Digital Forensics: Scientific examination & analysis of data from computers/storage media, usable as court evidence.
Cyber Forensics: Possible more appropriate terminology.
Describe the field.
Prepare for investigations in public vs. private sectors.
Importance of professional conduct.
Systematic approach in preparing digital forensics investigations.
Procedures for private sector investigations.
Requirements for data recovery workstations/software.
Summary of investigation processes and case critiques.
Digital Evidence Sources:
Networks (Network Forensics)
Small-scale digital devices
Storage media (Computer Forensics)
Code analysis
Message forensics
Secure collection of computer data.
Identify suspect data.
Imaging/acquisition of data.
Examine suspect data: origin & content.
Present information in court.
Apply laws relevant to computer practices.
Securely collect data.
Examine suspect data (origin & content).
Present digital information to courts.
Apply laws to digital device practices.
Distinction from data recovery: retrieving lost/deleted information.
Teamwork in investigations: investigations triad.
Acquire: Evidence must be collected without alteration.
Authenticate: Validate the image of the collected evidence.
Analyze: Analyze data without modifications.
Technology evolves faster than laws.
Case law is used when statutes are lacking.
Familiarity with recent court rulings is essential for examiners.
Specific example: UAE cyber crime laws (2006, 2009, 2012, 2016, Jan 2022).
Begins with evidence of a crime or witness reports.
Police interviews and report generation.
Decision-making based on management regarding logging or investigation.
Importance of affidavits & supporting evidence.
Public Sector: Investigate crimes like harassment, murder, etc., by law enforcement.
Private Sector: Address company policy violations; reduce litigation risk.
Examples include email harassment, falsification of data, etc.
Use of warning banners in organizations to inform of monitoring policies.
Line of Authority: Defines who can initiate and possess evidence, and access it.
Clear specifications for authorized requesters within companies.
Professional Conduct: Ethics and standards vital for integrity in investigations.
Maintain objectivity, credibility, and confidentiality.
Collect evidence proving crime/company policy violations.
Importance of chain of custody in evidence handling.
Digital forensics requires a structured approach in planning and execution.
Requires original storage media & evidence custody forms.
Use of write-blockers to prevent altering evidence.
Focus on recovering data: deleted files, file fragments, complete files.
Tools such as Autopsy for evidence retrieval.
Keeping comprehensive notes/documentation for court use.
Initial case assessment, resources determination, detailed checklists.
Evidence acquisition processes such as evidence forms and chain of custody.
Use evidence bags, antistatic products, and proper sealing techniques.
Importance of physical integrity of evidence collected.
Investigate employee misuse of corporate resources.
Termination cases commonly relate to creating a hostile work environment.
Necessary resources: proxy server logs, suspect's computer, forensics tools.
Recommended analysis techniques and comparison with logs.
Use of electronic copies of e-mails and server logs for evidence.
Analysis of header data and associated messages.
Guidelines for investigations include the scope, approvals, and gathering evidence.
Might include physical surveillance and accessing sensitive logs.
Distinction between interviews (information gathering) and interrogations (obtaining confessions).
Concept of distinguishing between data recovery and forensics.
Specialized workstations configured for forensic investigations & tools.
Basic requirements include Windows system, write-blockers, and forensics tools.
Additional hardware and software to enhance capabilities.
Require gathering and appropriate tools for analysis of evidence.
Maintain logs, answering key investigative questions.
Use of tools for report generation in various formats.