Some of this paper was repurposed from a previous class CJUS275 Russ Pomrenke.
In this paper, I am going to show the many steps on how to obtain information from a computer and also talk about the chain of command when transporting a computer for forensic evidence.
Computer forensics involves preservation, identification, extraction and interpretation of the documentation of any and all computer evidence. There are many different levels to the field of computer science.
At a very basic level, computer forensics is the analysis of information contained within and created with computer systems, typically figuring out what happened, when it happened, how it happened and who was involved.
In many cases, the information gathered during a computer forensics investigation is not readily available or viewable by the average user. This might include items like deleted files and fragments of data that can be found in the space allocated for existing files, which is known by computer forensic practitioners as “slack space”. Special skills and tools are necessary to be able to obtain this type of information or evidence.
Typically, confirming or preventing a crime or violation through computer forensics examination is a reactive measure to a circumstance. However, today, computer forensic examinations are often used pro-actively for the continuous monitoring of electronic media. In some cases, computer forensics is even used in a debriefing process for employees exiting a company.
There are three types of files that a forensic computer person is interested in.
Computer forensics is all about obtaining proof of a crime or breech of policy. It focuses on obtaining proof of illegal misuse of computers in a way that could lead to the prosecution of the misuser.
Primary phase of computer forensics examination are:
Computer forensic investigations should always be conducted by a Certified Computer Forensic Examiner. They will use licensed equipment which prevents tainting of the evidence and ensures its validity in court. The steps involved for a computing investigation are summarized below:
I) A chain of custody is to be established. The examiner makes sure they are aware at all times where any items related to the investigation are located. A safe or cabinet is often used to secure items.
II) All relevant information is cataloged. This includes active, archival, and latent data. Information that has been deleted will be recovered to whatever extent possible. Encrypted information and information that is password-protected is identified, as well as anything that indicates attempts to hide or obfuscate data. The integrity of the original media is maintained to the highest extent possible, which means that the original source of information should not be altered. An exact copy of a hard drive image is made and that image is authenticated against the original to make sure that it is indeed exact.
III) Additional sources of information are obtained as the circumstances dictate. This includes firewall logs, proxy server logs, Kerberos server logs, sign-in sheets, etc.
IV) The information is analyzed and interpreted to determine possible evidence. Both exculpatory (they didn’t do it) and inculpatory (they did do it) evidence is sought out. If appropriate, encrypted files and password protected files are cracked.
V) A written report will be submitted to the client with the investigator’s findings and comments.
VI) If necessary, the investigator will provide expert witness testimony at a deposition, trial, or other legal proceeding. (Casey, 2004).
The information contained in this document covers the basics, and really doesn’t do full justice to all facets of computer forensics. However, you should now have a better understanding of what steps are involved in the process.
Time is of the essence when it comes to retrieving critical electronic data.
If the computer in question happens to be a personal model or laptop computer, it is imperative that the machine be cordoned off from the potential perpetrator. While it is preferable to keep the machine powered on, it is just as important to keep the accused from deleting or erasing any material from his or her hard drive. Computer forensic science investigators should recover as much material as possible before removing the computer from the scene.
If the computer happens to be networked with other computers across a network, even if they are in the same building, the same measures described above should be applied. The computer should be disconnected from the network as soon as possible to dissuade anyone from altering material on the computer that may be used for evidence at a later date. As mentioned earlier, modern computer software may help with recovering vital information from the implicated person and machine. (Kruse, 2002).
Once the machine in question has been located and secured, the first step should be a thorough photographic survey of the computer as it was found. At the same time, the computer system should be secured to ensure that the equipment and data are safe. This means the detectives must make sure that no unauthorized individual can access the computers or storage devices involved in the search. If the computer system connects to the Internet, detectives must sever the connection. (Noblett, 2000).
The computer forensic science experts should be extra careful to document every step that makes up their investigation along with whatever was discovered. Investigators need to carefully document every step of the procedure. It’s important for detectives to provide proof that their investigations preserved all the information on the computer system without changing or damaging it. Years can pass between an investigation and a trial, and without proper documentation, evidence may not be admissible. Officials report that the collected documentation should include not only all the files and data recovered from the system, but also a report on the system’s physical layout and whether any files had encryption or were otherwise hidden. (Noblett, 2000).
Obviously, performing a thorough investigation is futile if the appropriate documentation is not secured. All of the obtained data should be accurate and protected in its own right to keep the criminals from avoiding prosecution and returning any valuable information from any victims. A group of investigators surely do not want to let a deviant go free just because they were sloppy with their investigation! It is therefore critical that the examiners be properly trained to avoid any missteps along the way of finding out the truth and bring the perpetrators to justice.
Casey, E. (2004) Digital Evidence and Computer Crime, Second Edition. Elsevier.
Kruse, W. (2002) Computer forensics: incident response essentials. Addison-Wesley. pp. 392.
Noblett, M. (2000) “Recovering and examining computer forensic evidence”. http://bartholomewmorgan.com/resources/RecoveringComputerEvidence.doc. Last accessed August 5, 2011.
Phillip, A. (2009) Hacking Exposed: Computer Forensics. McGraw Hill
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more