Introduce fundamentals of investigative reconstruction.
Discuss different types of analyses performed by DF investigators.
Explain the difference between “direct evidence” and “circumstantial evidence”.
Reconstruction is the systematic process of bringing together fragmented clues (evidence) to gain a better understanding of what happened between the victim and the offender in relation to a crime.
This process is complex due to:
Limited amount of evidence left behind.
Evidence may be damaged or camouflaged.
Crimes are not easy to decipher; reconstructing events from the evidence is like assembling a jigsaw puzzle.
Locard’s Exchange Principle applied to DF (digital) and (physical).
Example: E‐mail harassment case.
A threatening email sent via Gmail produces evidence in different places.
Web browser stores files, links, and other information on the sender’s hard drive with date/time information.
Gmail (Google) web server contains access logs, IP addresses, and possibly the original message.
The victim’s machine possibly contains the threatening email received.
Digital evidence left by an offender at a particular crime scene contains behavioral imprints.
A connected series of behavioral imprints can be used to establish an offender’s modus operandi (how the offender operates).
Reconstruction of the crime using available evidence is a CRUCIAL STAGE of an investigation, performed throughout to develop leads and determine where additional sources of evidence can be found.
The investigator should be careful to remain objective and not be driven by patterns, preconceived theories, stereotypes, or influences.
Establish the “big picture.”
Focus the investigation.
Locate concealed evidence.
Anticipate actions & assess potential escalation.
Link related crimes with the same Modus Operandi.
Prioritize investigation of suspects.
Guide suspect interview or offender contact.
Improve case presentation in court.
Equivocal forensic analysis is the process of objectively evaluating available evidence, independent of the interpretation of others, to determine its true meaning.
From the evidence, the investigator has to identify facts that show a crime has taken place: Facts that show a crime has taken place are collectively referred to as the corpus delicti (body of the crime).
Equivocal forensic analysis should consider (1) other investigators’ reports, (2) crime scene documentation, (3)usage and ownership of devices, (4)original media, (5 ) suspect & witness statements, (6) network map, and logs.
Temporal: When
Relational: Who, What, Where
Functional: How
Aims to establish the chronological order of events (timeline) involved in a crime. (can be done using line charts, histograms & grids)
Useful to:
Identify patterns (e.g., recurring events).
Identify anomalies (e.g., out of sequence events indicating activities such as log tampering; deviations from regular events).
Identify periods of intense activities that deserve closer inspection.
Timestamps are essential, and geographic location is equally important due to time zone differences.
As crime complexity grows, reconstructing a timeline of events involving different time zones becomes a challenge
Accuracy of BIOS clock (computers),synchronisation with mobile provider
Aims to establish the relations/associations between entities (e.g., objects and subjects).
Uses Scenario diagrams (E.g., a diagram showing steps performed by an offender through a network to reach a target; it might indicate sources of evidence such as logs, and relevant people involved) & Link Analysis (to represent connections between people, between computer or other devices; e.g., a map of social relations may uncover the role performed by members of a gang (and its structure of authority and command)
Useful to:
Reveal who the players are and their relations, establishing the chain of command or communication network.
Clarify what has occurred.
Locate potential sources of digital evidence (e.g., firewall, router, intrusion detection logs) which become visible through the relational analysis.
Challenges
Creating a relational reconstruction works best for a small number of entities
As the number of entities and links increase, it becomes increasingly hard to identify which are the important connections
Some tools provide features to allow the assignment of weight to connections in a relational diagram
Aims to establish the relations / associations between different entities (eg objects and subjects testing conditions and possibly raise questions about evidence.
Functional analysis aims at testing such conditions and possibly raise questions about an evidence
The purpose is to consider all possible explanations for a given set of circumstances.
Aims to establish how something has happened, given a set of circumstances (based on evidence collected).
Useful for 2 main purposes:
1.Brainstorming hypotheses to direct investigations.
2.Check if something could have happened in a certain way – i.e., validate the how.
During this phase, potential patterns of behaviour may begin to emerge and gaps in evidence may appear
Evidence should start to fit together into a coherent whole like pieces of a jigsaw puzzle
The big picture(and the holes in this picture/puzzle) should become more apparent although it is unlikely the picture will ever become crystal clear
Reconstruction provides a methodology for gaining a better understanding of a crime and focusing an investigation
– Investigators must remain objective throughout
The use of reconstruction may point towards an offender or suspected offender
– Investigators’ job is to present the facts, not to judge
– Statements judging individual suspects, compromise an investigator objectivity and reputation →therefore, should be avoided at all means!
Direct evidence establishes a fact.
Circumstantial evidence suggests a fact.
Direct evidence examples:
Eyewitness account
Confession
A direct link between someone and an alleged misconduct.
Circumstantial evidence:
Indirect evidence that requires inference to imply a fact.
Attribution is the primary issue in most cybercrimes - Who was at the computer at that time?
Proof will almost depend on a number of circumstantial evidence indicating.
1.Access: Evidence showing the suspect had physical or digital ability to reach the system, file, or network involved in the incident.
2.Knowledge: Indicators that the suspect possessed the technical skills or information necessary to carry out the activity in question.
3.Opportunity: Proof that the suspect was present or active at the relevant time when the incident occurred.
4.Motive: Circumstantial context suggesting the suspect had a reason or incentive (e.g., revenge, profit, curiosity) to commit the act.
5.State of Mind: Evidence reflecting the suspect’s intent, attitude, or awareness, such as deleted logs, hidden files, or attempts to cover tracks.
• Traditional evidence (from old‐fashioned detective work) can corroborate with digital evidence, e.g.:
– Suspect and witness interviews
– Physical evidence
– Physical surveillance
• Circumstantial evidence and, in particular, a number of digital evidence can indicate that something has happened in a certain way
... but can also indicate that something has not happen in a certain way
→ digital forensic investigators need to have an open mind to find and report on all relevant evident either way
It is important to distinguish direct from circumstantial evidence to understand the value of the evidence collected
– Direct evidence has higher value compared to circumstantial evidence
– Therefore, investigators have to collect enough circumstantial evidence in the absence of direct evidence to make a strong case