Forensic: The use or application of scientific knowledge to a point of law, especially in crime investigations.
Computer Forensics: A sub-discipline of Digital & Multimedia Evidence involving the scientific examination, analysis, and evaluation of digital evidence in legal matters.
Acquisition: The process of duplicating, copying, or imaging digital evidence.
Original Evidence: Physical items and associated data at the time of seizure.
Examination: A technical review that makes evidence visible and suitable for analysis; tests performed to determine specific data presence.
Data Extraction: Identifying and recovering information that may not be immediately apparent.
Analysis: Reviewing examination results for significance and probative value.
Data Analysis: Assessing the information within the media.
Digital Evidence: Information stored or transmitted in binary form that may be used in court.
Chain of Custody: Chronological documentation of evidence movement, location, and possession.
Basic Input/Output System (BIOS): Routines stored in ROM that enable a computer to start the OS and communicate with devices.
Archiving: Storing data for long-term availability and retrieval.
File Slack: Space between the logical end of a file and the last allocation unit.
Free Space: Available data storage areas, possibly containing previously stored information (a.k.a. Unallocated Space).
Unallocated Space: Storage units not assigned to active files, may contain remnants of deleted data.
Accreditation: Labs can receive credit by following established forensic standards.
Evidence Locker: Secure storage location for evidence.
Disaster Recovery Plan: Ensures restoration of workstations and investigation files after catastrophic events (e.g., virus contamination, reconfiguration).
Federal Rules of Evidence (FRE): Created for consistency in federal proceedings; do not apply uniformly to states.
Fourth Amendment: Protects individuals from unlawful searches.
Data Recovery: A different form of digital forensics.
Search & Seizure: Examiners must be familiar with recent court rulings.
Conducted by government agencies for criminal investigations and prosecutions.
Focus: Company policy violations.
Examples:
Email harassment
Data falsification
Discrimination (age, gender, etc.)
Embezzlement
Industrial espionage
Policies: Defined by an “Acceptable Use Policy” regulating computer/network use.
Line of Authority: Determines who can initiate an investigation, handle evidence, and access it.
Warning Banners: Alerts users that organizations reserve the right to inspect systems and network traffic.
Bring Your Own Device (BYOD): Some companies enforce the same rules on personal devices connected to business networks.
First Responder: Assesses an incident/crime scene and identifies/preserves physical evidence.
Digital Evidence First Responder: Assesses a crime scene, collects and preserves digital evidence.
Digital Evidence Specialist: Analyzes acquired data within forensic and legal parameters.
Bit-Stream Copy: A bit-by-bit copy of the original storage medium.
Bit-Stream Image: A forensic image of digital storage.
Single Evidence Form: Lists each piece of evidence separately.
Multi Evidence Form: Lists multiple evidence items related to the same case on one sheet.
Loss of power
Cloud synchronization
Remote wiping
Airplane mode
Paint can
Turning off the device
Paraben Wireless Stronghold Bag
Removes personal information from phones, complicating forensic investigations.
Manual Review (May not be considered forensic)
File System: Provides an OS with a roadmap to data.
Clusters: Groups of sectors forming storage allocation units.
Partition: A logical drive.
Hidden Partitions/Void Spaces: Areas in storage that may contain hidden data.
Partition Gap: Unused space between partitions.
Directory entry marked as deleted.
First letter of filename replaced with hex E5.
FAT chain set to 0.
Data remains on disk until overwritten.
Deleted file area becomes unallocated space.
Email with links leading to fraudulent websites to steal personal information.
DNS poisoning that redirects users to fake sites (e.g., Whitehouse.com vs. Whitehouse.gov).
Lay Witness: Testifies about what they saw or heard.
Scientific/Technical Witness: Explains evidence and how it was obtained but does not form conclusions.
Expert Witness:
Provides opinions based on experience and reasoning.
Forms conclusions based on findings.
Four Conditions for Expert Witnesses:
Knowledge or skills
True expertise
Degree of certainty
Evidence-based facts
Spoliation: Destroying reports may be considered evidence tampering.
Ethics: Internalized rules for performance measurement.
Professional Conduct: External standards applied to forensic professionals.
Rules of Evidence: Critical laws governing attorney and witness procedures.
Court Order of Events:
Prosecution
Defense
Opening statements
Plaintiff
Defendant
Rebuttal
Closing arguments
Jury instructions
Testimony Types
Direct Examination: Most important part of testimony.
Expert Witness Testimony: Most powerful.
Conflicting Out: Opposing attorneys preventing an expert from serving on a case.
Deposition:
No jury/judge, opposing attorneys preview testimony before trial.
Discovery Deposition: Part of the pre-trial discovery process.
Testimony Preservation Deposition: Records testimony for future use.
Warrants Required for Law Enforcement: Private sector policy violations do not need warrants.
Private Sector vs. Law Enforcement: Once police get involved, private-sector investigations must follow law enforcement protocols.
Computer-Generated Records: Considered authentic if the program is functioning correctly.
Digitally Stored Records: Must be authenticated and trustworthy before admission as evidence.
Plain View Doctrine: Allows officers to seize objects in plain view without a warrant if they are lawfully present.