Digital Forensics
Digital Forensics
Digital Forensics
the usual aim is to provide answers to a series of simpler questions) often involving complex time-lines or
hypotheses.[4]
1 History
Prior to the 1980s crimes involving computers were dealt
with using existing laws. The rst computer crimes were
recognized in the 1978 Florida Computer Crimes Act,
which included legislation against the unauthorized modication or deletion of data on a computer system.[5][6]
Over the next few years the range of computer crimes
being committed increased, and laws were passed to
deal with issues of copyright, privacy/harassment (e.g.,
cyber bullying, cyber stalking, and online predators) and
child pornography.[7][8] It was not until the 1980s that
federal laws began to incorporate computer oences.
Canada was the rst country to pass legislation in 1983.[6]
This was followed by the US Federal Computer Fraud
and Abuse Act in 1986, Australian amendments to their
crimes acts in 1989 and the British Computer Abuse Act
in 1990.[6][8]
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing
the recovery and investigation of material found in digital devices, often in relation to computer crime.[1][2] The
term digital forensics was originally used as a synonym
for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.[1]
With roots in the personal computing revolution of the
late 1970s and early '80s, the discipline evolved in a hap- 1.1 1980s1990s: Growth of the eld
hazard manner during the 1990s, and it was not until the
early 21st century that national policies emerged.
The growth in computer crime during the 1980s and
Digital forensics investigations have a variety of applica- 1990s caused law enforcement agencies to begin estabtions. The most common is to support or refute a hy- lishing specialized groups, usually at the national level, to
pothesis before criminal or civil (as part of the electronic handle the technical aspects of investigations. For examdiscovery process) courts. Forensics may also feature in ple, in 1984 the FBI launched a Computer Analysis and
the private sector; such as during internal corporate in- Response Team and the following year a computer crime
vestigations or intrusion investigation (a specialist probe department was set up within the British Metropolitan Pointo the nature and extent of an unauthorized network in- lice fraud squad. As well as being law enforcement protrusion).
fessionals, many of the early members of these groups
responsible for
The technical aspect of an investigation is divided into were also computer hobbyists and became
[9][10]
the
elds
initial
research
and
direction.
several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics,
forensic data analysis and mobile device forensics. The
typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and
the production of a report into collected evidence.
One of the rst practical (or at least publicized) examples of digital forensics was Cli Stolls pursuit of hacker
Markus Hess in 1986. Stoll, whose investigation made
use of computer and network forensic techniques, was not
a specialized examiner.[11] Many of the earliest forensic
[12]
As well as identifying direct evidence of a crime, digi- examinations followed the same prole.
tal forensics can be used to attribute evidence to specic Throughout the 1990s there was high demand for these
suspects, conrm alibis or statements, determine intent, new, and basic, investigative resources. The strain on
identify sources (for example, in copyright cases), or au- central units lead to the creation of regional, and even
thenticate documents.[3] Investigations are much broader local, level groups to help handle the load. For examin scope than other areas of forensic analysis (where ple, the British National Hi-Tech Crime Unit was set up
1
HISTORY
devices.[20]
Focus has also shifted onto internet crime, particularly
the risk of cyber warfare and cyberterrorism. A February
2010 report by the United States Joint Forces Command
concluded:
1.2
3
forensics.[6] More recently, a trend towards live memory well as unallocated and slack space), recovering deleted
forensics has grown resulting in the availability of tools les and extraction of registry information (for example
such as WindowsSCOPE.
to list user accounts, or attached USB devices).
More recently the same progression of tool development
has occurred for mobile devices; initially investigators
accessed data directly on the device, but soon specialist
tools such as XRY or Radio Tactics Aceso appeared.[6]
Forensic process
3 Application
LEGAL CONSIDERATIONS
restrict how much information can be seized.[29] For example, in the United Kingdom seizure of evidence by law
enforcement is governed by the PACE act.[6] The International Organization on Computer Evidence (IOCE) is
one agency that works to establish compatible internaAttribution Meta data and other logs can be used to at- tional standards for the seizure of evidence.[30]
tribute actions to an individual. For example, per- In the UK the same laws covering computer crime can
sonal documents on a computer drive might identify also aect forensic investigators. The 1990 computer
its owner.
misuse act legislates against unauthorised access to comcover objective evidence of a criminal activity (termed
actus reus in legal parlance). However, the diverse range
of data held in digital devices can help with other areas
of inquiry.[3]
puter material; this is a particular concern for civil investigators who have more limitations than law enforcement.
An individuals right to privacy is one area of digital
forensics which is still largely undecided by courts. The
US Electronic Communications Privacy Act places limitations on the ability of law enforcement or civil investigators to intercept and access evidence. The act
makes a distinction between stored communication (e.g.
email archives) and transmitted communication (such as
VOIP). The latter, being considered more of a privacy invasion, is harder to obtain a warrant for.[6][16] The ECPA
also aects the ability of companies to investigate the
computers and communications of their employees, an
aspect that is still under debate as to the extent to which
a company can perform such monitoring.[6]
Article 5 of the European Convention on Human Rights
asserts similar privacy limitations to the ECPA and limits
the processing and sharing of personal data both within
the EU and with external countries. The ability of UK
law enforcement to conduct digital forensics investigations is legislated by the Regulation of Investigatory Powers Act.[6]
3.1
Digital evidence
Limitations
Legal considerations
Digital evidence can come in a number of forms
4.2
Investigative tools
8 RELATED JOURNALS
and Gorshkov to the United States for a fake job
interview. By monitoring network trac from the
pairs computers, the FBI identied passwords allowing them to collect evidence directly from Russian-based
computers.[6][39]
cell site logs, which track the devices within their range.
Such information was used to track down the kidnappers
of Thomas Onofri in 2006.[3]
7 See also
Cyberspace
5.3
Network forensics
8 Related journals
Journal of Digital Forensics, Security and Law
International Journal of Digital Crime and Forensics
Journal of Digital Investigation
International Journal of Digital Evidence
7
International Journal of Forensic Computer Science
Journal of Digital Forensic Practice
Small Scale Digital Device Forensic Journal
References
[16] K S Rosenblatt (1995). High-Technology Crime: Investigating Cases Involving Computers. KSK Publications.
ISBN 0-9648171-0-1. Retrieved 4 August 2010.
[17] Best practices for Computer Forensics (PDF). SWGDE.
Archived from the original (PDF) on 3 October 2010. Retrieved 4 August 2010.
[18] ISO/IEC 17025:2005. ISO. Retrieved 20 August 2010.
[19] SG Punja (2008). Mobile device analysis (PDF). Small
Scale Digital Device Forensics Journal.
[20] Rizwan Ahmed (2008). Mobile forensics: an overview,
tools, future trends and challenges from law enforcement
perspective (PDF). 6th International Conference on EGovernance.
[21] The Joint Operating Environment, Report released,
Feb. 18, 2010, pp. 3436
[22] Peterson, Gilbert & Shenoi, Sujeet (2009). Digital
Forensic Research: The Good, the Bad and the Unaddressed. Advances in Digital Forensics V. IFIP Advances
in Information and Communication Technology (Springer
Boston) 306: 1736. Bibcode:2009adf5.conf...17B.
doi:10.1007/978-3-642-04155-6_2. ISBN 978-3-64204154-9.
[23] Adams, Richard (2013). "'The Advanced Data Acquisition Model (ADAM): A process model for digital forensic
practice (PDF). Murdoch University.
[24] "'Electronic Crime Scene Investigation Guide: A Guide
for First Responders (PDF). National Institute of Justice.
2001.
[9] Mohay, George M. (2003). Computer and intrusion forensics. Artechhouse. p. 395. ISBN 1-58053-369-8.
[26] Adams, Richard (2013). "'The emergence of cloud storage and the need for a new digital forensic process model
(PDF). Murdoch University.
[10] Peter Sommer (January 2004). The future for the policing of cybercrime. Computer Fraud & Security 2004
(1): 812. doi:10.1016/S1361-3723(04)00017-X. ISSN
1361-3723.
[11] Simson L. Garnkel (August 2010). Digital forensics research: The next 10 years. Digital Investigation 7: S64
S73. doi:10.1016/j.diin.2010.05.009. ISSN 1742-2876.
[28] Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p.
392. ISBN 0-201-70719-5.
[29] Sarah Mocas (February 2004). Building theoretical underpinnings for digital forensics research. Digital Investigation 1 (1): 6168. doi:10.1016/j.diin.2003.12.004.
ISSN 1742-2876.
[13] GL Palmer, I Scientist, H View (2002). Forensic analysis in the digital world. International Journal of Digital
Evidence. Retrieved 2 August 2010.
[14] Wilding, E. (1997). Computer Evidence: a Forensic Investigations Handbook. London: Sweet & Maxwell. p. 236.
ISBN 0-421-57990-0.
[15] Collier, P.A. and Spaul, B.J. (1992). A forensic methodology for countering computer crime. Computers and
Law (Intellect Books).
10 FURTHER READING
10
Further reading
11
11.1
11.2
Images
11.3
Content license