SlideShare a Scribd company logo
Objective and Priority
 Objective of Computer Forensics
- To recovery, analyze and present computer based
material in such a way that is it usable as evidence in a
court of law
- Note that the definition is the following: “computer
forensics, involves the preservation, identification,
extraction, and documentation of computer evidence
stored as data or magnetically encoded information”, by
John Vacca
 Priority
- Main priority is with forensics procedures, rules of
evidence and legal processes; computers are secondary
- Therefore accuracy is crucial
Accuracy vs Speed
 Tradeoffs between accuracy and speed
- E.g., Taking 4 courses in a semester vs. 2 courses; more
likely to get Bs and not As
- Writing a report in a hurry means likely less accurate
 Accuracy: Integrity and Security of the evidence is crucial
- No shortcuts, need to maintain high standards
 Speed may have to be sacrificed for accuracy.
- But try to do it as fast as you can provided you do not
compromise accuracy
The Job of a Forensics Specialist
 Determine the systems from which evidence is collected
 Protect the systems from which evidence is collected
 Discover the files and recover the data
 Get the data ready for analysis
 Carry out an analysis of the data
 Produce a report
 Provide expert consultation and/or testimony?
Applications: Law Enforcement
 Important for the evidence to be handled by a forensic expert;
else it may get tainted
 Need to choose an expert carefully
- What is his/her previous experience? Has he/she worked
on prior cases? Has he/she testified in court? What is
his/her training? Is he CISSP certified?
 Forensic expert will be scrutinized/cross examined by the
defense lawyers
 Defense lawyers may have their own possibly highly paid
experts?
Applications: Human Resources
 To help the employer
- What web sites visited?
- What files downloaded
- Have attempts been made to conceal the evidence or
fabricate the evidence
- Emails sent/received
 To help the employee
- Emails sent by employer – harassment
- Notes on discrimination
- Deleted files by employer
Applications: Other
 Supporting criminals
- Gangs using computer forensics to find out about
members and subsequently determine their whereabouts
 Support rogue governments and terrorists
- Terrorists using computer forensics to find out about
what we (the good guys) are doing
 We and the law enforcement have to be one step ahead of the
bad guys
 Understand the mind of the criminal
Services
 Data Services
- Seizure, Duplication and preservation, recovery
 Document and Media
- Document searched, Media conversion
 Expert witness
 Service options
 Other services
Data Services
 Data Seizure
- The expert should assist the law enforcement official in
collecting the data.
- Need to identify the disks that contain the data
 Data Duplication and Preservation
- Data absolutely cannot be contaminated
- Copy of the data has to be made and need to work with
the copy and keep the original in a safe place
 Data Recovery
- Once the device is seized (either local or remote) need to
use appropriate tools to recover the data
Data Services: Finding Hidden Data
 When files are deleted, usually they can be recovered
 The files are marked as deleted, but they are still residing in
the disk until they are overwritten
 Files may also be hidden in different parts of the disk
 The challenge is to piece the different part of the file together
to recover the original file
 There is research on using statistical methods for file
recovery
 http://www.cramsession.com/articles/files/finding-hidden-
data---how-9172003-1401.asp
 http://www.devtarget.org/downloads/ca616-seufert-
wolfgarten-assignment2.pdf
Document and Media Services
 Document Searches
- Efficient search of numerous documents
- Check for keywords and correlations
 Media Conversion
- Legacy devices may contain unreadable data. This data
ahs to be converted using appropriate conversion tools
- Should be placed in appropriate storage for analysis
Expert Witness Services
 Expert should explain computer terms and complicated processes in
an easy to understand manner to law enforcement, lawyers, judges
and jury
- Computer technologists and lawyers speak different languages
 Expertise
- Computer knowledge and expertise in computer systems,
storage
- Knowledge on interacting with lawyers, criminology
- Domain knowledge such as embezzlement, child exploitation
 Should the expert witness and the forencis specialist be one and the
same?
Service Options
 Should provide various types of services
- Standard, Emergency, Priority, Weekend After hours
services
 Onsite/Offsite services
 Cost and risks – major consideration
 Example: Computer Forensics Services Corporation
- http://www.computer-forensic.com/
- As stated in the above web site, this company provides
“expert, court approved, High Tech Investigations,
litigation support and IT Consulting.” They also
"Preserve, identify, extract, document and interpret
computer data. It is often more of an art than a science,
but as in any discipline, computer forensic specialists
follow clear, well-defined methodologies and procedures.”
Other Services
 Computer forensics data analysis for criminal and civil
investigations/litigations
 Analysis of company computers to determine employee
activity
- If he/she conducting his own business and/or
downloading pornography
- Surveillance for suspicious event detection
 Produce timely reports
Benefits of using Professional services
 Protecting the evidence
- Should prevent from damage and corruption
 Secure the evidence
- Store in a secure place, also use encryption technologies
such as public/private keys
 Ensure that the evidence is not harmed by virus
 Document clearly who handled the data and when - auditing
 Cleint/Attoney privilege
 Freeze the scene of the crime – do not contaminate or change
Using the Evidence:
Criminal and Civil Proceedings
 Criminal prosecutors
 Civil litigation attorneys – harassment, discrimination,
embezzlement, divorce
 Insurance companies
 Computer forensics specialists to help corporations and
lawyers
 Law enforcement officials
 Individuals to sue a company
 Also defense attorneys, and “the bad guys”
Issues and Problems that could occur
 Computer Evidence MUST be
- Authentic: not tampered with
- Accurate: have high integrity
- Complete: no missing points
- Convincing: no holes
- Conform: rules and regulations
- Handle change: data may be volatile and time sensitive
- Handle technology changes: tapes to disks; MAC to PC
- Human readable: Binary to words
Legal tests
 Countries with a common law tradition
- UK, US, Possibly Canada, Australia, New Zealand
 Real evidence
- Comes from an inanimate object and can be examined by
the court
 Testimonial evidence
- Live witness when cross examined
 Hearsay
- Wiki entry “Hearsay in English law and Hearsay in United
States law, a legal principle concerning the admission of
evidence through repetition of out-of-court statements”
 Are the following admissible in court?
- Data mining results, emails, printed documents
Traditional Forensics vs Computer Forensics
 Traditional Forensics
- Materials tested and testing methods usually do not
change rapidly
- Blood, DNA, Drug, Explosive, Fabric
 Computer Forensics
- Material tested and testing methods may change rapidly
- We did not have web logs in back in 1990
- We did not have RAID storage in 1980
Types of Acquisition
 Static Acquisition
- Acquire data from the original media
- The data in the original media will not change
 Live Acquisition
- Acquire data while the system is running
- A second live acquisition will not be the same
 Will focus on static acquisition
Digital Evidence Storage Formats
 Raw formats
- Bit by bit copying of the data from the disk
- Many tools could be used
 Proprietary formats
- Vendors have special formats
 Standards
- XML based formats for digital evidence
- Digital Evidence Markup Language
(Funded by National Institute of Justice)
- Experts have argued that technologies that allow disparate law
enforcement jurisdictions to share crime-related information will greatly
facilitate fighting crime. One of these technologies is the Global Justice
XML Data Model (GJXDM).
- http://ncfs.ucf.edu/digital_evd.html
Acquisition Methods
 Disk to Image File
 Disk to Disk
 Logical acquisition
- Acquire only certain files if the disk is too large
 Sparse acquisition
- Similar to logical acquisition but also collects fragments
of unallocated (i.e. deleted) data
Compression Methods
 Compression methods are used for very large data storage
- E.g., Terabytes/Petabytes storage
 Lossy vs Lossless compression
- Lossless data compression is a class of data
compression algorithms that allows the exact original
data to be reconstructed from the compressed data. The
term lossless is in contrast to lossy data compression,
which only allows an approximation of the original data to
be reconstructed, in exchange for better compression
rates.
Contingency Planning
 Failure occurs during acquisition
- Recovery methods
 Make multiple copies
- At least 2 copies
 Encryption decryption techniques so that the evidence is not
corrupted

More Related Content

Similar to computer forensics, involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information

644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Ramesh Ogania
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
Muzzammil Wani
 
Cyber
CyberCyber
Cyber
PuttaRahul
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Bense Tony
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 

Similar to computer forensics, involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information (20)

644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
CF.ppt
CF.pptCF.ppt
CF.ppt
 
Sujit
SujitSujit
Sujit
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Cyber
CyberCyber
Cyber
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 

computer forensics, involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information

  • 1. Objective and Priority  Objective of Computer Forensics - To recovery, analyze and present computer based material in such a way that is it usable as evidence in a court of law - Note that the definition is the following: “computer forensics, involves the preservation, identification, extraction, and documentation of computer evidence stored as data or magnetically encoded information”, by John Vacca  Priority - Main priority is with forensics procedures, rules of evidence and legal processes; computers are secondary - Therefore accuracy is crucial
  • 2. Accuracy vs Speed  Tradeoffs between accuracy and speed - E.g., Taking 4 courses in a semester vs. 2 courses; more likely to get Bs and not As - Writing a report in a hurry means likely less accurate  Accuracy: Integrity and Security of the evidence is crucial - No shortcuts, need to maintain high standards  Speed may have to be sacrificed for accuracy. - But try to do it as fast as you can provided you do not compromise accuracy
  • 3. The Job of a Forensics Specialist  Determine the systems from which evidence is collected  Protect the systems from which evidence is collected  Discover the files and recover the data  Get the data ready for analysis  Carry out an analysis of the data  Produce a report  Provide expert consultation and/or testimony?
  • 4. Applications: Law Enforcement  Important for the evidence to be handled by a forensic expert; else it may get tainted  Need to choose an expert carefully - What is his/her previous experience? Has he/she worked on prior cases? Has he/she testified in court? What is his/her training? Is he CISSP certified?  Forensic expert will be scrutinized/cross examined by the defense lawyers  Defense lawyers may have their own possibly highly paid experts?
  • 5. Applications: Human Resources  To help the employer - What web sites visited? - What files downloaded - Have attempts been made to conceal the evidence or fabricate the evidence - Emails sent/received  To help the employee - Emails sent by employer – harassment - Notes on discrimination - Deleted files by employer
  • 6. Applications: Other  Supporting criminals - Gangs using computer forensics to find out about members and subsequently determine their whereabouts  Support rogue governments and terrorists - Terrorists using computer forensics to find out about what we (the good guys) are doing  We and the law enforcement have to be one step ahead of the bad guys  Understand the mind of the criminal
  • 7. Services  Data Services - Seizure, Duplication and preservation, recovery  Document and Media - Document searched, Media conversion  Expert witness  Service options  Other services
  • 8. Data Services  Data Seizure - The expert should assist the law enforcement official in collecting the data. - Need to identify the disks that contain the data  Data Duplication and Preservation - Data absolutely cannot be contaminated - Copy of the data has to be made and need to work with the copy and keep the original in a safe place  Data Recovery - Once the device is seized (either local or remote) need to use appropriate tools to recover the data
  • 9. Data Services: Finding Hidden Data  When files are deleted, usually they can be recovered  The files are marked as deleted, but they are still residing in the disk until they are overwritten  Files may also be hidden in different parts of the disk  The challenge is to piece the different part of the file together to recover the original file  There is research on using statistical methods for file recovery  http://www.cramsession.com/articles/files/finding-hidden- data---how-9172003-1401.asp  http://www.devtarget.org/downloads/ca616-seufert- wolfgarten-assignment2.pdf
  • 10. Document and Media Services  Document Searches - Efficient search of numerous documents - Check for keywords and correlations  Media Conversion - Legacy devices may contain unreadable data. This data ahs to be converted using appropriate conversion tools - Should be placed in appropriate storage for analysis
  • 11. Expert Witness Services  Expert should explain computer terms and complicated processes in an easy to understand manner to law enforcement, lawyers, judges and jury - Computer technologists and lawyers speak different languages  Expertise - Computer knowledge and expertise in computer systems, storage - Knowledge on interacting with lawyers, criminology - Domain knowledge such as embezzlement, child exploitation  Should the expert witness and the forencis specialist be one and the same?
  • 12. Service Options  Should provide various types of services - Standard, Emergency, Priority, Weekend After hours services  Onsite/Offsite services  Cost and risks – major consideration  Example: Computer Forensics Services Corporation - http://www.computer-forensic.com/ - As stated in the above web site, this company provides “expert, court approved, High Tech Investigations, litigation support and IT Consulting.” They also "Preserve, identify, extract, document and interpret computer data. It is often more of an art than a science, but as in any discipline, computer forensic specialists follow clear, well-defined methodologies and procedures.”
  • 13. Other Services  Computer forensics data analysis for criminal and civil investigations/litigations  Analysis of company computers to determine employee activity - If he/she conducting his own business and/or downloading pornography - Surveillance for suspicious event detection  Produce timely reports
  • 14. Benefits of using Professional services  Protecting the evidence - Should prevent from damage and corruption  Secure the evidence - Store in a secure place, also use encryption technologies such as public/private keys  Ensure that the evidence is not harmed by virus  Document clearly who handled the data and when - auditing  Cleint/Attoney privilege  Freeze the scene of the crime – do not contaminate or change
  • 15. Using the Evidence: Criminal and Civil Proceedings  Criminal prosecutors  Civil litigation attorneys – harassment, discrimination, embezzlement, divorce  Insurance companies  Computer forensics specialists to help corporations and lawyers  Law enforcement officials  Individuals to sue a company  Also defense attorneys, and “the bad guys”
  • 16. Issues and Problems that could occur  Computer Evidence MUST be - Authentic: not tampered with - Accurate: have high integrity - Complete: no missing points - Convincing: no holes - Conform: rules and regulations - Handle change: data may be volatile and time sensitive - Handle technology changes: tapes to disks; MAC to PC - Human readable: Binary to words
  • 17. Legal tests  Countries with a common law tradition - UK, US, Possibly Canada, Australia, New Zealand  Real evidence - Comes from an inanimate object and can be examined by the court  Testimonial evidence - Live witness when cross examined  Hearsay - Wiki entry “Hearsay in English law and Hearsay in United States law, a legal principle concerning the admission of evidence through repetition of out-of-court statements”  Are the following admissible in court? - Data mining results, emails, printed documents
  • 18. Traditional Forensics vs Computer Forensics  Traditional Forensics - Materials tested and testing methods usually do not change rapidly - Blood, DNA, Drug, Explosive, Fabric  Computer Forensics - Material tested and testing methods may change rapidly - We did not have web logs in back in 1990 - We did not have RAID storage in 1980
  • 19. Types of Acquisition  Static Acquisition - Acquire data from the original media - The data in the original media will not change  Live Acquisition - Acquire data while the system is running - A second live acquisition will not be the same  Will focus on static acquisition
  • 20. Digital Evidence Storage Formats  Raw formats - Bit by bit copying of the data from the disk - Many tools could be used  Proprietary formats - Vendors have special formats  Standards - XML based formats for digital evidence - Digital Evidence Markup Language (Funded by National Institute of Justice) - Experts have argued that technologies that allow disparate law enforcement jurisdictions to share crime-related information will greatly facilitate fighting crime. One of these technologies is the Global Justice XML Data Model (GJXDM). - http://ncfs.ucf.edu/digital_evd.html
  • 21. Acquisition Methods  Disk to Image File  Disk to Disk  Logical acquisition - Acquire only certain files if the disk is too large  Sparse acquisition - Similar to logical acquisition but also collects fragments of unallocated (i.e. deleted) data
  • 22. Compression Methods  Compression methods are used for very large data storage - E.g., Terabytes/Petabytes storage  Lossy vs Lossless compression - Lossless data compression is a class of data compression algorithms that allows the exact original data to be reconstructed from the compressed data. The term lossless is in contrast to lossy data compression, which only allows an approximation of the original data to be reconstructed, in exchange for better compression rates.
  • 23. Contingency Planning  Failure occurs during acquisition - Recovery methods  Make multiple copies - At least 2 copies  Encryption decryption techniques so that the evidence is not corrupted