Digital Forensics Lecture Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Flashcards about Digital Forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Nigel's work experience at Royal Bank of Scotland (1988 – 2000)

Branch staff, credit/debit cards, Cash/Bullion processing centre, Horwich Service Centre

2
New cards

Nigel's work experience at Lancashire Constabulary (2000 – Present)

Finance Assistant, IT Liaison Officer, Computer Technician, Digital Forensic Technician, Digital Media Investigation Unit, Digital Forensic Investigator/Examiner

3
New cards

What is Digital Forensics?

The process by which information is extracted from data storage media, rendered into a useable form, processed and interpreted for the purpose of obtaining intelligence for use in investigations, or evidence for use in criminal proceedings

4
New cards

Overview of Digital Forensics

Digital Forensics can be used to gather evidence in many criminal investigations

5
New cards

Agencies Powers to Access Communications

Legislations on agencies powers to access communications continues to be debated

6
New cards

The forensic science regulator (ISO 17025)

Requires all digital forensics practitioners undertaking criminal justice work was to be accredited by 2017, but accepts this will be challenging

7
New cards

Encryption and cloud storage

Encryption and cloud storage can inhibit digital forensics investigations but offer security and flexibility to its users.

8
New cards

Rapid development and adoption of technology

Rapid development and adoption of technology is increasing demand for digital forensics services. Methods such a triaging are being used to address this demand.

9
New cards

POLICE AND CRIMINAL EVIDENCE ACT 1984 (PACE)

Sets out to strike the right balance between the powers of the police and the rights and freedoms of the public.

10
New cards

COMPUTER MISUSE ACT 1990 (CMA)

Makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else’s computer.

11
New cards

NPCC GUIDELINES | The 4 Principles - PRINCIPLE 1

Don’t change data which may subsequently be relied upon in court

12
New cards

NPCC GUIDELINES | The 4 Principles - PRINCIPLE 2

In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of there actions.

13
New cards

NPCC GUIDELINES | The 4 Principles - PRINCIPLE 3

An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

14
New cards

NPCC GUIDELINES | The 4 Principles - PRINCIPLE 4

The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.

15
New cards

TYPES OF STORAGE MEDIA

CCTV, Desktops, iPads/ Tablets, Laptops, Digital Cameras, External HDD, Mobile Phones, Sim Card, Memory Cards, USB sticks, Dash Cam, Smart TV

16
New cards

REMOVAL AND ACQUIRING OF DATA

Data is extracted, which may involve making a copy of a hard disk, extracting data from a mobile phone, or recovering data from a remote system. Data is then processed to allow an examiner to work on them. This can include decrypting data and recovering files

17
New cards

EXAMINATION OF DATA

Data is analysed and interpreted, which often involves synthesising information from different sources. This may require significant expertise.

18
New cards

KIOSKS

Features bespoke forensic investigation software is being trialled by the Metropolitan Police Service and other forces. It is designed to enable front-line police officers to collect evidence from mobile devices by following a series of on- screen instructions.

19
New cards

TRIAGE

Can be used to determine whether a device should be prioritised for further investigation. It may involve police on the scene assessing whether a device is likely to be useful before seizing it, or making a rapid search of it once seized to decide whether to pass it onto a specialist team.

20
New cards

DIGITAL FORENSIC CHALLENGES - ACCESSING DATA

The data required are not always readily available to investigators. They could be encrypted or stored in the cloud, making access difficult.

21
New cards

DIGITAL FORENSIC CHALLENGES - ENCRYPTION

Is a critical tool for protecting personal or commercially sensitive data. However, in some forms it may hamper digital investigations. Encryption is the process of scrambling data so that it can only be read by an authorised recipient.

22
New cards

DIGITAL FORENSIC CHALLENGES - CLOUD STORAGE

Users’ data and activity records are less likely to be held locally on devices, thus a device may not yield evidence, even if forensic techniques are used.

23
New cards

DIGITAL FORENSIC CHALLENGES - ANTI-FORENSICS

Some criminals are aware of the techniques available to law enforcement and try to hide their digital activity.

24
New cards

CASE STUDY | Operation Colindale

Seven men jailed for drive-by murder of student Aya Hachem

25
New cards

CASE STUDY | Operation Colindale - EXHIBITS

3959 exhibits were generated, of which: 120 phones, 180 digital storage devices, 80,000 hours of CCTV seized, extensive CCTV and telephone enquiries looking at the time before, during and after the incident, 30 vehicles seized

26
New cards

CASE STUDY | Operation Colindale - Verdict

They will serve a total of 216 years between them.