Guide To Computer Forensics Investigation
Guide To Computer Forensics Investigation
Guide To Computer Forensics Investigation
Objectives
Explain how to prepare a computer investigation Apply a systematic approach to an investigation Describe procedures for corporate high-tech investigations Explain requirements for data recovery workstations and software Describe how to conduct an investigation Explain how to complete and critique a case
Law enforcement officers should follow proper procedure when acquiring the evidence
Digital evidence can be easily altered by an overeager investigator
10
11
12
Multi-evidence form
13
14
15
16
17
18
19
21
22
Many attorneys like to have printouts of the data you have recovered
You need to persuade and educate many attorneys on how digital evidence can be viewed electronically
You can also encounter problems if you find data in the form of binary files
Guide to Computer Forensics and Investigations 23
26
Always keep an open line of verbal communication If youre communicating via e-mail, use encryption
27
28
Identify media source that published the information Review company phone records Obtain a list of keywords related to the media leak Perform keyword searches on proxy and e-mail servers
29
Expand the discreet forensic disk acquisition and analysis Consolidate and review your findings periodically Routinely report findings to management
Guide to Computer Forensics and Investigations 30
Staff needed
Computing investigator who is responsible for disk forensic examinations Technology specialist who is knowledgeable of the suspected compromised technical data Network specialist who can perform log analysis and set up network sniffers Threat assessment specialist (typically an attorney)
31
32
Interrogation
Trying to get a suspect to confess
35
Conducting an Investigation
Gather resources identified in investigation plan Items needed
Original storage media Evidence custody form Evidence container for the storage media Bit-stream imaging tool Forensic workstation to copy and examine your evidence Securable evidence locker, cabinet, or safe
40
41
Bit-stream image
File containing the bit-stream copy of all data on a disk or partition Also known as forensic copy
Guide to Computer Forensics and Investigations 42
43
Conduct your analysis only on a copy of the data Using ProDiscover Basic to acquire a thumb drive
Create a work folder for data storage
44
45
46
47
48
49
Deleted files linger on the disk until new data is saved on the same physical location Tool
ProDiscover Basic
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Summary
Always use a systematic approach to your investigations Always plan a case taking into account the nature of the case, case requirements, and gathering evidence techniques Both criminal cases and corporate-policy violations can go to court Plan for contingencies for any problems you might encounter Keep track of the chain of custody of your evidence
Guide to Computer Forensics and Investigations 64
Summary (continued)
Internet and media leak investigations require examining server log data For attorney-client privilege cases, all written communication should remain confidential A bit-stream copy is a bit-by-bit duplicate of the original disk Always maintain a journal to keep notes on exactly what you did You should always critique your own work
65