CH 02 I C
CH 02 I C
Objectives
Explain how to prepare a computer investigation Apply a systematic approach to an investigation Describe procedures for corporate high-tech investigations Explain requirements for data recovery workstations and software Describe how to conduct an investigation Explain how to complete and critique a case
Law enforcement officers should follow proper procedure when acquiring the evidence
Digital evidence can be easily altered by an overeager investigator
Multi-evidence form
iClicker Questions
B. Antistatic bag
C. Approved Secure Container D. Evidence tape E. Evidence tape with initials written on it
B. Antistatic bag
C. Approved Secure Container D. Evidence tape E. Evidence tape with initials written on it
Which of these is the best way to ensure that nothing has been added or removed from a floppy drive?
A. Forensic image
B. Antistatic bag
C. Approved Secure Container D. Evidence tape E. Evidence tape with initials written on it
Many attorneys like to have printouts of the data you have recovered
You need to persuade and educate many attorneys on how digital evidence can be viewed electronically
You can also encounter problems if you find data in the form of binary files
For binary data files such as CAD drawings, locate the correct software product For unallocated data recovery, use a tool that removes or replaces nonprintable data
Other guidelines
Minimize written communications with the attorney Any documentation written to the attorney must contain a header stating that its Privileged Legal CommunicationConfidential Work Product
Always keep an open line of verbal communication If youre communicating via e-mail, use encryption
Identify media source that published the information Review company phone records Obtain a list of keywords related to the media leak Perform keyword searches on proxy and e-mail servers
Expand the discreet forensic disk acquisition and analysis Consolidate and review your findings periodically Routinely report findings to management
Planning considerations
Examine all e-mail of suspected employees Search Internet newsgroups or message boards Initiate physical surveillance Examine facility physical access logs for sensitive areas
Steps
Gather all personnel assigned to the investigation and brief them on the plan Gather resources to conduct the investigation
Interrogation
Trying to get a suspect to confess
iClicker Questions
Which type of investigation requires you to wait for a memo before starting the investigation?
A. Attorney-client privilege
B. Media leaks
C. Industrial espionage D. E-mail abuse E. Internet abuse
Which type of investigation would gain the most from proxy server logs?
A. Attorney-client privilege
B. Media leaks
C. Industrial espionage D. E-mail abuse E. Internet abuse
Which of these should you avoid using during attorney-client privilege investigations?
A. Written communications
B. Telephone calls
C. Bit-stream images D. Keywords E. Hash signatures
Write Blocker
Connects a hard drive in trusted read-only mode There are also Linux boot CDs that mount all drives read-only, such as Helix and some Knoppix distributions
Target drive to receive the source or suspect disk data Spare PATA or SATA ports USB ports
Conducting an Investigation
Conducting an Investigation
Gather resources identified in investigation plan Items needed
Original storage media Evidence custody form Evidence container for the storage media Bit-stream imaging tool Forensic workstation to copy and examine your evidence Securable evidence locker, cabinet, or safe
Bit-stream image
File containing the bit-stream copy of all data on a disk or partition Also known as forensic copy
Well skip the ProDiscover section of the textbook, which is on pages 48-58
Include report generated by your forensic tool to document your work Repeatable findings
Repeat the steps and produce the same result, using different tools
iClicker Questions
Which tool ensures that no one meddles with the evidence while it is waiting for a trial?
A. Write-blocker
B. Acquisition tool
C. Analysis tool D. Target drive E. Safe
Which tool ensures that the evidence is not changed during the creation of a bit-stream image?
A. Write-blocker
B. Acquisition tool
C. Analysis tool D. Target drive E. Safe