, BBS, PGDip Forensic, MSc (Hons), CFCE, CFE 5 August 2010
Forensic Computing Operational Procedures 2 Overview ,[object Object]
Attendance at execution orders
Obtaining an accurate brief from the client
The pre-analysis plan
Conducting analysis
Case studies ,[object Object]
Problems Forensic Computing Operational Procedures 4 Bleeding to death scenario I need an ambulance now at any cost Less is more, well is costs more anyway  A big problem when it is not there or easily retrievable
Pre-deployment Forensic Computing Operational Procedures 5 Obtain as much information as you can pre-deployment, even if it is your client What type of case is it? Could affect the standard of evidence e.discoveryvse.forensics What is the client after, what evidence do they require? No point cloning the mail server if email is not involved  Gather as much intel about what IT infrastructure
Predeployment Forensic Computing Operational Procedures 6 Consider all possibilities with covert collections Have contingences available Back out plan Consider the masquerade
Packing to go Forensic Computing Operational Procedures 7 What to take: Labels Notebook Receipts/ Exhibit sheets Sketching material – floor plans Still and video camera Security Transport Gloves
Packing to go Forensic Computing Operational Procedures 8 Torch Cables Toolkit Tech sheets
Forensic Computing Operational Procedures 9 ,[object Object]
differing evidence for each approach
Remember cable configuration
Remember to get the internal clock times off all devices
Remember drive configuration
The RAID may not work
Remember to plug the drives back in
It may sound stupid but it happens,[object Object]
Onsite restrictions Forensic Computing Operational Procedures 11 Make sure you have enough donor media Make sure it is cleansed Consider security as well, hostilities can be a problem Interference or even theft of evidence Logistics support in the event you may be there for a long time 16 hours can be a long time watching the grass grow on an empty stomach
Obtaining an accurate brief from the client Forensic Computing Operational Procedures 12 Outcome  legal dismissal fishing expedition (Covert enquiry) Prevention Output  what do they need or  what is needed to obtain the outcome
Obtaining an accurate brief from the client Forensic Computing Operational Procedures 13 What is needed to get the required data to provide this output What sources are required, does the client have access to them Get  Dates Times location
Forensic Computing Operational Procedures 14 email addresses computer usage post incident who has had access, (pre and post) usernames and passwords names of persons involved legal privilege criminal post action
The pre-analysis plan Forensic Computing Operational Procedures 15 You may end up in a sausage factory What flavour would you like? Horses for courses Sometimes you may need all of the following sometimes one Every case is different need to adjust to suit each case and may need to adjust on the way as the scene changes
Investigations Categories Forensic Computing Operational Procedures 16 Four main categories Data movement Authentication of data System - User activity  Content

More Related Content

Similar to Forensics computing operational procedures

Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?loglogic
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi PowerpointJbhirsh
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxsmile790243
 
public and private sectors.pptx
public and private sectors.pptxpublic and private sectors.pptx
public and private sectors.pptxvenu154151
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics WorkshopTim Fletcher
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesBRNSSPublicationHubI
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 

Similar to Forensics computing operational procedures (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy LawKMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
KMA Insights Webinar July 2009 -- Compliance with MA Privacy Law
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Cyber
CyberCyber
Cyber
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
public and private sectors.pptx
public and private sectors.pptxpublic and private sectors.pptx
public and private sectors.pptx
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Incident response process
Incident response processIncident response process
Incident response process
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Forensics computing operational procedures

  • 1. Forensic Computing Operational Procedures Allan Watt Dip Policing, BBS, PGDip Forensic, MSc (Hons), CFCE, CFE 5 August 2010
  • 2.
  • 4. Obtaining an accurate brief from the client
  • 7.
  • 8. Problems Forensic Computing Operational Procedures 4 Bleeding to death scenario I need an ambulance now at any cost Less is more, well is costs more anyway A big problem when it is not there or easily retrievable
  • 9. Pre-deployment Forensic Computing Operational Procedures 5 Obtain as much information as you can pre-deployment, even if it is your client What type of case is it? Could affect the standard of evidence e.discoveryvse.forensics What is the client after, what evidence do they require? No point cloning the mail server if email is not involved Gather as much intel about what IT infrastructure
  • 10. Predeployment Forensic Computing Operational Procedures 6 Consider all possibilities with covert collections Have contingences available Back out plan Consider the masquerade
  • 11. Packing to go Forensic Computing Operational Procedures 7 What to take: Labels Notebook Receipts/ Exhibit sheets Sketching material – floor plans Still and video camera Security Transport Gloves
  • 12. Packing to go Forensic Computing Operational Procedures 8 Torch Cables Toolkit Tech sheets
  • 13.
  • 14. differing evidence for each approach
  • 16. Remember to get the internal clock times off all devices
  • 18. The RAID may not work
  • 19. Remember to plug the drives back in
  • 20.
  • 21. Onsite restrictions Forensic Computing Operational Procedures 11 Make sure you have enough donor media Make sure it is cleansed Consider security as well, hostilities can be a problem Interference or even theft of evidence Logistics support in the event you may be there for a long time 16 hours can be a long time watching the grass grow on an empty stomach
  • 22. Obtaining an accurate brief from the client Forensic Computing Operational Procedures 12 Outcome legal dismissal fishing expedition (Covert enquiry) Prevention Output what do they need or what is needed to obtain the outcome
  • 23. Obtaining an accurate brief from the client Forensic Computing Operational Procedures 13 What is needed to get the required data to provide this output What sources are required, does the client have access to them Get Dates Times location
  • 24. Forensic Computing Operational Procedures 14 email addresses computer usage post incident who has had access, (pre and post) usernames and passwords names of persons involved legal privilege criminal post action
  • 25. The pre-analysis plan Forensic Computing Operational Procedures 15 You may end up in a sausage factory What flavour would you like? Horses for courses Sometimes you may need all of the following sometimes one Every case is different need to adjust to suit each case and may need to adjust on the way as the scene changes
  • 26. Investigations Categories Forensic Computing Operational Procedures 16 Four main categories Data movement Authentication of data System - User activity Content
  • 27. Data movement Forensic Computing Operational Procedures 17 Link files last access dates(check for AV) Registry USB CD etc, MRU Webmail Browser history
  • 28. Authentication of data Forensic Computing Operational Procedures 18 OS metadata app metadata Datetime.cpl link files MRU temp files – data carve lack of original files
  • 29. User activity Forensic Computing Operational Procedures 19 Registry last log in web history email, banking, trading, hobbies/sports– cookie dates, other unrelated computer evidence such as door access emails
  • 30. User activity Forensic Computing Operational Procedures 20 data carve web pages consider gaming interaction and logging event files
  • 31. Content Forensic Computing Operational Procedures 21 web history web content encrypted data text image data (scanned text) email parsing compressed/zip files Then keyword search (consider which to use benefits and drawbacks) live index
  • 32. Conducting analysis Forensic Computing Operational Procedures 22 Time is money in the outside world and the client won’t pay for time spent fishing for irrelevant information Browse the files and use your eyes, look through the trees and not at them and look for things that are out of place. Sort by, last accessed, Modified created and look at other activity around the same time
  • 33. Conducting analysis Forensic Computing Operational Procedures 23 Look for methods to directly locate what you are looking for but don’t shortcut so you miss the smoking gun Use the power of the tools and make them do the work and limit what you have to look at Stick to your plan Stick to your knitting
  • 34. Conducting analysis Forensic Computing Operational Procedures 24 Email – then process the email Image files then locate current and deleted image files User activity look for who was using it what and when within minutes check cookie times – good source of independent time assessment Can we really ever say who was or was not using the computer?
  • 35. Case studies Forensic Computing Operational Procedures 25 Tran Travel Agent Nth Syd Software Coy Yachting Architect Tainui Uncle Niece UNITEC Family Cases – Plane – Apartment – Dating sites Stolen laptop Breach of court order laptop
  • 36. Questions? Allan Watt a.watt@elaw.com.au (02) 9221 1366 Office 04 2356 7813 Mobile Forensic Computing Operational Procedures 26