National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
National Response Centre For Cyber Crimes (NR3C) Federal Investigation Agency Headquarters Sector-G-9/4, Islamabad Ph. 051-9261686, Fax. 051-9261685
Supervised By:
Note:
Without having the necessary skills and training, no
responder should attempt to explore the contents or recover
data from a computer (e.g. Do not touch the keyboard or click
the mouse) or other electronic device other than to record
what is visible on its display.
Introduction 06
Grounds for obtaining search and arrest warrants 06
Powers to Search, Seizure and Arrest
06
Collection of Digital Evidence
09
Procedure for Search, Seizure and Arrest 11
Investigation summary form 12
Form for the Collection of Electronic Evidence 13
Form for Receiving thee Evidence 14
Check list for crime scene analysis 15
Introduction 18
Policy 18
Packaging Procedure 18
Transportation Procedure 19
Storage Procedure 19
It has been observed that criminals are using latest technology to execute
their plans. These criminals are involved in financial matters, information stealing, online
internet frauds, and email threats and at times even in terrorism. To effectively counter
such activities it was felt that there must be an organization in the country that should be
able to monitor, track and prosecute all such criminals. Keeping this in view National
Response Center for Cyber Crimes (NR3C) has been established under Federal
Investigation Agency to deal with such types of Crimes.
NR3C is providing single point of contact for all local and foreign
organizations on all matters related to cyber crimes. NR3C is imparting trainings and
related information system security education to persons of government/semi-
government and private sector organizations. An effort is being made to develop a
working liaison with international organizations especially against online internet frauds,
email threats, plastic money frauds and other financial crimes. NR3C is committed to
build local capabilities in incident handling and security intelligence. When this capability
is achieved it will be integrated internationally to monitor global security issues.
The Prevention of Electronic Crime Ordinance (PECO) 2007 has been enforced by
Government of Pakistan, under which Federal Investigation Agency (FIA) has been made
responsible to deal with all types of electronic offences through out the country. Before
this ordinance, Electronic Transaction Ordinance (ETO-2002) was being used by FIA to
deal with Cyber Crimes.
Objectives of NR3C
First responders should have the following items in their digital evidence collection
toolkit:
• Cameras (To photograph the crime scene).
• Cardboard boxes (all Computer necessary cables).
• Notepads.
• Gloves.
• Evidence inventory logs.
• Evidence tape.
• Evidence bags.
• Evidence stickers, labels, or tags.
• Crime scene tape.
• Antistatic bags (To protect the Evidence from magnetic field).
Preliminary Interviews:
First responders should separate and identify all suspect(s) at the crime scene as well
as to record their locations and did not access to any suspect(s) to computer(s) or
Electronic device(s). In the interview gather or collect the following information from
the suspect(s).
• Names of all users of the computer(s) and device(s).
• Computer(s) and Internet user information.
• Login names and user account names including Passwords.
• Detail about different applications in use.
• Type of Internet access.
• Any offsite storage.
• Detail of Internet service provider.
• Installed software documentation.
• Detail of e-mail accounts.
Introduction:
This guide will support the law Enforcement Officers of Pakistan to search seizure and
arrest Cyber Criminals/Cyber Terrorism as per Standard Operating Procedures (SOPs).
There must reasonable grounds for conducting search and obtaining search warrants
prior to raiding the crime scene. The following points describe the procedures which
Enquiry officer(s) or Investigation officer(s) must have to follow.
Search and Arrest powers are to be exercised as mentioned in Cr.P.C 1898, as narrated
below.
Search
The police can exercise their power of search under the section 165 of Cr.P.C. 1898,
where the reasonable grounds are available which cause the police to investigate any
matter which is falling in the jurisdiction.
Arrest
Under the section 46 of Cr.P.C. 1898, the police making arrest of person are made for
purpose preventing that person from committing offence or putting that person in
custody of police for the alleged committing of offences. The section 47 of Cr.P.C. says
that where the arrest is essential for the purpose of the making arrest of that person,
they can make search of the premises where the person supposed have take abode or
hiding himself.
After securing the scene, read all steps below before taking any action.
1. Record in notes all actions you take and any changes that you observe in the
monitor, computer, printer or other peripherals that result from your actions.
2. Observe the monitor and determine if it is on, off or in sleep mode. Then
decide which of the following situations applies and follow the steps for that
situation.
Situation 1:
Situation 2:
Monitor is on and screen is blank (sleep mode) or screen saver (picture) is visible.
1. Move the mouse slightly (without pushing buttons). The screen should
change and show work product or request a password.
2. If mouse movement does not cause a change in the screen, may be
monitor/system is off.
Monitor is off.
Regardless of the power state of the computer (on, off or sleep mode), remove the
power source cable from the computer (Not from the wall outlet). If dealing with a
laptop, in addition to removing the power cord, remove the battery pack. The battery is
removed to prevent any power to the system. Some laptops have a second
multipurpose battery. Check for this possibility and remove that battery as well. Check
for outside connectivity. If a telephone connection is present, attempt to identify the
telephone number. To avoid damage to potential evidence, remove any floppy disks
that are present, package the disk separately and label the package. If available, insert
either a seizure disk or a blank floppy disk. Do not remove CDs or touch the CD drive.
Place tape over all the drive slots and over the power connector. Record make, model
and serial numbers. Photograph and diagram the connections of the computer(s) and
the corresponding cables. Label all connectors and cable ends (including connections to
peripheral devices) to allow for exact re-assembly at a later time. Label unused
connection ports as “unused.” Identify laptop computer docking stations in an effort to
identify other storage media. Record or log evidence according to departmental
procedures. If transport is required, package the components as fragile cargo.
Note:
If Electronic Evidence is off then don’t turn it ‘on’ & if electronic
Evidence is ‘on’ then consult with Technical Expert for further process
& seize the evidence.
4. The First Responders must fill the following forms at the Crime Scene.
**********************
F-29
Investigation summary Form.
F-31
Formfor Receiving Evidence in
Forensic Lab.
Type of evidence to
be required by the
said organization
2 Physically examine the received electronic/digital media devices in order to identify the
. significant problems/damaged items.
4 Tagged all received items like CPU, hard disks, CDs, USBs, etc
.
1 Document all the items along-with serial #/model # and brands name
National Response Centre For Cyber Crimes (NR3C)
Federal Investigation Agency Headquarters
Sector-G-9/4, Islamabad
Ph. 051-9261686, Fax. 051-9261685
16
Packaging, Transportation & Storage of Electronic
Evidence:
Introduction:
Computers are fragile electronic instruments that are sensitive to temperature, humidity,
physical shock, static electricity and magnetic sources. Therefore, special precautions
should be taken when packaging & transporting electronic evidence.
The nature of electronic evidence is such that it poses special challenges for its admissibility
in court. To meet these challenges, this document will act as Standard Operating Procedures
(SOPs) to be followed for Packaging, Transportation & Storage of electronic evidence.
Policy:
Ensure that proper procedures are followed for packaging, transporting and storing
electronic evidence to avoid alteration, loss, physical damage or destruction of data.
Packaging Procedure:
All actions related to the identification, collection, packaging, transportation and storage of
digital evidence should be thoroughly documented. When packing digital evidence for
transportation, the first responder should:
Ensure that all digital evidence collected is properly documented, labeled, marked,
photographed, video recorded or sketched and inventoried before it is packaged. All
connections and connected devices should be labeled for easy reconfiguration of the system
later.
• Remember that digital evidence may also contain latent, trace or biological
evidence and take the appropriate steps to preserve it. Digital evidence imaging
should be done before latent, trace or biological evidence processes are conducted
on the evidence.
• Pack all digital evidence in antistatic packaging. Only paper bags and envelopes,
cardboard boxes and antistatic containers should be used for packaging digital
evidence. Plastic materials should not be used when collecting digital evidence
because plastic can produce or convey static electricity and allow humidity and
condensation to develop, which may damage or destroy the evidence.
• Ensure that all digital evidence is packaged in a manner that will prevent it from
being bent, scratched or otherwise deformed.
• Label all containers used to package and store digital evidence clearly and
properly.
• Leave cellular, mobile or smart phone(s) in the power state (on or off) in which
they were found.
• Package mobile or smart phone(s) in signal-blocking material such as faraday
isolation bags, radio frequency-shielding material or aluminum foil to prevent data
messages from being sent or received by the devices. (First responders should be
aware that if inappropriately packaged or removed from shielded packaging, the
device may be able to send and receive data messages if in range of a
communication signal.)
• Collect all power supplies and adapters for all electronic devices seized.
Transportation Procedure:
• Keep digital evidence away from magnetic fields such as those produced by radio
transmitters, speaker magnets and magnetic mount emergency lights. Other
potential hazards that the first responder should be aware of include seats heaters
and any device or material that can produce static electricity.
• Avoid storing electronic evidence in vehicles for prolonged periods of time. Heat,
cold or humidity can damage electronic evidence.
• Ensure that computers and electronic devices are packaged and secured during
transportation to prevent damage from shock and vibration.
• Document the transportation of the digital evidence and maintain the chain of
custody on all evidence transported.
Storage Procedure:
3. The store incharge and the concerned officer must fill, verify and sign
the Chain of Custody Sheet at the time of handing or taking of electronic evidence. If
the electronic evidence is to be transported outside the building then follow the SOP
for transportation of electronic evidence. Concerned officers must also fill and sign
the “handing and taking Evidence sheet/ Chain of Custody Form” that details the list
of equipments, their serial numbers, equipment’s physical condition, the case
reference number and the authority letter to collect or submit the electronic
evidence.
5. After the completion of forensic report, all original evidence, original forensic images
and its copies and case documentation in electronic form must be archived and
labeled with case reference numbers and to be stored in the separate hard disk or
CD-R/DVD-R for each case along with the cryptographic hash values to ensure the
integrity of the information. All these CD-R, DVD-R and hard disk must be labeled
with Case reference number and are to be submitted to Evidence Store once an
investigation ends. .
Introduction/Scope:
The Forensic examination, analysis and recovery of all volatile and non-volatile digital
evidence must be conducted in the computer Forensic Laboratory.
Evidence Examination Procedure:
General forensic principles apply when examining digital evidence. Different types of
cases and media may require different methods of examination.
Principle 1:
Persons conducting an examination of digital evidence should be trained for this
purpose.
Principle 2:
Ensure the integrity of received Electronic Evidence for examination using validity of
cryptographic signatures or hash values.
Principal 3:
Whenever possible, the examination should not be conducted on original evidence.
Always make a working copy for forensic examination and analysis.
Principal 4:
Document each and every step and action you perform and maintain the sequence of
events to use it for writing forensic report.
Use Certified Forensic Work Media and Hard Drives.
It is imperative that all work media and hard drives used in the examination process
must be sanitized and certified or verified as clean. This eliminates the possibility of data
corruption due to residual information from previous investigations be processed.
Analysis, research or any investigative work must never be performed on the actual
digital evidence or forensic image. When forensic images of digital evidence are made,
insist that a working copy be created and verified at the same time. Since disk drives
come in varying sizes, it may be difficult to find a disk drive to match the original
evidence drive. It is recommended that an image file be created on certified hard drives.
This approach insures that cryptographic hashes will match the original evidence drive.
The image can be mounted under Encase Forensic workstation and be processed as a
normal file system.
Note: If you are taking the image of evidence storage media or creating image copy of received,
always use software or hardware write blocking mechanism, so that the original evidence must not
get any change or alteration
5. ANALYSIS
Temporal Analysis.
This is the process of correlating known events with digital objects date and time
stamps. The result of this correlation is a timeline reflecting computer activity. Computer
object’s date and time stamps are constantly being updated by routine Operating
System activity. As the timeframe between the computer incident being investigated and
the beginning of the forensic investigation grows, the ability to create a comprehensive
activity record diminishes. Depending upon the crime or incident being investigated, the
detail of the timeline may be of less importance. Another important aspect of temporal
analysis is the proper synchronization of different time sources. Electronic components
usually require human intervention during the initial setup and configuration. This
manual initiation of the starting time is extremely inaccurate at reflecting the exact time.
In order to accurately synchronize all pieces of digital evidence, the investigator must
determine the difference in time between the digital evidence and the timeframe of the
base timeline. This difference is referred to as skewing or time skew. Another
consideration often overlooked is the difference in time associated for time zones. When
analyzing digital objects, all times must be normalized to central timeframe for
reference, all times should be normalized to coordinated universal time (UTC) and then
calculate Pakistan Standard Time (PST) with reference to it.
Relational Analysis.
This is the process of determining how digital objects are connected to the various
components of the investigation. The cohesion or strength of the connectivity between
objects is determined by the number of connections between the objects. The simple
process of associating value to common characteristics should illustrate that objects with
high values share more common characteristics. These high value objects represent
higher degrees of connectivity between the objects. This should illustrate the
relationship between the different objects or evidence. There are several methods for
documenting relational analysis; such as a matrix illustrating object class attributes or a
more graphical presentation such as a bubble diagram.
Functional Analysis:
This process documents how objects function and how illustrating or diagramming those
functions reveals similarities and context connections between each object. For example,
a phone modem has a particular function, establish a telephone connection to another
telephone modem via an analog signal. A phone modem must use a phone line and
telephone switch in order to complete the connection. If a suspect accesses a web site,
numerous functions are executed; internet connectivity is established, access to a
computer, knowledge of computer, knowledge of a computer program to access the web
site, knowledge of the web site. In this particular example, there are five distinct
functions. No one function can accomplish the task, but all five are needed. This example
could be broken down into additional functions such as, connecting to the internet,
logging in or on the computer and performing information searches. All of the activities
perform a particular function. These functions are related to each other in some form or
manner. All functions will affect change upon the system, some at a very minuscule level
while others provide a wealth of information. Functional analysis presents the shared or
common dependency of functions and objects. The stronger the bond or greater the
dependency between objects, the more objects are connected. For example, a phone
modem requires a phone line, telephone switch and another distant modem to function.
If a phone line does not exist, then there is no relationship between the modem on the
computer and the distant modem.
Evidence Analysis.
Forensic Expert may use all three of these analysis techniques to prove a position. The
Forensic expert must be completely objective in this analysis. Exculpatory evidence must
be given equal weight as incriminating evidence. All evidence must be validated and
crosschecked. The evidence must be tied to the suspect and not possess any
ambiguities. For example, just because a pornographic picture was found on the
computer does not necessarily mean the owner of the computer was the person
responsible for putting the image on the computer. Maybe the owner of the computer
was away on a business trip when the image appeared on his computer. As the Forensic
investigator, you would have to prove that the owner was able to access the computer
and place the image on the computer. Or you would have to present a provable scenario
by which the computer image could have gotten on the computer.
FORENSIC REPORT
The Forensic Expert is responsible for completely and accurately reporting his or her
findings and the results of the analysis of the digital evidence examination. Documentation
is an ongoing process throughout the examination. It is important to accurately record the
steps taken during the digital evidence examination
Examiner’s Note:
The following is a list of general considerations that the Forensic examiner must consider
throughout the documentation process.
• Take notes when consulting with the case investigator and/or prosecutor.
• Maintain a copy of the search authority with the case notes.
• Maintain the initial request for assistance with the case file.
• Maintain a copy of chain of custody documentation.
• Take notes detailed enough to allow complete duplication of actions.
• Include in the notes dates, times, and descriptions and results of actions taken.
• Document irregularities encountered and any actions taken regarding the
irregularities during the examination.
• Include additional information, such as network topology, list of authorized users,
user agreements, and/or passwords.
• Document changes made to the system or network by or at the direction of law
enforcement or the Forensic examiner.
• Document the operating system and relevant software version and current,
installed patches.
• Document information obtained at the scene regarding remote storage, remote
user access, and offsite backups.
• During the course of an examination, information of evidentiary value may be
found that is beyond the scope of the current legal authority. Document this
information and bring it to the attention of the Investigation officer because the
information may be needed to obtain additional search authorities.
***************************************
Components of Computer System.