Fundamentals of ForensicPhonetics
• Forensic phonetics deals with the analysis of speech and sounds to assist in legal matters, such as
identifying speakers or verifying the authenticity of audio recordings. The field includes several key
areas:
• 1. Speech Articulators and Their Forms
• Speech articulators are the physical structures in our vocal tract used to produce speech sounds.
These include:
• Lips: For sounds like /p/ and /b/ (bilabial sounds).
• Used to make sounds like /p/ and /b/. These are called bilabial sounds because both lips come
together to block and release air.
• Example: In the word "pat," the /p/ sound is produced by closing the lips and then releasing air.
• Teeth: Contribute to sounds like /f/ and /v/ (labiodental sounds).
1. Help in producing sounds like /f/ and /v/. These are called labiodental sounds because the bottom lip touches
the upper teeth.
2. Example: In the word "fish," the /f/ sound is made by touching the lower lip to the upper teeth and blowing
air.
3.
1.Alveolar Ridge:
1. Thisbony ridge behind the upper front teeth is involved in making sounds
like /t/ and /d/. These are alveolar sounds because the tongue touches or
comes near the alveolar ridge.
2. Example: In the word "dog," the /d/ sound is made by placing the tongue
against the alveolar ridge and then releasing it.
2.Hard Palate:
1. The roof of your mouth is involved in making sounds like /ʃ/ (the "sh" sound).
These are palatal sounds.
2. Example: In the word "shoe," the /ʃ/ sound is produced by the tongue coming
close to the hard palate.
4.
5. Velum (SoftPalate):
1.The soft part at the back of the roof of the mouth helps produce
sounds like /k/ and /g/, which are called velar sounds.
2.Example: In the word "cat," the /k/ sound is made when the back
of the tongue touches the velum and then releases air.
6. Tongue:
3.The tongue is very flexible and produces many sounds. It’s
involved in most speech sounds by changing its shape and
position in the mouth.
4.Example: The /l/ sound in "lake" is produced by the tongue
touching the alveolar ridge while allowing air to flow around it.
5.
• 2. Soundsof Speech & Components
• Phonetics studies the sounds of human speech. Sounds can be classified as:
• Phonetics
• Phonetics is the study of how speech sounds are made, transmitted, and received. It focuses on the
physical aspect of speech sounds.
• 2. Vowels
• Vowels are produced with an open vocal tract, meaning there is little to no obstruction to the flow of air.
• Example:
• /a/ as in the word "father."
• /e/ as in the word "bed."
• In both examples, there is no significant blockage of air when producing the vowel sounds.
• 3. Consonants
• Consonants are sounds made with some kind of constriction or obstruction in the vocal tract.
• Example:
• /t/ as in "top": Here, the tongue touches the alveolar ridge, blocking airflow momentarily before it's released.
• /k/ as in "cat": The back of the tongue touches the soft palate (velum), restricting the airflow.
6.
Components of SpeechSound Production:
• Phonation:
• This is the vibration of the vocal cords that produces voiced sounds.
• Example:
• In /b/ (as in "bat"), the vocal cords vibrate as you produce the sound.
• In /d/ (as in "dog"), the vocal cords also vibrate.
• Articulation:
• Articulation refers to how different parts of the mouth (lips, tongue,
palate) shape the airflow to create distinct speech sounds.
• Example:
• In the word "ship," the /ʃ/ sound is articulated by shaping the tongue close to the
hard palate.
7.
• Resonance:
• Resonanceis how the sound is amplified and modified by the vocal
tract, including the mouth, throat, and nasal passages.
• Example:
• In the word "moon," the /m/ sound is resonated through the nasal cavity,
giving it a distinct nasal quality.
• These components work together to allow us to produce the
wide variety of sounds needed for speech.
8.
Forensic Acoustics
Forensic acousticsrefers to the analysis of sound properties for investigative purposes, often used in
criminal investigations. This field involves tasks like determining the source of a sound, verifying the
authenticity of audio recordings, or identifying tampered sections of an audio file. Forensic acousticians
analyze audio in great detail, using various measurements and techniques to uncover clues.
• Audio Level Measurement
• Sound Pressure Level (SPL): Measured in decibels (dB), this measures the loudness of sound.
• Peak Levels: The highest amplitude point in an audio signal.
• RMS (Root Mean Square): A way to calculate the average power of the audio signal, giving a measure of
its overall loudness.
• Spectrum
• Frequency Spectrum: Shows the distribution of frequencies in a sound.
• Low frequencies: Bass sounds.
• Mid frequencies: Human speech typically ranges between 300 Hz to 3,000 Hz.
• High frequencies: Treble sounds, such as sharp noises.
• In forensic applications, spectrum analysis can be used to identify unique voice patterns, background
noises, or tampered sections of an audio recording.
9.
Audio Level Measurement:
•Sound Pressure Level (SPL): This is a way to measure how loud a sound is.
It is quantified in decibels (dB), which is a unit to express the intensity of
sound. For example, a normal conversation might be around 60 dB, while
a rock concert could reach 120 dB.
• Peak Levels: This is the highest point of the audio signal in terms of
amplitude (the strength of the sound wave). Imagine a recording of a
person shouting, and at one point, they scream—the loudest part of that
scream is the peak level.
• RMS (Root Mean Square): RMS is a mathematical way of determining the
overall loudness of a sound by averaging its power over time. If the sound
fluctuates, like in a conversation where someone speaks softly and then
loudly, RMS helps to smooth out the measurement and provides an overall
sense of loudness.
10.
Spectrum Analysis
• FrequencySpectrum: This shows how sound energy is
distributed across different frequencies (the rate at which
sound waves vibrate).
• Low Frequencies (Bass): These are the deep, booming sounds,
such as a drum or bass guitar. Frequencies below 300 Hz usually
fall into this category.
• Mid Frequencies: These frequencies are typically where human
speech lies, ranging from 300 Hz to 3,000 Hz. This range is crucial
for understanding spoken words.
• High Frequencies (Treble): These are sharp or high-pitched
sounds, like the chirping of birds or the screech of a whistle.
Frequencies above 3,000 Hz are considered high frequencies.
11.
• 4. Digitaland Analog Audio Recording
• Analog Audio Recording: Captures sound as a continuous wave. Analog tapes, vinyl,
or magnetic media can be used for this. While the quality is often warm, analog
recordings are more prone to noise, distortion, and degradation over time.
• Digital Audio Recording: Converts sound waves into discrete binary data (1s and 0s).
Digital audio is easier to manipulate and store without degradation.
• Sampling Rate: Defines how often the sound is measured per second. For speech, 44.1 kHz is
common.
• Example of Sampling Rate:
• The sampling rate tells you how often the sound is captured per second. For
example, 44.1 kHz means the sound is sampled 44,100 times per second.
• Think of it like taking 44,100 pictures of the sound wave every second.
• Higher sampling rates capture more detail, but for speech or basic audio, 44.1 kHz is standard.
12.
• Bit Depth:Determines the dynamic range of the recording,
with higher bit depth allowing more detail.
• Example of Bit Depth:
• Bit depth controls how detailed the sound's dynamic range
is (the difference between the softest and loudest sounds).
• A 16-bit depth (common for CDs) gives enough range for most
audio. It provides 65,536 levels of sound volume.
• A 24-bit depth (used in professional audio) offers 16.7 million
levels, allowing for even finer details in quiet and loud sounds.
13.
Forensic Speech RecognitionApproaches: Auditory &
Spectrogram
1. Auditory Analysis
• This approach relies on the human ability to recognize voice characteristics. An expert
listens to audio recordings and evaluates features such as pitch, rhythm, accent,
pronunciation, and any idiosyncrasies in the speaker's voice.
• Key characteristics analyzed:
• Pitch: Refers to the highness or lowness of the voice.
• Timbre: The quality or color of the voice.
• Accent or Dialect: Variations in speech based on regional or social factors.
• Articulation: The clarity and precision with which sounds are produced.
• Voice Pathologies: Identifying any voice disorders, hoarseness, or unique features that may aid
identification.
• Challenges:
• Subjective nature: The listener’s experience, familiarity with accents, and even bias can influence
their judgment.
• Variability: A person’s voice can change due to stress, illness, or age, which complicates analysis.
14.
Key Concepts inForensic Acoustics:
• Pitch
• Pitch refers to the perceived highness or lowness of a voice. It is primarily determined by the
frequency of the vocal cords' vibrations. A higher pitch corresponds to a faster vibration of the
vocal cords, while a lower pitch corresponds to slower vibrations.
• Example: Think of a young child speaking versus an adult male. A child's voice tends to have a
high pitch due to their smaller vocal cords, while an adult male usually has a lower pitch
because of his larger vocal cords. An ear witness may remember a very high-pitched voice, like
that of a child, or a very deep voice, which could be a helpful identifier.
• 2. Timbre
• Timbre, often referred to as the "color" or "quality" of the voice, is what makes two people with
the same pitch sound different. It includes the texture, warmth, breathiness, or resonance in a
voice.
• Example: Consider a voice that sounds “raspy” compared to one that sounds “smooth.”
Someone like a heavy smoker might have a raspy voice, while a trained singer might have a
smoother, richer sound. If an ear witness recalls a raspy voice, it can indicate a possible smoker
or someone with a voice affected by health conditions like vocal nodules
15.
• Accent orDialect
• Accents and dialects are variations in speech that are linked to a speaker's regional, national, or
social background. Accents refer to the way words are pronounced, while dialect includes word
choices and grammar variations based on geography or culture.
• Example: If someone speaks with a British accent or uses terms like "lift" instead of "elevator,"
that is a clue that the speaker might be from the UK. If an ear witness reports hearing a
southern U.S. accent or a New York accent, this could help narrow down the suspect pool based
on their geographical origin.
• 4. Articulation
• Articulation refers to the clarity and precision with which speech sounds are produced. A person
may have clear, well-enunciated speech, or they may speak in a slurred or mumbled way.
• Example: Some people speak very clearly and pronounce each word precisely, while others
might slur their words, such as someone who is intoxicated. If a witness remembers that the
speaker was slurring their words or spoke very clearly, this might indicate something about the
speaker’s state of mind or personality (e.g., drunk, hurried, or confident).
16.
• Voice Pathologies
•Voice pathologies include any disorders or abnormalities in
the voice, such as hoarseness, stuttering, or vocal fry (a
creaky sound). These are unique vocal features that can help
distinguish one person’s voice from another.
• Example: If someone has a stutter or hoarseness from
laryngitis, that would be memorable to an ear witness. If a
witness describes the voice as "hoarse," it may suggest that
the speaker had a throat infection or chronic condition like
vocal strain.
17.
• 2. SpectrogramAnalysis
• A more scientific and objective method, spectrogram analysis visualizes sound waves. It uses
a spectrogram (a visual representation of frequencies, intensities, and time) to examine unique
voice characteristics.
• How it works:
• A spectrogram displays the frequency (y-axis), time (x-axis), and intensity (color shading).
• Experts analyze features like formants (resonant frequencies), harmonics (overtones), and voice onset
time (the time between the start of a consonant and the onset of voicing).
• Certain features of a person’s speech, like the patterns of their vowel sounds or the spacing of their formants,
can be uniquely identifiable.
• Key factors analyzed:
• Formants: Frequencies associated with vowels, often unique to an individual.
• Harmonic structure: How frequencies are distributed in voiced sounds.
• Duration: The length of time of spoken words or phonetic segments.
• Challenges:
• Equipment quality: Poor-quality recordings can result in unreliable spectrograms.
• Environmental noise: Background noise can interfere with sound quality.
18.
• Spectrogram analysisis a powerful tool used to analyze sound waves, especially when studying
speech patterns. Let’s break this down with an example to make it clear.
• Example Scenario: Identifying a Speaker Using Spectrogram Analysis
• Imagine you’re trying to identify a person based on a voice recording, such as in a forensic
investigation. You have two voice samples: one from a crime scene and one from a suspect. You
want to see if these two voices belong to the same person.
• Step-by-Step Explanation:
1.Recording the Voices:
1. You have two voice samples: Sample A (from the crime scene) and Sample B (from the suspect).
2. Both recordings are analyzed by creating spectrograms, which are visual representations of the sound waves.
2.Generating a Spectrogram:
1. The spectrogram shows how sound frequencies change over time.
2. Time (x-axis): This shows how the sound unfolds over time.
3. Frequency (y-axis): This shows the range of frequencies in the voice, from low to high.
4. Intensity (color shading): Brighter colors (like yellow or red) indicate higher intensity (louder sounds), while
darker colors (like blue) indicate lower intensity.
19.
1.Key Features Analyzed:
1.Formants: These are key frequencies associated with vowel sounds. Everyone’s
vowel formants are slightly different due to the unique shape of their vocal tract.
For instance, if Sample A and Sample B have similar formant patterns during
vowel sounds, it could suggest both samples come from the same person.
2. Harmonic Structure: This refers to the pattern of overtones present in the voice.
A voice has a fundamental frequency (the lowest frequency), and harmonics
(multiples of this frequency). The way these harmonics are distributed can
provide clues about a person’s vocal characteristics.
3. Voice Onset Time: This is the time it takes for a person to begin voicing after
making a consonant sound. For example, when someone says "p" followed by a
vowel, the time between the "p" and the vowel varies among individuals. If this
timing matches between Sample A and Sample B, it may be evidence they belong
to the same speaker.
20.
Challenges
1.Equipment Quality: IfSample A was recorded on a low-quality
device (e.g., a phone), the spectrogram might not capture all
details, making it harder to compare with Sample B.
2.Environmental Noise: If Sample A was recorded in a noisy
environment (e.g., on a busy street), the background sounds could
interfere with the spectrogram, making it difficult to isolate the
speaker's voice.
21.
Concepts of ForensicSpeaker Identification: Objective &
Subjective Methods
1. Objective Methods
• These methods use computer-based analysis to identify a speaker without
human interpretation.
• Speaker Recognition Systems:
• Automatic Speaker Recognition (ASR): A machine-learning approach that compares
a speech sample from an unknown individual with a database of known speakers.
• Feature Extraction: Computers break down speech into measurable features such as
pitch, tempo, or spectral energy distribution.
• Likelihood Ratios: Statistical models calculate the likelihood that two speech
samples came from the same person.
• Advantages:
• Less prone to human error or bias.
• Can process large datasets quickly and consistently
22.
Automatic Speaker Recognition
(ASR):
•This is a technology that uses machine learning to identify a
speaker. Imagine you have a recording of a person
speaking, and you want to know who that person is. The
system will compare this speech sample to a large database
of known speakers (people whose voice has already been
recorded and stored).
• Example:
• Let’s say a company has a voice authentication system for
employees. When an employee calls in, the system listens to
their voice and matches it against the voices stored in its
database. If the voice matches, the system knows it’s that
specific employee.
23.
Feature Extraction
• Whencomparing voices, the system doesn’t just listen to
words. Instead, it looks for specific, measurable features in
the speech such as pitch, tempo, or spectral energy
distribution. These features are unique to each individual,
just like a fingerprint.
• Example:
• Think of how everyone has a unique tone when they speak.
The computer breaks down the voice into various aspects
like how high or low the pitch is, how fast the person speaks
(tempo), and the distribution of energy in the sound waves
(spectral energy). These factors help the computer figure
out if the voices match.
24.
Likelihood Ratios
• Oncethe features are extracted, the system uses statistical
models to calculate how likely it is that two speech samples
came from the same person. The system doesn’t just say
"Yes" or "No." It calculates the probability that the unknown
voice is the same as the voice in the database.
• Example:
• Imagine you have two voice recordings—one from an
unknown person and one from a known speaker. The
system calculates how similar these two voices are and gives
a percentage or score, like "There’s a 90% chance these
voices belong to the same person.
25.
Advantages:
• Less proneto human error or bias: Computers don’t get
tired or make mistakes based on their mood or biases like
humans might.
• Example: In a court case, human judges or analysts may
interpret voices differently based on their own perceptions.
A computer-based system eliminates this subjectivity by
relying on data.
• Can process large datasets quickly and consistently:
Computers can analyze thousands of voice samples much
faster than a human could.
• Example: In a large company with thousands of employees,
it would take a person a long time to listen to and compare
26.
2. Subjective Methods
•In subjective methods, human experts compare speech samples
based on auditory or visual cues (like spectrograms) to make
judgments about identity.
• Expert Judgment:
• Human experts listen to or visually analyze voice features, relying on their
experience and training.
• In cases where spectrograms are used, an expert compares visual patterns
manually.
• Challenges:
• Subjective analysis is vulnerable to personal biases or interpretation errors.
• Requires extensive training and expertise to avoid misidentification
27.
Subjective Methods ofspeaker
recognition
• The image explains Subjective Methods of speaker recognition, which rely on human
expertise and judgment rather than computer algorithms. Let's break down these
ideas with an example to clarify the process.
• 1. Expert Judgment:
• In subjective methods, human experts listen to speech samples or visually analyze
features like spectrograms (visual representations of sound). The experts use their
experience and training to compare the speech characteristics of two samples and
decide whether they match.
• Example:
• Suppose there is a court case where someone’s voice is recorded during a crime, and a
suspect’s voice needs to be compared to that recording. A forensic expert would listen
to both recordings and analyze voice features like pitch, pronunciation, and speaking
style. The expert may also look at a spectrogram of the voice, which is a visual graph
showing how sound frequencies change over time, and compare the patterns.
28.
• 2. SpectrogramAnalysis:
• In cases where spectrograms are used, human experts manually compare
the visual patterns. Spectrograms translate sound into a visual format,
showing time on one axis and frequency (or pitch) on another axis. This
helps the expert see differences in speech that may not be easily audible.
• Example:
• The expert might examine two spectrograms—one from the recording at
the crime scene and one from the suspect. By visually comparing the
patterns in each, the expert looks for similarities in how certain sounds are
produced. For instance, if both spectrograms show similar peaks and
patterns for the way the person says the letter "S," it could suggest a
match.
29.
• Challenges:
• Vulnerabilityto personal bias: Human analysis is subjective and can be influenced
by the expert's own biases or errors. For example, an expert might unconsciously
favor a match if they already believe the suspect is guilty.
• Example: If the expert knows details about the case beforehand, they might
unintentionally be more inclined to say the voices match, even if the evidence is not
strong.
• Requires extensive training and expertise: Accurately identifying voice features
requires years of training. An untrained person might miss subtle differences or
similarities between voices.
• Example: Inexperienced analysts might misidentify a voice because they lack the
skill to detect subtle patterns in pitch or speech tempo. An expert with training in
forensic phonetics, however, can avoid such mistakes by relying on their detailed
knowledge.
30.
Admissibility of EvidenceBased on Speaker
Identification & Speech Recognition
• Forensic speaker identification, especially in legal contexts,
needs to meet certain criteria for the evidence to be
admissible in court.
• a. Frye Standard (General Acceptance Test)
• In the U.S., the Frye Standard requires that scientific
evidence, including forensic speech identification, be
"generally accepted" by experts in the field before it can be
admitted in court.
• If a particular forensic speech analysis method (e.g.,
spectrographic analysis) is accepted by the broader scientific
community, it can be used as evidence.
31.
• b. DaubertStandard
• The Daubert Standard is a more stringent test of
admissibility, requiring:
• The theory or technique to be testable.
• It has been subject to peer review and publication.
• There is a known or potential error rate.
• The method is generally accepted within the scientific community.
• For speech evidence to be accepted under the Daubert
Standard, the court must be convinced that the method is
reliable and relevant to the case at hand.
32.
• The DaubertStandard is another rule used in U.S. courts to determine the
admissibility of scientific evidence, and it’s more rigorous than the Frye
Standard. It considers additional factors to ensure the reliability and relevance
of the method being used. Let’s break down how it works with an example.
• 1. Testability:
• Under the Daubert Standard, the court requires that the scientific theory or
technique must be testable. This means that the method can be empirically
tested and verified through experiments.
• Example:
• In forensic speech identification, if a new voice-matching software is used, the
court would ask if this software has been tested. For instance, can the software
be shown to accurately match voices in controlled experiments where the true
identity of the speaker is known?
33.
2. Peer Reviewand Publication:
• The method must have been reviewed by other experts in the field and published in scientific
journals. Peer review helps ensure that the technique has been evaluated by others in the
community and is not based on unverified claims.
• Example:
• If the voice-matching software has been written about in scientific journals and other experts have
reviewed its effectiveness, this would strengthen its credibility in court. For example, articles
detailing the software’s strengths and weaknesses, as well as studies showing its accuracy, would
demonstrate that it has been scrutinized by the broader forensic community.
• 3. Known or Potential Error Rate:
• There must be information available about the error rate of the method, meaning how often it might
give incorrect results. This is important because courts need to know how reliable the evidence is.
• Example:
• The software might claim to identify a voice correctly 95% of the time, with a 5% error rate. The court
would consider whether this error rate is acceptable for the case. If the error rate is too high, it could
undermine the credibility of the voice evidence
34.
• Factors AffectingAdmissibility:
• Quality of the Recording: Poor-quality recordings can lead
to misidentification, making the evidence less likely to be
admitted.
• Authentication: It must be proven that the recording was
not tampered with and is a reliable representation of the
speaker.
• Chain of Custody: The recording must be handled and
stored securely to ensure it hasn’t been altered.
35.
Reporting in Court
•When forensic speech evidence is presented in court, it is usually accompanied by
expert testimony. The expert must explain the analysis process and justify their
conclusions.
• a. Expert Report:
• The expert prepares a detailed report that includes:
• Description of the audio sample.
• Methods used for identification (auditory, spectrographic, or both).
• Results of the analysis, including likelihood ratios if applicable.
• Limitations or uncertainties in the analysis.
• b. Court Testimony:
• The expert may be called to testify and explain technical concepts in a way that the jury
and judge can understand.
• They are also subjected to cross-examination, where the defense may challenge the
reliability of the methods or the expert’s conclusions.
36.
• c. ConveyingUncertainty:
• Forensic experts are expected to explain the degree of
certainty they have regarding their findings.
• Courts tend to value results with a high degree of statistical
support, especially when using objective methods like ASR.
37.
Introduction to AudioAnalysis
• Audio analysis in the forensic context refers to examining and evaluating audio recordings
for legal or investigative purposes. This could involve identifying speakers, enhancing
audio clarity, verifying the authenticity of a recording, or detecting any alterations. Given
the variability of audio quality and the challenges posed by environmental noise, different
techniques and technologies are used to ensure accurate results.
• a. Audio Formats
• The format in which audio is stored and analyzed plays a key role in forensic work. The
most common audio formats include:
• WAV (Waveform Audio File Format):
• An uncompressed audio format, WAV files retain high sound quality and are ideal for forensic
analysis because they store raw, high-resolution sound data without any loss.
• MP3 (MPEG-1 Audio Layer III):
• A compressed audio format, MP3 reduces file size by discarding some data (lossy compression).
While this is efficient for everyday use, it's not preferred in forensic work due to potential loss of
critical audio details.
38.
• FLAC (FreeLossless Audio Codec):
• A lossless compression format, FLAC maintains the quality of the
original recording, making it suitable for forensic analysis.
• AAC (Advanced Audio Coding):
• Another lossy format commonly used in smartphones and modern
devices. While better than MP3, it still loses some audio fidelity.
39.
1.WAV (Waveform AudioFile Format):
1. This format is uncompressed. It retains all the original data, meaning no information is
lost. For example, if the recording contains subtle background sounds or very quiet parts of
speech, a WAV file will keep all these details intact.
2. Forensic Example: In the investigation, you need to enhance the voice in the background
that is speaking softly. A WAV file will allow you to work with the full audio data and capture
even the faintest elements. This is why WAV files are ideal in forensic cases, where every
sound detail counts.
2.MP3 (MPEG-1 Audio Layer III):
1. MP3 is a compressed format. It reduces the file size by cutting out some of the audio data
(this is called "lossy compression"). While this makes the file smaller, it also loses some of
the audio details.
2. Forensic Example: If the same recording is in MP3 format, some of the background sounds
and quieter speech may be lost. When you try to enhance the soft voice, there might not be
enough detail in the audio to do this accurately because the compression has discarded
some of the data. This could lead to a less reliable analysis.
40.
• FLAC (FreeLossless Audio Codec):
• FLAC is a lossless compression format, meaning it compresses audio to reduce file size without losing
any quality. All the original audio data is retained, just like in a WAV file.
• Forensic Example: Imagine you’re analyzing a phone call recording where two people are having a
conversation. There’s a need to identify a subtle sound in the background, like the ticking of a clock,
which might provide evidence about the timing of the call. Since FLAC retains all the audio data, you’ll
be able to capture the ticking sound clearly during analysis, even after compression. This makes FLAC
suitable for forensic analysis where preserving every detail of the sound is essential.
• 2. AAC (Advanced Audio Coding):
• AAC is a lossy compression format, meaning some of the audio data is discarded to reduce the file
size. It provides better quality than MP3 at similar file sizes but still sacrifices some audio fidelity.
• Forensic Example: Now, suppose the same phone call was stored in AAC format, perhaps because the
recording was made on a smartphone. While AAC is better than MP3, it still discards some audio details
to save space. If the ticking clock in the background is very quiet, AAC may not retain this sound in as
much detail. During forensic analysis, when you try to enhance that faint ticking, you might find that
it’s either missing or too degraded to be useful, which could lead to losing a key piece of evidence.
41.
• b. Filtersin Audio Analysis
• Filters are used in forensic audio to improve clarity by reducing unwanted noise and
enhancing relevant parts of a recording. Types of filters include:
• Low-Pass Filters
• High-Pass Filters
• Band-Pass Filters
• 1. Low-Pass Filters:
• Purpose: A low-pass filter allows only low-frequency sounds (like human speech) to pass
through while removing high-frequency sounds (such as static or hissing).
• Example: In your recording, there is a constant hissing sound (high-frequency noise) that
makes it difficult to hear the person’s voice. Applying a low-pass filter will eliminate the
hissing, leaving you with clearer speech, which typically occurs in lower frequencies.
42.
• 2. High-PassFilters:
• Purpose: A high-pass filter allows only high-frequency sounds to pass through, removing
low-frequency noises such as hums or rumbles.
• Example: If the recording contains low-frequency noise, such as the deep rumbling sound
of trains passing in the station, a high-pass filter will help by removing this low-frequency
noise. This will make the speech (which is in the mid to high-frequency range) easier to hear
by eliminating distracting low-end sounds.
• 3. Band-Pass Filters:
• Purpose: A band-pass filter isolates a specific range of frequencies, often focusing on the
range where human speech falls (around 300–3400 Hz).
• Example: In the noisy train station, there might be background conversations, traffic
sounds, and other irrelevant noises. A band-pass filter can focus specifically on the
frequency range of the speaker’s voice, filtering out sounds that are either too low or too
high in frequency. This helps to isolate and enhance the speaker’s voice without
interference from other ambient noises.
43.
Audio Acquisition, Restoration,and Enhancement
• a. Audio Acquisition
• Audio acquisition refers to the process of capturing sound using
various recording devices. Ensuring high-quality recording from
the start is critical in forensic cases as poor audio quality may
obscure important details or render enhancement impossible.
• Recording Methods:
• Direct Recording: This involves using a microphone or recording device to
capture audio in real time. High-quality digital recorders are preferred for
forensic purposes.
• Telephony/Intercepted Communications: These include wiretaps, call
intercepts, and surveillance recordings. The quality of such recordings can
vary, and the audio may need significant enhancement.
44.
• b. AudioRestoration
• Restoration techniques are used to repair damaged or degraded audio recordings. Forensic
audio experts may deal with recordings that are incomplete, distorted, or contain
interruptions. Common restoration techniques include:
1.De-clicking: If the recording is from an old cassette, it might have clicks or pops due to tape
damage. De-clicking tools will remove these artifacts without affecting the rest of the audio.
2.De-humming: If there's a low-frequency hum caused by a faulty microphone or wiring, de-
humming software can identify and remove this hum, cleaning up the audio.
3.Noise Reduction: In a recording where background traffic noise interferes with speech, noise
reduction can be used to selectively reduce the intensity of the background sounds. The goal
is to preserve the clarity of the voices without losing key details.
• Example: Let’s say the recording contains the phrase, "The money is in the safe," but it’s
buried under a constant electrical hum and distant traffic. By applying de-
humming and noise reduction, the hum and traffic noise are significantly reduced, making
the speech more understandable.
45.
• c. AudioEnhancement
• Enhancement focuses on improving the intelligibility of speech in recordings. Techniques
often include:
1.Equalization (EQ): Using EQ, the frequencies of the speaker's voice can be boosted while
reducing frequencies associated with background noise. For example, boosting mid-
range frequencies (where speech resides) and lowering bass frequencies (often where
rumble and hum exist) can make the voice more prominent.
2.Speech Enhancement Algorithms: Special software might be used to further isolate
speech from background sounds. It can identify the speech patterns and amplify them,
while suppressing non-speech elements.
• Example: After restoration, if the speech in "The money is in the safe" still isn’t very clear
due to low vocal volume, an equalizer can adjust the balance between frequencies,
making the voice louder and more distinct. A speech enhancement algorithm can
further improve the audibility by focusing on the voice alone, filtering out any remaining
noise.
46.
Recording Devices andTypes of Microphones
1. Recording Devices
• Forensic audio analysis may involve recordings made on various devices,
each with distinct characteristics that can affect the analysis:
• Digital Recorders: Preferred in forensic settings due to their ability to
capture high-quality, uncompressed audio with minimal noise.
• Analog Recorders: Though largely outdated, they are still encountered in
certain older cases. Analog recordings are more susceptible to noise and
degradation over time.
• Smartphones and Consumer Devices: Increasingly, forensic experts
analyze recordings made on smartphones or consumer-grade devices.
While convenient, these devices often use lossy compression, which may
affect the quality of the recordings.
47.
2. Types ofMicrophones
• The type of microphone used in recording affects the quality of the captured audio. Common microphone types in forensic audio include:
1. Dynamic Microphones:
1. Durability: These microphones are tough and can handle loud noises, such as a crowd or outdoor events. They are less
sensitive to background noise.
2. Example: Imagine you are at a sports stadium. A dynamic microphone would be ideal for capturing the announcements
over the loudspeaker, as it can handle the high volume without distortion.
2. Condenser Microphones:
1. Sensitivity: These microphones pick up even the quietest sounds with high accuracy, making them great for capturing
subtle nuances in someone's voice. However, they also pick up more ambient noise.
2. Example: In a quiet interview room, a condenser microphone would capture every detail of the conversation, from soft-
spoken words to subtle shifts in tone.
3. Lavalier Microphones:
1. Small and Discreet: Lavalier microphones are tiny and can be clipped onto a person’s clothing. They are often used in
situations where it’s important to be hands-free, like during a presentation or an interview.
2. Example: In a covert operation, a detective might use a lavalier microphone hidden under their shirt to secretly record a
conversation during an undercover meeting.
4. Shotgun Microphones:
1. Directional: These microphones focus on picking up sound from one specific area while reducing noise from the sides
and back. They are ideal for environments with lots of noise.
2. Example: Imagine you're recording a wildlife documentary. A shotgun microphone can help focus on the sounds of a
distant animal, ignoring the wind or background forest noise.
48.
Audio Authentication andDetection of Alteration
• a. Audio Authentication
• Authentication is crucial in forensic audio to verify that the
recording is original, unaltered, and free from tampering.
Authentication techniques include:
1.Spectral Analysis:
1.What it is: This method involves examining the frequency patterns of the
audio to see if there are any irregularities. A tampered recording might
show frequency jumps or distortions where two different audio
segments have been spliced together.
2.Example: If someone edited a conversation by inserting a new sentence
in the middle, spectral analysis might reveal a sudden change in the
background noise or unnatural frequencies at the splice point.
49.
1.Waveform Analysis:
1. Whatit is: Here, the actual shape of the audio signal (waveform) is analyzed. Sudden
or unnatural breaks in the waveform could suggest manipulation, like cutting or
rearranging sections of the recording.
2. Example: In a recording of an interview, if someone removed a portion of the
conversation, waveform analysis might show an abrupt jump where the audio was
edited, without the smooth transitions found in natural speech.
2.Metadata Examination:
1. What it is: For digital recordings, metadata (like the date, time, and type of device
used) is embedded in the file. Experts check whether this metadata is consistent
throughout the recording, as any inconsistencies could indicate tampering.
2. Example: Imagine a recording supposedly made in one continuous session on a
specific device. If the metadata reveals that part of the recording was made on a
different date or with another device, it would suggest that someone tampered with
the file.
50.
• b. Detectionof Alteration
• Detecting tampering in audio recordings involves identifying signs
of splicing, cutting, or editing. Some of the techniques include:
1.Phase Analysis:
1.What it is: This technique checks the alignment of sound waves. Sound
waves have a phase, and when audio is edited, the phase alignment can
be disrupted, causing discontinuities that wouldn't naturally occur.
2.Example: Imagine an edited interview where a section of speech is
inserted or removed. The phase of the sound before and after the edit
might not align smoothly, indicating tampering. For example, if the audio
originally had a continuous flow of background noise, but an edited
section disrupts that flow, phase analysis can reveal this inconsistency.
51.
1.Background Consistency:
1. Whatit is: Forensic experts look at the background sounds in a recording to check for
unnatural transitions. Ambient sounds (like room noise, traffic, or wind) should be
consistent if the recording is unaltered. Sudden changes or gaps in the background noise
can indicate that parts of the recording have been spliced or edited.
2. Example: In a conversation recorded outdoors, you would expect to hear consistent wind
or street sounds. If there is a sudden absence of wind noise, followed by a change in the
tone of background noise, this could suggest that a section was removed or edited.
2.Quantization Noise Analysis:
1. What it is: In digital recordings, quantization noise (the slight noise introduced during the
conversion of analog signals to digital) should remain consistent. When a recording is
edited, the quantization noise pattern might change, revealing signs of manipulation.
2. Example: In a digitally recorded voice message, if someone cuts out a portion of the
audio, the noise pattern before and after the cut may not match. By analyzing this noise,
forensic experts can detect signs of editing even if the change is subtle.
52.
Transcription and ReportFormation
• a. Transcription
• Transcription involves converting the speech in the audio recording
into a written text document. This is crucial for use in court, where
written evidence is often required. A verbatim transcription aims to
capture exactly what was said without altering or summarizing content.
• b. Challenges in Transcription
• Low-Quality Recordings: Poor audio quality, overlapping voices, and
background noise can make transcription difficult and require the use
of enhancement techniques.
• Accents and Dialects: Accents, regional variations, or unfamiliar
speech patterns may complicate the transcription process.
53.
• c. ReportFormation
• A forensic audio report is an official document presented in
court that details the methods and findings of the analysis.
Key components of the report include:
• A summary of the recording.
• The techniques used for enhancement and authentication.
• A detailed explanation of any findings, such as the detection
of alterations or speaker identification.
• Any uncertainties or limitations associated with the analysis
54.
Audio Analysis Methods:Auditory, Spectrographic, and
Automatic
• a. Auditory Methods
• This approach relies on the expert’s auditory skills to analyze sound
characteristics such as pitch, tone, rhythm, accent, and pronunciation. Auditory
analysis is often subjective and requires a trained and experienced listener.
• b. Spectrographic Methods
• Spectrographic analysis creates visual representations of the audio signal,
allowing experts to analyze its frequency components over time. A
spectrogram displays time on the horizontal axis, frequency on the vertical
axis, and intensity of sound as varying shades of color or grayscale. Key
features analyzed in forensic spectrograms include:
• Formants: Concentrated frequencies that correspond to vowel sounds.
• Harmonics: Overtones that define the tonal quality of a voice.
55.
• c. AutomaticMethods
• Automatic Speaker Recognition (ASR) is a computer-
assisted process that uses algorithms to analyze and
compare speech samples. ASR systems extract features
from speech, such as pitch and spectral distribution, and
apply machine learning techniques to determine the
likelihood that two samples were spoken by the same
individual. Automatic methods are objective, consistent, and
increasingly used in modern forensic cases.
56.
Guidelines for Recordinga Speech
Sample
• When collecting voice samples for comparison or analysis,
the following guidelines ensure that the sample is of high
quality and representative of the speaker's usual voice:
• Consistent Environment: The recording should be made in
a quiet environment with minimal background noise.
• Similar Circumstances: If possible, match the conditions of
the recording with the original (e.g., speaking speed,
emotional state).
• Equipment: Use high-quality recording devices and avoid
compression formats that might degrade audio quality
57.
Ear Witness-Speaker Profiling
•a. Definition of Ear Witness-Speaker Profiling
• Ear witness-speaker profiling refers to the process by which an individual,
referred to as an “ear witness,” identifies or describes a suspect based on their
voice characteristics. Unlike eyewitnesses, who identify individuals by their
physical appearance, ear witnesses recall and describe the voice of a speaker
they heard during the commission of a crime or in a significant context.
• Characteristics Analyzed in Speaker Profiling
• When an ear witness provides a profile of a speaker, they focus on various
elements of the voice. These characteristics may include:
1.Pitch:
1. High, medium, or low vocal pitch can leave a strong auditory impression.
2. Witnesses might recall a deep or squeaky voice, which can be useful for narrowing
down a suspect pool.
58.
1.Tone and Timbre:
1.Theunique quality of sound that distinguishes one voice from another,
often referred to as the "color" of the voice. Describing whether a voice is
soft, raspy, smooth, harsh, or nasal can help to profile the speaker.
2.Speech Rhythm:
1.The pace and cadence of speech, such as fast, slow, or erratic talking
patterns. Certain individuals may have a stutter, hesitation, or specific
speech mannerisms.
3.Accent and Dialect:
1.Regional accents or specific dialects can provide vital clues to the speaker’s
geographical origin, linguistic background, or socio-economic status. For
example, a witness might recall a southern accent or an urban dialect.
59.
Pronunciation and Articulation:
1.Theway certain words are pronounced, particularly unusual
pronunciations or speech habits (such as slurring words or
omitting consonants), may help to narrow down the search.
Vocal Mannerisms or Idiosyncrasies:
2.Some speakers may have unique vocal traits like a lisp, vocal fry, or
habitual phrases ("you know," "like"). Such markers are memorable
and can help differentiate one speaker from another.
Emotional Tone:
3.If the speech was emotional (e.g., angry, anxious, excited), the
witness might remember the emotional state reflected in the
speaker’s voice.
60.
Challenges in EarWitness Profiling
1.Subjectivity: Voice identification is highly subjective, and different people
might perceive the same voice in different ways.
2.Memory Degradation: Over time, an ear witness’s ability to recall specific
voice details may deteriorate, which can reduce the reliability of their
testimony.
3.Environmental Noise: If the witness heard the voice in a noisy or echoing
environment, their ability to accurately recall the voice might be compromised.
4.Voice Variability: Human voices can change due to factors like mood, health,
stress, or age, making accurate profiling difficult.
5.Imitation: A suspect might deliberately alter their voice during the
commission of a crime, making it harder for the ear witness to provide an
accurate profile.
61.
Forensic Use ofEar Witness Profiles
• Ear witness profiles can help investigators narrow down a suspect list
by matching the witness’s description with voice samples from
suspects.In some cases, voice experts can use the ear witness
descriptions to perform voice comparisons or speaker identification
tests, although these methods are typically considered supplementary
to more objective measures like spectrographic analysis.
62.
Speaker Line-up
• a.Definition of Speaker Line-up
• A speaker line-up, also known as a voice parade, is a method in which an ear
witness is presented with voice samples from several individuals, one of whom
is the suspect. The goal is for the witness to identify the voice they heard during
the crime. It is analogous to a visual line-up, where a witness is asked to
identify a suspect based on appearance.
• b. Procedure for Speaker Line-up
1.Collection of Voice Samples:
1. Investigators collect voice samples from multiple individuals, including the
suspect and several "fillers" (people who are not suspects but have similar
vocal characteristics).
63.
2. Standardized Script:
1.To maintain fairness and objectivity, each individual in the line-up is asked to read the
same script or say the same phrase. This ensures that differences in content don’t
influence the witness's identification.
3. Presentation of Samples:
2. The voice samples are played for the ear witness in a controlled environment, either
live or using recorded samples. The order in which the voices are presented is
randomized.
4. Witness Identification:
3. The witness listens to each sample and is asked to identify which, if any, matches the
voice they heard during the event in question.
5. Documentation:
4. The entire procedure is carefully documented, noting how the line-up was conducted,
the time it took, and any comments made by the witness.
64.
Ear Witness-Speaker Profilingand Speaker Line-up in
Court
• Admissibility of Ear Witness Testimony
• Subjectivity: Ear witness testimony can be subjective and is often viewed with caution
by courts. The reliability of the testimony can be affected by how well the witness
recalls the voice, the conditions under which they heard it, and the time elapsed since
the event.
• Supporting Evidence: Ear witness testimony is generally used in conjunction with
other forms of evidence, such as speaker identification through automatic or
spectrographic methods, to strengthen its validity.
• b. Admissibility of Speaker Line-ups
• Fairness: The line-up process must be fair and objective. Any suggestion of bias or
improper administration may lead to the exclusion of the evidence.
• Expert Analysis: If a forensic expert’s analysis accompanies the speaker line-up
results, this can strengthen the case for admissibility, provided the methods used are
scientifically valid and accepted by the court.
65.
• Legal Challenges
•Cross-Examination: Ear witnesses and line-up procedures
are often subject to intense scrutiny during cross-
examination, especially regarding the witness’s memory and
the conditions under which the voice was heard.
• Potential for Misidentification: Given the limitations of
human memory and the potential for voice variability,
defense attorneys may challenge the reliability of speaker
line-up identifications, particularly if there are
inconsistencies in the witness's recall.
66.
Introduction to VideoAnalysis and Digital
Video/Imaging Processing (DVIP)
• Video analysis is a crucial part of digital forensics and
involves reviewing, processing, and analyzing video data to
extract useful information that could be relevant in a legal
investigation. Digital Video/Imaging Processing (DVIP) refers
to techniques used for enhancing, compressing, and
analyzing video and images using software tools.
67.
Basic Elements ofVideo and Image
1.Pixel:
The smallest unit of a digital image or video. It is a single point in a graphic
image and contains information about its color and intensity.
2.Resolution:
Refers to the number of pixels in an image or video. Higher resolution means
more detail (e.g., 1920x1080 pixels for Full HD video).
3.Sampling Rate:
In video and image analysis, it refers to the rate at which video frames or image
samples are captured. In digital imaging, it’s crucial for determining image
quality.
4.Bit Depth:
Refers to the amount of information stored for each pixel, typically represented
in bits. Higher bit depth allows for more color precision (e.g., 8-bit, 16-bit).
68.
5. Color:
Digital imagesor video use color models such as RGB (Red,
Green, Blue) or YUV. Each pixel has specific values that define
its color in these models.
6. Frame Rate:
The number of frames displayed per second in a video.
Common frame rates are 24 fps (film), 30 fps (TV), and 60 fps
(high-definition).
7. Size:
The file size of the video or image, determined by the
resolution, bit depth, color information, and compression
method used.
69.
Video Recording Formats– Analog &
Digital
1.Analog Video Formats:
1.Older formats where video is recorded as continuous signals.
2.Examples: VHS, Betamax.
3.Analog signals degrade over time and with multiple copies.
2.Digital Video Formats:
1.Digital formats store video as binary data.
2.Examples: MP4, AVI, MOV.
3.Digital formats allow for easier editing, transmission, and storage
without quality loss.
70.
Video Compression &Artefacts of Compression
1.Video Compression:
Reduces the file size of video by removing redundant
information. Compression can be:
1.Lossless: No loss of data; the original video can be reconstructed.
2.Lossy: Some data is lost, often resulting in lower quality (e.g., MP4,
MPEG).
2.Artifacts of Compression:
Distortions or visual flaws introduced during compression,
especially in lossy compression. Examples include:
1.Blocking: Squares appearing in the image.
2.Blurring: Loss of fine detail.
71.
Graphic File Formats
1.LosslessImage Compression:
Retains all the original image data. Examples:
1.PNG: No quality loss, ideal for images with transparency.
2.TIFF: Used in high-quality image editing.
2.Lossy Image Compression:
Some image data is discarded for smaller file sizes.
Examples:
1.JPEG: Commonly used, balances size and quality.
72.
Video & ImageAnalysis
• Evidence Handling Procedures:
Proper procedures must be followed to preserve the integrity of digital evidence:
• Chain of custody: Ensures that evidence is not tampered with.
• Forensic imaging: Creating exact copies of the original evidence.
• Recovery:
Techniques to retrieve deleted or damaged video/image files, often using specialized forensic tools.
• Facial Image Recognition:
Involves identifying or verifying individuals from images or video using automated facial
recognition algorithms. It’s widely used in security and law enforcement.
• Digital Watermarking:
A method of embedding hidden information into images or video to verify authenticity or
ownership without altering the file’s visible content.
73.
Software Used inVideo and Image
Analysis
• Video:
Tools like Adobe Premiere, Avidemux, FFmpeg are used for
video editing and analysis.
• Image:
Tools like Adobe Photoshop, GIMP, and forensic-specific
tools like Amped FIVE (Forensic Image and Video
Enhancement) are commonly used.
74.
Admissibility of Videoand Image Evidence in Court
1.Authentication:
Evidence must be proven to be what it claims to be. This
includes verifying the integrity and chain of custody of the
video or image.
2.Originality:
Courts generally prefer the original file, but if unavailable,
forensic copies with proper validation may be used.
3.Expert Testimony:
Experts may be required to testify about how the evidence
was handled and processed, explaining any enhancements
or modifications.
75.
Network Configuration &Its Forms
• Network Configuration refers to the process of setting up
network settings, controls, and parameters to enable
devices to communicate over a network. It includes
configuring hardware (routers, switches), IP addresses,
firewalls, and network policies.
1.Forms of Network Configuration:
1.Static Configuration: IP addresses and settings are manually
assigned to devices. Suitable for small networks where changes
are infrequent.
2.Dynamic Configuration (DHCP): IP addresses and configurations
are assigned dynamically via the Dynamic Host Configuration
Protocol (DHCP). Best for large or changing networks.
76.
3. Peer-to-Peer (P2P)Configuration: Devices communicate directly
with each other without a central server.
4. Client-Server Configuration: A central server manages client devices,
assigning resources and managing security.
5.VPN Configuration: Securely connects devices over the internet by
encrypting traffic through a Virtual Private Network (VPN).
77.
Basics of Applicationand Cloud
Security
1.Application Security:
1.Refers to measures taken to protect applications from threats and
vulnerabilities.
2.Common practices include:
1.Code review: Ensuring secure coding practices.
2.Authentication & Authorization: Ensuring only authorized users can access
the application.
3.Encryption: Securing sensitive data both at rest and in transit.
4.Patch Management: Regularly updating software to fix vulnerabilities.
78.
2. Cloud Security:
1.Focuseson protecting data, applications, and services hosted in
cloud environments.
2.Key aspects:
1.Identity and Access Management (IAM): Controlling who can access cloud
resources.
2.Data Encryption: Encrypting data stored in the cloud and during
transmission.
3.Security Monitoring: Continuously monitoring for threats and potential
security breaches.
4.Shared Responsibility Model: In cloud services, both the cloud provider and
the user share security responsibilities. For example, the provider secures
the infrastructure, and the user is responsible for securing their data.
79.
Dark Web &Deep Web Networks
1.Deep Web:
1.Refers to parts of the internet not indexed by standard search
engines. It includes everything from private databases to
password-protected websites.
2.Legal and widely used for legitimate purposes (e.g., private
databases, academic research).
2.Dark Web:
1.A subset of the deep web that requires specific software (like Tor)
to access.
2.Often associated with illegal activities (e.g., illicit marketplaces,
cybercriminal forums), though it also has legal uses like privacy
protection.
80.
Malware & VulnerabilityAttacks – Analysis and
Persistence for Incident Handlers
1.Malware:
1.Malicious software designed to harm or exploit systems. Types include:
1.Viruses: Attach to legitimate programs and spread.
2.Worms: Self-replicating malware that spreads across networks.
3.Ransomware: Locks or encrypts data and demands payment to restore access.
4.Spyware: Secretly collects user data.
2.Vulnerability Attacks:
1.Exploiting weaknesses in software, hardware, or configurations.
2.Common types of vulnerabilities:
1.Zero-day exploits: Attacks exploiting undiscovered vulnerabilities.
2.Buffer Overflow: Attackers overload a program’s buffer to execute malicious
code.
81.
3. Persistence forIncident Handlers:
1.Incident Handlers ensure attackers can’t re-enter compromised
systems.
2.Persistence Mechanisms: Attackers often leave "backdoors" or
other forms of persistence to regain access later.
3.Strategies for incident handlers:
1.Monitoring for unauthorized system changes.
2.Implementing strong logging and alerting systems.
3.Performing regular system scans to identify malware.
82.
Email: Types ofEmail and Protocols
1.Types of Email:
1.Client-Based Email: Managed via installed email clients (e.g.,
Outlook, Thunderbird).
2.Web-Based Email: Accessed through web browsers (e.g., Gmail,
Yahoo Mail).
2.Email Protocols:
1.SMTP (Simple Mail Transfer Protocol): Used for sending emails.
2.IMAP (Internet Message Access Protocol): Used for retrieving
emails and keeping them synchronized across devices.
3.POP3 (Post Office Protocol 3): Retrieves emails from a server,
often removing them after download.
83.
Analysing the HeaderDetails and Tracking the Email
1.Email Header: Contains metadata about the email’s origin, path,
and destination. Important fields include:
1.From: Sender’s email address.
2.To: Recipient’s email address.
3.Date: When the email was sent.
4.Received: Shows the path the email took across servers.
5.Message-ID: Unique identifier for the email.
6.X-Originating-IP: May show the sender’s IP address.
2.Tracking Email:
1.Tracking IP: The header can be used to trace the originating IP address.
2.Received Field: Shows the route the email took across mail servers.
84.
Spoofed Emails &Email Investigation Process
• Spoofed Emails:
• Fake emails made to appear as if they are from legitimate sources.
• Identified by inconsistencies in the email header, especially
the Received and Return-Path fields.
• Email Investigation Process:
• Header Analysis: Investigating the metadata to understand the origin of the email.
• Email Content Review: Reviewing the email body for malicious links or attachments.
• IP Tracing: Tracing the sender's IP via the Received field in the header.
85.
Email Authentication andIP Tracing
1.Email Authentication Mechanisms:
1.SPF (Sender Policy Framework): Validates the sender's IP
address.
2.DKIM (DomainKeys Identified Mail): Verifies that the email hasn’t
been altered.
3.DMARC (Domain-based Message Authentication, Reporting &
Conformance): Combines SPF and DKIM to prevent spoofing.
2.IP Tracing:
1.By analyzing the Received header field, it’s possible to trace the
email’s path back to the originating IP address, helping
investigators identify the email's true sender.
86.
Email Header Analysis:Client-Based vs Web-Based Email
1.Client-Based Email:
1. Headers often include details about the email client and the user's system.
2. Often more detailed than web-based email.
2.Web-Based Email:
1. Header details may include more information about the web interface and hosting
servers, but less about the user's local system.
• Artefact Analysis
• Involves analyzing remnants of email data, attachments, or metadata left on
a system after emails have been deleted. Email artefacts are often stored in:
• Temporary files.
• Logs.
• Application cache.
87.
Investigation and LegalIssues
1.Admissibility of Email Evidence:
1.Email evidence must be handled properly, preserving the original
content and headers for it to be admissible in court.
2.Chain of custody must be maintained.
2.Privacy Concerns:
1.Investigators must balance gathering evidence with respecting
privacy laws, such as avoiding unauthorized access to personal
email accounts.
88.
Basic Concepts ofCloud Data Analysis and Authentication
1.Cloud Data Analysis:
1.Analyzing logs, metadata, and stored files within cloud systems to
investigate incidents.
2.Forensic techniques in the cloud include identifying data access,
modification logs, and unauthorized activities.
2.Cloud Authentication:
1.Methods of authenticating users in cloud environments, including:
1.Multi-Factor Authentication (MFA): Adds a second layer of security (e.g., one-time
passwords, biometric verification).
2.Single Sign-On (SSO): Allows users to authenticate once and access multiple
services without re-entering credentials.
3.Federated Identity Management: Users' identities are managed across multiple
cloud services, allowing seamless authentication.