Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Computer Forensics.
Chapter 13: Advanced Security and Beyond Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 13: Advanced Security and Beyond
COEN 252 Computer Forensics
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
August 19, 2014 watch me!.  Describe the steps to take when processing a crime scene  Describe how to package evidence  Explain the importance of preserving.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 corrected –Everyone failed this assignment! –Read the questions! Provide answers to THIS case not generic.
Chapter 14: Computer and Network Forensics
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Digital Crime Scene Investigative Process
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Guide to Computer Forensics and Investigations Fourth Edition
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 4 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
Thomas Schwarz, S.J. SCU Comp. Eng COEN 252 Collection of Evidence.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
PhD Oral Exam Presentation
Criminal Evidence Chapter 3
Chapter 3 First Response.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Steps to Solving a Crime
Steps to Solving a Crime
Guide to Computer Forensics and Investigations Third Edition
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Thursday April 19, 2018 (Discussion – Storing and Retrieving Data, Processing the Electronic Crime Scene)
2-1 the Crime Scene Forensics.
Presentation transcript:

Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition

Guide to Computer Forensics and Investigations2 Explain guidelines for seizing digital evidence at the scene Describe how to secure a computer incident or crime scene Describe how to preserve the evidence and establish the chain of custody Enumerate some general guidelines to process crime and incident scene Objectives

Guide to Computer Forensics and Investigations3 Introduction A principle in criminal investigation called Locard’s Exchange Principle –Anyone or anything entering a crime scene takes something of the scene with them and leaves something of themselves behind Victim Crime Scene Suspect Evidence

Source: evidence 4 Don’t let amateurs collect digital evidence Introduction (Cont.) General Rule: Harm Nothing!

Guide to Computer Forensics and Investigations5 Introduction (Cont.) Digital Evidence – Digital data that establish that a crime has been committed, can provide a link between a crime and its victim, or can provide a link between a crime and the perpetrator (Carrier & Spafford, 2003) – Can be any information stored or transmitted in digital form

Guide to Computer Forensics and Investigations6 Introduction (Cont.) Digital Evidence (Cont.) –All investigations must follow the following rules of evidence: Digital evidence integrity must be preserved to be admissible in court. –If the evidence is contaminated it cannot be de- contaminated Digital evidence must be reliable: Authenticity evidence, clear easy to understand, and believable by a jury Digital evidence must be complete : Exculpatory evidence for alternative suspects

Guide to Computer Forensics and Investigations7 Introduction (Cont.) Digital Crime Scene – The electronic environment where digital evidence can potentially exist (Rogers, 2005) – Collecting computers and processing a criminal or incident scene must be done systematically Computer Forensics Crime Scene Investigation Process – No one right way to do it!

Guide to Computer Forensics and Investigations8 Introduction (Cont.) Responding to a computer forensics incident or crime –Generally involves the following steps: 1.Seizing Digital Evidence at the Scene 2.Securing a computer incident or crime scene 3.Preserving the data 4.Establishing the chain of custody 5.Examining data for evidence

Guide to Computer Forensics and Investigations9 Introduction (Cont.) Responding to a computer forensics incident or crime –Generally involves the following steps: 1.Seizing Digital Evidence at the Scene 2.Securing a computer incident or crime scene 3.Preserving the data 4.Establishing the chain of custody 5.Examining data for evidence

Guide to Computer Forensics and Investigations10 Seizing Digital Evidence at the Scene Preparing to Acquire Digital Evidence –The evidence you acquire at the scene depends on the nature of the case (Crime or Violation) – Ask your supervisor or senior forensics examiner in your organization the following questions: Do you need to take the entire computer and all peripherals and media in the immediate area? How are you going to protect the computer and media while transporting them to your lab? Is the computer powered on when you arrive? Is it possible the suspect damaged or destroyed the computer, peripherals, or media?

Guide to Computer Forensics and Investigations11 Seizing Digital Evidence at the Scene (Cont.) Using a Technical Advisor –Can help you list the tools you need to process the incident or crime scene and guide you about where to locate data (extract log records or other evidence from large RAID servers) – Responsibilities Know aspects of the seized system Direct investigator handling sensitive material Help secure the scene Document activities

Guide to Computer Forensics and Investigations12 Why securing a computer incident or crime scene? –Protecting the crime scene is crucial because if evidence is contaminated, it cannot be decontaminated. –The main goals of securing the crime scene are the following: Preserve the evidence (No damage during collection, transportation, or storage) Keep information confidential –Depending on the situation, crime scene preservation will vary. –Professional curiosity can destroy evidence Involves police officers and other professionals who aren’t part of the crime scene processing team Seizing Digital Evidence at the Scene (Cont.)

Guide to Computer Forensics and Investigations13 Securing a Computer Incident or Crime Scene (Cont.) How securing a computer incident or crime scene? –Define a secure perimeter Use yellow barrier tape

Guide to Computer Forensics and Investigations14 Securing a Computer Incident or Crime Scene (Cont.) How securing a computer incident or crime scene? (Cont.) –Physical surroundings of the computer should be photographed and clearly documented Photographs should be taken before anything is touched

Guide to Computer Forensics and Investigations15 Securing a Computer Incident or Crime Scene (Cont.) How securing a computer incident or crime scene? (Cont.) –Physical surroundings of the computer should be photographed and clearly documented Photograph and label all equipment Cables connected to the computer should be labeled to document the computer’s hardware components and how they are connected

Guide to Computer Forensics and Investigations16 Securing a Computer Incident or Crime Scene (Cont.) How securing a computer incident or crime scene? (Cont.) –Take custody of computer, peripherals, and media. –Bag and tag all evidence Assign one person to collect and log all evidence Record the current date and time, serial numbers or unique features, make and model, and the name of the person who collected it Maintain two separate logs of collected evidence –Use antistatic bags

Guide to Computer Forensics and Investigations17 Preserving the Data Capture volatile data –Computer forensics team first captures any volatile data that would be lost when computer is turned off and moves data to a secure location Contents of RAM Current running processes Current network connections (recent connections and open applications/sockets) Logon sessions Open files: File system time and date stamps

Guide to Computer Forensics and Investigations18 Preserving the Data (Cont.) Acquire image –Reboot will change disk images. Do not reboot! –After retrieving volatile data, focus on the hard drive –Make forensic backup = system image = bit-stream backup Copy every bit of the file system, not just the disk files! Its accuracy meets evidence standards –Example tools include: Prodiscover EnCase FTK –OS does not influence which tools to use for bit-image capture

Guide to Computer Forensics and Investigations19 Preserving the Data (Cont.) Acquire image (Cont.) –Copy all image files to a large drive –Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash

Guide to Computer Forensics and Investigations20 Establishing the Chain of Custody As soon as the team begins its work, must start and maintain a strict chain of custody Chain of custody protects the integrity and reliability of the evidence –It documents that evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence –Effective process of documenting the complete journey of the evidence during the life of the case Who collected it? How & where? Who took possession of it? How was it stored & protected in storage?

Guide to Computer Forensics and Investigations21 Establishing the Chain of Custody (Cont.) Create or use an evidence custody form An evidence custody form serves the following functions: –Identifies the evidence –Identifies who has handled the evidence –Lists dates and times the evidence was handled

Guide to Computer Forensics and Investigations22 General Guidelines Keep a journal to document your activities Record all active windows or shell sessions Make notes of everything you do when copying data from a live suspect computer Close applications and shut down the computer

Guide to Computer Forensics and Investigations23 General Guidelines (Cont.) Useful information to collect –Seize all hardware that is necessary to reconstruct evidence (Hardrive disk, USB, CDs, DVDs, floppies, papers) Better to collect too much than too little –IDS, Firewall, and System logs –Suspect’s web pages, s, internet activities –Suspect’s access of files (created/modified/viewed) –Authenticate the copy so that you can prove that evidence discovered was on the original media. –Always work from a copy, not from the original.

Guide to Computer Forensics and Investigations24 General Guidelines (Cont.) Useful information to collect (Cont.) –Use a write-blocking device to prevent accidentally writing to the suspect media. –Use write blockers devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents. They do this by allowing read commands to pass but by blocking write commands. Can be hardware or software –With the write blocker in place, you can now make several copies of the image. –It is a good idea to make at least 2 working images – one to be used as a backup and one to work on.