CFC Week 6: The forensics process
Before the forensics
Why we said that computer information is a double-edged sword in forensic?
One the one hand, this information can provide compelling evidence in an investigation
One the other hand, it also introduce complexity that can trouble experienced practitioners
8. How does digital forensics differ in practice from conventional forensics?
-
Conventional forensics
Conventional forensics
is based onLocard's Exchange Principle
Locard’s Exchange Principle : Every contact leaves a trace. Physical contact leaves exchange of physical material.
Conventional forensics also called
wet forensics
: Human body sweats, fingers are greasy -> touch and walk leave fingerprints and footprints
Why we need to isolate the crime scene, and How?
To save a great number of logs which provide actions and interactions and avoid:
- Cover digital tracks
- and commit the perfect cybercrime
What are the paramount challenges of crime scene isolation?
More and more devices are hyper-connected
Why the crime scene need to be frozen, and How?
Services are connected to network or Internet, to define the crime scene, we have to freeze the scene and control the range.
freeze the memory RAM of a device,and also cut the network (Faraday cage to cancel wireless signal)
Define digital forensics process
A set of methods driven towards the acquisition of legal evidence, which is possible for presentation in a court of law.
i. Acquisition process
“Going there and getting the stuff”
- Judges have reasonable suspicion
- A
warrant
indicates what type of devices that a forensic can seize (which corresponding to suspicions due toprinciple of proportionality
- The place of a device is found is important to determine whether it’s relevant or not (like the one hidden in secret compartment of a drawer, even the type of mobile phone is not on the list)
- Careful documentation of the acquisition process:
- take photographs
- tag all the bags with all details
- watch out for hidden devices in plain sight
ii. Preservation
-
Provenance and change of custody are paramount (based on ACPO principles)
-
Making bit-for-bit images of all seized media
-
Use Write-blocker to make all drive devices read-only
-
Use cryptographic hashes to verify the integrity of the files (MD5 of SHA2)
-
In traditional forensics, you can destroy part of the evidence once you done with interventions like DNA testing
the sample used in testing could be destroyed after the test
However in computer forensics, 2,3 are required for the future
iii. Searching
aims to reduce the data volume to a manageable and reviewable level, but it has potential to impact the completeness and accuracy of an investigation
- Search Method
Keyword-searching
(not works on encoded or encrypted files, there are other tools)
Other tools for special files(compressed, encoded, encrypted or password protected files)
-
What if you find a evidence of another crime?
- Start an independent process with warrant
- Not allowed to collect evidence for that crime
iv. Analysis of evidence
aims explain what does the evidence signify?
- correlate evidence to your hypothesis
- explain their timeline
- identify what has happened
v. Evaluation of evidence
aims to confront the evidence
- Assess how strong that evidence is
- Challenge your own hypothesis using the evidence
- Be able to know how compelling evidence is
vi. Reporting
aims to inform how the forensic analysis has reached a conclusion
It should be done in a form and style that lets both:
Technical experts
validate their findingsLegal personnel and juries
can understand it
Put layman's terms
what the evidence means on executive summary would help
Characteristics of Legal Evidence (in UK)
Admissibility
Evidence has to be first-hand information, original and not hearsay.
Authenticity
Evidence should be genuine with clearly authentication to authenticate what it claims to be.
The correctness would be determined by court and judge later based on the evidence (we just try to use evidence to tell the hypothesis and evidence are correct)
Accuracy
Evidence should provide precise, clear and not vague information
Completeness
Evidence should be self-contained and not partial
Probative value
Evidence should be probative, if evidence’s danger outweight the value, the court can exclude it
- Danger of evidence
- introduce an unfair prejudice
- confuse the issues
- mislead the jury
- introduce undue delay or waste time, or just simply present cumulative evidence
List and describe the key steps of the investigative methodology
- Fundamental questions relating to a crime
- Sequencing (when things happend?)
- Linkage (who interacted with whom?)
- Evaluation of source (the origin of items)
- Attribution (who is responsible?)
What is the scientific method?
Scientific method is a cyclic process, aims to repeat the steps to get the conclusion
-
Gather information and make observations : aims to provide all evidence which you have access to
- Process legal evidence: 1. Acquire 2. Preserve 3. Search 4. Verify integrity 5. Authentication
- Process digital evidence: 1. preprocess 2. salvage deleted data 3. handle special files 4. filter out irrelevant data 5. extract embedded metadata
-
Form a hypothesis to explain observations : Develop possible explanations
-
Evaluate the hypothesis : Aims to suppress biases and hunches and try to disprove current working hypothesis through experiment
- Avoid
confirmation bias
: - do not skew our thinking and analysis in favour of the working hypothesis
- Avoid
-
Draw conclusions and communicate findings : Communicate the explanations which supported by evidence with decision makers
- Understand the capabilities of the tools
- Understand the capabilities of the tools
- Use multiple tools when possible
List the functions of forensic analysis
-
Attribution of activities : aims to attribute computer activities to a particular person
To avoid a person to deny the responsibilities for the illegal activities, we could use
- personal communication
- access to online banking or e-commerce accounts
-
Assessing alibis : use evidence from multiple sources
-
Determining intent : analyse:
- internet search history
- suspicious behaviours
- notes and plans
-
Evaluating sources : reveal the source of the evidence, and where it is produced or altered.
Compare the evidence with an exemplar can reveal useful information
-
Document authentication : - Look for nuances on date-time stamps
-
look for metadata within files
-
extract attributes buried within storage media
-
The e-discovery process
What is the e-discovery process
Exchange of data between parties in civil or criminal litigation
The process is largely controlled by attorneys who determine what data should be produced based on relevance, or withheld based on claims of privilege
Electronic Discovery Reference Model
-
- Preservation
Ensuring that ESI is protected against inappropriate alteration or destruction.
-
- Collection
Gathering ESI for further use in the e-discovery process (processing, review, etc).
-
- Processing
Reducing the volume of ESI and converting it, if necessary, to forms more suitable for review and analysis.
-
- Review
Evaluating ESI for relevance and privilege.
-
- Analysis
Evaluating ESI for content and context, including key patterns, topics, people and discussion.
-
- Production
Delivering ESI to others in appropriate forms and using appropriate delivery mechanisms.
-
- Presentation
Displaying ESI before audiences (at depositions, hearings, trials, etc), to elicit further information, validate existing facts or positions, or persuade an audience.