Unit IV

Understanding Computer Forensics

Unit Overview

This unit covers the principles and practices of computer forensics, including digital evidence handling, the forensic investigation lifecycle, chain of custody requirements, and specialized forensic domains such as email, network, and social media forensics.

Topics Covered

  • Forensics Fundamentals
  • Digital Evidence Types
  • Investigation Lifecycle
  • Chain of Custody
  • Email Forensics
  • Network Forensics
  • Social Media Forensics
  • Forensic Challenges

4.1 Introduction to Computer Forensics

Computer Forensics

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. It involves the identification, preservation, examination, and analysis of digital evidence.

Scope of Computer Forensics

Objectives of Computer Forensics

  1. Identify: Locate and identify digital evidence
  2. Preserve: Protect evidence from alteration or destruction
  3. Extract: Retrieve relevant data from storage media
  4. Analyze: Examine evidence to determine significance
  5. Document: Create comprehensive records of findings
  6. Present: Provide testimony and reports for legal proceedings

Principles of Computer Forensics

Principle Description
Minimal Handling Handle evidence as little as possible to prevent contamination
Documentation Record all actions taken during investigation
Integrity Maintain evidence in its original state
Reproducibility Results should be reproducible by other investigators
Compliance Follow legal procedures and standards

Key Points for Examination:

  • Computer forensics focuses on legally admissible digital evidence
  • Evidence must be preserved in its original state
  • Documentation is critical throughout the process
  • Findings must be reproducible and verifiable

4.2 Digital Forensics Science

Digital Forensics: A broader term encompassing the recovery and investigation of material found in any digital device, including computers, mobile devices, networks, and cloud systems. It is a branch of forensic science that applies scientific methods to digital evidence.

Branches of Digital Forensics

Branch Focus Area Examples
Computer Forensics Desktop and laptop computers Hard drive analysis, file recovery
Mobile Forensics Smartphones and tablets Call logs, messages, app data
Network Forensics Network traffic and logs Packet analysis, intrusion detection
Memory Forensics Volatile memory (RAM) Running processes, encryption keys
Database Forensics Database systems Transaction logs, data manipulation
Cloud Forensics Cloud-based systems Virtual machine analysis, logs

Forensic Tools Categories

Scientific Method in Digital Forensics

  1. Observation: Initial assessment of the situation
  2. Hypothesis: Formulating theories about what occurred
  3. Testing: Examining evidence to test hypotheses
  4. Analysis: Interpreting test results
  5. Conclusion: Drawing conclusions based on evidence
  6. Reporting: Documenting and presenting findings

4.3 The Need for Computer Forensics

Reasons for Computer Forensics

1. Legal Requirements

2. Organizational Needs

3. Data Recovery

Importance in Modern Context

Factor Impact on Forensics Need
Increasing Cybercrime Growing need for investigation capabilities
Digital Evidence Most crimes now have digital components
Regulatory Compliance Legal requirements for data investigation
Business Continuity Understanding breaches to prevent recurrence
Legal Proceedings Digital evidence increasingly accepted in courts

Key Points for Examination:

  • Forensics is essential for prosecuting cybercrimes
  • Organizations need forensics for internal investigations
  • Digital evidence is present in most modern crimes
  • Regulatory requirements drive forensic capabilities

4.4 Cyber Forensics and Digital Evidence

Digital Evidence:

Information stored or transmitted in digital form that may be used in court. It includes data from computers, networks, mobile devices, and other electronic sources that can establish facts relevant to an investigation.

Detailed Explanation: Digital evidence is fundamentally different from physical evidence due to its intangible nature and ease of modification. It requires specialized handling, preservation techniques, and validation methods to ensure admissibility in legal proceedings.

Unique Characteristics of Digital Evidence:

  • Fragility: Easily altered, damaged, or destroyed - even viewing a file changes its access timestamp
  • Invisibility: Cannot be seen without proper tools and expertise
  • Duplicability: Perfect copies can be made without affecting originals
  • Volume: Massive amounts of data requiring systematic processing
  • Time Sensitivity: Volatile data (RAM) lost when system powers off
  • Complex Dependencies: Requires understanding of file systems, operating systems, applications

Locard's Exchange Principle in Digital Forensics: "Every contact leaves a trace" - Every digital interaction leaves some form of digital footprint (logs, temporary files, registry entries, metadata, etc.)

Order of Volatility (Most to Least Volatile):

  1. CPU registers and cache
  2. RAM contents, routing tables, ARP cache
  3. Temporary file systems, swap space
  4. Hard disk contents
  5. Backup media, external storage
  6. Printed documents, logs on paper

Types of Digital Evidence

Type Description Examples
Volatile Data Data that is lost when power is removed RAM contents, running processes, network connections
Non-Volatile Data Data that persists after power off Hard drive contents, flash storage
Transient Data Temporary data during system operation Cache files, swap space
Active Data Currently accessible files and data User documents, applications
Latent Data Hidden or deleted data Deleted files, slack space

Characteristics of Digital Evidence

Sources of Digital Evidence

Admissibility Requirements

  1. Authenticity: Evidence must be genuine and unaltered
  2. Integrity: Evidence must be complete and uncorrupted
  3. Reliability: Methods used must be reliable and accepted
  4. Relevance: Evidence must relate to the case
  5. Completeness: Evidence should provide full context

Key Points for Examination:

  • Volatile data must be collected before system shutdown
  • Digital evidence is fragile and easily altered
  • Authenticity and integrity are critical for admissibility
  • Latent data includes deleted files and hidden information

4.5 Forensics Analysis of E-Mail

Email as Evidence

Email is a significant source of digital evidence in investigations involving fraud, harassment, intellectual property theft, and other crimes. Email forensics involves examining email headers, content, and metadata to establish facts.

Components of Email for Analysis

Component Information Provided
Header Sender, recipient, routing path, timestamps, server information
Body Message content, formatting, embedded links
Attachments File names, types, content, metadata
Metadata Creation date, modification date, client information

Email Header Analysis

Email headers contain valuable information for investigations:

Email Forensic Process

  1. Identification: Locate relevant email evidence
  2. Preservation: Create forensic copies of email data
  3. Extraction: Retrieve emails from servers, clients, or archives
  4. Analysis: Examine headers, content, and metadata
  5. Validation: Verify authenticity and trace origin
  6. Reporting: Document findings

Challenges in Email Forensics

Key Points for Examination:

  • Email headers contain routing and origin information
  • Header information can be spoofed but leaves traces
  • Received headers show the actual email path
  • Attachments contain metadata valuable for investigation

4.6 Digital Forensics Life Cycle

Phases of Digital Forensics

1. Identification

2. Preservation

3. Collection

4. Examination

5. Analysis

6. Presentation

Order of Volatility

Evidence should be collected in order of volatility (most volatile first):

  1. CPU registers and cache
  2. RAM (Random Access Memory)
  3. Network connections and routing tables
  4. Running processes
  5. Hard disk and storage media
  6. Remote logging and monitoring data
  7. Physical configuration and network topology
  8. Archival media (backups, tapes)

Key Points for Examination:

  • Six phases: Identification, Preservation, Collection, Examination, Analysis, Presentation
  • Volatile evidence must be collected first
  • Documentation is required at every phase
  • Integrity verification uses hash values

4.7 Chain of Custody Concept

Chain of Custody: The chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It establishes the integrity of evidence from collection to court presentation.

Purpose of Chain of Custody

Elements of Chain of Custody Documentation

Element Description
Description of Evidence Detailed description including serial numbers, make, model
Collection Information Date, time, location of collection
Collector Identity Name and signature of person collecting evidence
Transfer Records Each transfer documented with signatures
Storage Conditions Where and how evidence was stored
Access Log Record of each person accessing evidence
Hash Values Cryptographic hashes for integrity verification

Best Practices

  1. Minimize the number of people handling evidence
  2. Use tamper-evident packaging
  3. Label all evidence clearly and uniquely
  4. Obtain signatures for all transfers
  5. Store evidence in secure, access-controlled locations
  6. Calculate and verify hash values at each transfer
  7. Photograph evidence before and after handling

Breaking Chain of Custody

Chain of custody can be broken by:

Key Points for Examination:

  • Chain of custody ensures evidence integrity
  • Every transfer must be documented with signatures
  • Hash values verify that evidence is unaltered
  • Broken chain can make evidence inadmissible

4.8 Network Forensics

Network Forensics: The capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. It involves monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.

Network Forensics Approaches

Approach Description
Catch-it-as-you-can Capture all network packets for later analysis
Stop, look, and listen Analyze packets in real-time, storing only relevant data

Data Sources for Network Forensics

Network Forensics Process

  1. Preparation: Deploy capture and logging infrastructure
  2. Detection: Identify anomalous network activity
  3. Capture: Record relevant network traffic
  4. Analysis: Examine captured data for evidence
  5. Correlation: Link network events with other evidence
  6. Reporting: Document findings and conclusions

Challenges in Network Forensics

Key Points for Examination:

  • Network forensics analyzes network traffic for evidence
  • Two approaches: full capture or real-time analysis
  • Multiple data sources provide comprehensive view
  • Encrypted traffic is a significant challenge

4.9 Approaching a Computer Forensics Investigation

Initial Response Steps

1. Secure the Scene

2. Assess the Situation

3. Plan the Investigation

Evidence Collection Procedures

For Powered-On Systems:

  1. Capture volatile data (RAM, network connections)
  2. Document running processes and open files
  3. Record logged-in users and network configurations
  4. Perform orderly shutdown if appropriate
  5. Create forensic image of storage media

For Powered-Off Systems:

  1. Do not power on the system
  2. Remove storage media carefully
  3. Use write blockers when connecting media
  4. Create forensic image of storage media
  5. Verify image integrity with hash values

Investigation Workflow

Phase Activities
Authorization Obtain proper legal authority for investigation
Documentation Maintain detailed records throughout
Collection Gather evidence following proper procedures
Preservation Protect evidence integrity
Analysis Examine evidence systematically
Reporting Document and present findings

Key Points for Examination:

  • Secure the scene before beginning investigation
  • Volatile data must be captured before shutdown
  • Never power on a powered-off system without preparation
  • Write blockers prevent evidence modification

4.10 Forensics and Social Networking Sites

Social Media as Evidence Source

Social networking sites contain vast amounts of potentially relevant evidence including communications, relationships, locations, and activities.

Types of Evidence from Social Media

Evidence Type Examples
Profile Information Name, location, employment, education, relationships
Communications Messages, comments, posts, chat logs
Media Content Photos, videos with metadata (location, time)
Connections Friends, followers, group memberships
Activity Logs Login times, locations, device information
Check-ins Location history and timestamps

Security and Privacy Threats

Forensic Challenges

Collection Methods

4.11 Challenges in Computer Forensics

Technical Challenges

Challenge Description
Encryption Data protected by strong encryption may be inaccessible
Anti-Forensics Techniques designed to thwart forensic investigation
Volume of Data Large storage capacities require extensive analysis time
Cloud Computing Data distributed across multiple jurisdictions
Volatile Evidence Temporary data lost if not captured promptly
Diverse Platforms Various operating systems and file systems

Legal and Procedural Challenges

Anti-Forensics Techniques

Emerging Challenges

Key Points for Examination

  • Encryption is a major barrier to evidence access
  • Anti-forensics actively counters investigation efforts
  • Cloud and distributed computing complicate jurisdiction
  • Continuous evolution of technology requires ongoing adaptation

4.12 Forensic Image

Definition:

A Forensic Image (also called a forensic copy or bitstream image) is a bit-by-bit, sector-by-sector exact copy of a storage device that captures ALL data, including deleted files, slack space, unallocated space, and file system metadata.

Key Characteristics:

  • Creates exact duplicate of source media at the bit level
  • Preserves hidden and deleted data not visible to operating system
  • Captures slack space (unused portions of allocated clusters)
  • Includes unallocated space where deleted files may reside
  • Verified using cryptographic hash values (MD5, SHA-256)

Forensic Image vs. Regular Backup

Forensic Image Regular Backup
Bit-by-bit copy of entire storage device Copies only visible files and folders
Includes deleted files and slack space Does not capture deleted data
Preserves file system metadata exactly May alter timestamps during copy
Verified with cryptographic hashes Usually not cryptographically verified
Legally admissible as evidence Not suitable for legal proceedings

Common Forensic Image Formats

Format Description Tools
E01 (EnCase Evidence File) Compressed format with built-in hash verification; industry standard EnCase, FTK Imager
DD/Raw Uncompressed bit-for-bit copy; universally compatible dd (Unix), FTK Imager, Guymager
AFF (Advanced Forensics Format) Open-source format with compression and metadata support Autopsy, various open-source tools
Ex01 (EnCase 8+) Newer EnCase format with improved encryption support EnCase 8+

Forensic Imaging Process

  1. Document Original Media: Record serial numbers, model, capacity, physical condition
  2. Connect Write Blocker: Use hardware or software write blocker to prevent modification
  3. Generate Source Hash: Calculate MD5/SHA-256 of original before imaging
  4. Create Forensic Image: Use forensic imaging tool to create bit-by-bit copy
  5. Verify Image: Hash the image and compare to source hash (must match exactly)
  6. Document Chain of Custody: Record who handled evidence and when
  7. Store Securely: Preserve original and work only with forensic image copies

Key Points for Examination:

  • Forensic image is bit-by-bit exact copy including deleted data and slack space
  • Different from regular backup which only copies visible files
  • Common formats: E01 (EnCase), DD/Raw, AFF
  • Hash verification (MD5/SHA-256) proves image integrity
  • Analysis performed on image copy, never on original evidence

4.13 Live Forensics vs. Dead Forensics

Definition:

Digital forensics investigations can be performed on systems that are either running (live) or powered off (dead). Each approach has distinct advantages and use cases.

Live Forensics (Live Analysis)

Live Forensics involves collecting and analyzing data from a running system before it is powered off.

Advantages Disadvantages
Captures volatile data (RAM, running processes, network connections) Every action potentially alters evidence
Observes system in operational state Requires specialized tools and expertise
Can access decrypted data if user is logged in Time pressure - volatile data disappears quickly
Captures encryption keys that may be in memory May trigger malware behavior changes
Identifies active malware and network connections Difficult to maintain chain of custody documentation

Dead Forensics (Post-Mortem Analysis)

Dead Forensics involves analyzing a system after it has been powered off, typically by creating and examining a forensic image.

Advantages Disadvantages
No risk of altering evidence during examination Volatile data is lost
Systematic, repeatable analysis Encrypted data may be inaccessible
Evidence remains static and preservable No visibility into running processes or connections
Easier to document and maintain chain of custody Cannot observe malware behavior
Can create multiple working copies Full disk encryption may prevent access

When to Use Each Approach

Use Live Forensics When: Use Dead Forensics When:
Volatile evidence is critical (RAM contents) System is already powered off
Encryption keys may be in memory Evidence preservation is paramount
Active threats need identification Detailed disk analysis is required
Network connections need documentation Multiple analyses are needed
Running malware analysis is needed Time is not critical

Key Points for Examination:

  • Live forensics captures volatile data from running systems
  • Dead forensics analyzes powered-off systems via forensic images
  • Live forensics risks altering evidence; dead forensics loses volatile data
  • Order of volatility guides collection priority in live forensics
  • Many investigations use both approaches for comprehensive analysis

4.14 Evidence Acquisition Methods

Definition:

Evidence acquisition is the process of capturing data from storage media for forensic analysis. Different methods are used depending on the investigation requirements and circumstances.

Types of Acquisition

Method Description Use Case
Physical Acquisition Bit-by-bit copy of entire storage device including all sectors, deleted data, and unallocated space Full investigations requiring complete evidence; most comprehensive
Logical Acquisition Copies visible files and folders as seen by the operating system; does not include deleted or hidden data Quick triage; when time is limited; partial investigations
File System Acquisition Extracts data visible to file system including some deleted file references from file tables Balance between speed and comprehensiveness
Targeted/Selective Acquisition Collects only specific files or folders relevant to investigation When scope is clearly defined; quick collection needed
Memory (RAM) Acquisition Captures volatile memory contents including running processes, encryption keys Live forensics; malware analysis; encrypted systems

Write Blockers

Definition:

A Write Blocker is a hardware or software device that allows read access to a storage device while preventing any write operations, ensuring evidence integrity during acquisition.

Type Description Examples
Hardware Write Blockers Physical devices inserted between computer and evidence drive; intercept and block write commands Tableau Forensic Bridges, WiebeTech, CRU
Software Write Blockers Operating system level protection that prevents write operations Windows Registry settings, Linux mount options

Purpose of Write Blockers:

Acquisition Tools

Key Points for Examination:

  • Physical acquisition captures entire drive including deleted data
  • Logical acquisition copies only visible files
  • Write blockers prevent modification of original evidence
  • Hardware write blockers are preferred for court admissibility
  • Memory acquisition captures volatile data from running systems

4.15 Forensic Tools and Techniques

Overview:

Forensic investigators use specialized tools to acquire, preserve, examine, and analyze digital evidence. These tools ensure scientific methodology and legal admissibility.

Comprehensive Forensic Suites

Tool Developer Key Features
EnCase Forensic OpenText (formerly Guidance) Industry standard; comprehensive disk analysis; court-accepted; supports multiple file systems; scripting capabilities; network forensics
FTK (Forensic Toolkit) AccessData Distributed processing; password recovery; email analysis; explicit image detection; timeline analysis
Autopsy Basis Technology (Open Source) Free/open-source; plugin architecture; timeline analysis; keyword search; file type identification; hash matching
X-Ways Forensics X-Ways Software Lightweight; fast processing; advanced file carving; disk cloning; memory forensics

Specialized Forensic Tools

Memory Forensics

Mobile Forensics

Network Forensics

Key Forensic Techniques

Technique Description Purpose
Hash Verification Calculate MD5/SHA-256 hashes to verify integrity Proves evidence has not been modified
Timeline Analysis Reconstruct chronological sequence of events using file timestamps (MAC times) Understand when actions occurred
File Carving Recover files from raw data using file signatures without file system metadata Recover deleted files from unallocated space
Keyword Search Search evidence for specific terms, patterns, or phrases Locate relevant evidence quickly
Registry Analysis Examine Windows Registry for user activity, installed software, device history Determine user actions and system configuration
Log Analysis Examine system, application, and security logs Trace events and identify anomalies

File Carving

File Carving is the process of recovering files from raw data (unallocated space or damaged media) without relying on file system metadata. It works by scanning for known file signatures (headers and footers).

How File Carving Works:

  1. Tool scans raw data for known file signatures (magic numbers)
  2. Identifies file headers (e.g., JPEG starts with FFD8)
  3. Locates file footers or calculates file size
  4. Extracts data between header and footer
  5. Reconstructs files regardless of file system state

File Carving Tools: PhotoRec, Foremost, Scalpel, Autopsy

Key Points for Examination:

  • EnCase and FTK are industry-standard commercial forensic suites
  • Autopsy is leading open-source forensic platform
  • Volatility is primary tool for memory forensics
  • File carving recovers files using signatures, not file system
  • Timeline analysis reconstructs sequence of events
  • Hash verification proves evidence integrity

4.16 Incident Response

Definition:

Incident Response is the organized approach to addressing and managing a security breach or cyberattack. The goal is to handle the situation in a way that limits damage, reduces recovery time and costs, and preserves evidence for forensic analysis.

Incident Response Phases (NIST Framework)

Phase Description Key Activities
1. Preparation Establishing incident response capabilities before incidents occur Create IR team; develop policies and procedures; deploy detection tools; conduct training; establish communication channels
2. Identification Detecting and determining whether an event is an actual security incident Monitor alerts; analyze logs; identify scope and severity; classify incident type; document initial findings
3. Containment Limiting the damage and preventing further spread of the incident Short-term: Isolate affected systems, block malicious IPs; Long-term: Apply patches, change credentials; Preserve evidence during containment
4. Eradication Removing the threat from the environment Remove malware; close vulnerabilities; eliminate attacker access; validate systems are clean
5. Recovery Restoring systems to normal operation Restore from clean backups; rebuild systems; monitor for recurrence; gradually restore services
6. Lessons Learned Documenting and learning from the incident Post-incident review; update procedures; improve defenses; document timeline and actions; share appropriate information

Relationship Between Incident Response and Forensics

Incident Response Team (IRT) Roles

Key Points for Examination:

  • Six phases: Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
  • Forensics is critical during containment for evidence preservation
  • Containment limits damage; eradication removes threat
  • Lessons learned phase improves future response
  • IR team includes technical, legal, and communications roles

4.17 Forensic Report Writing

Definition:

A Forensic Report is a formal document that presents the findings of a digital forensic investigation in a clear, objective, and legally defensible manner. It must be understandable to both technical and non-technical audiences, including judges and juries.

Structure of a Forensic Report

Section Contents
1. Executive Summary Brief overview of investigation, key findings, and conclusions; written for non-technical readers (1-2 pages)
2. Scope and Objectives What was investigated, why, and any limitations or constraints on the investigation
3. Methodology Tools used, procedures followed, standards complied with (e.g., ISO 27037, NIST guidelines)
4. Evidence Summary List of all evidence items examined; chain of custody references; hash values for verification
5. Detailed Findings Technical analysis results; timeline of events; supporting evidence with references to exhibits
6. Conclusions Factual findings supported by evidence; avoid speculation; address investigation objectives
7. Appendices Hash values, tool outputs, technical details, chain of custody forms, glossary of terms

Report Writing Best Practices

Key Points for Examination:

  • Forensic reports must be objective, clear, and legally defensible
  • Executive summary provides overview for non-technical readers
  • Methodology section documents tools and procedures used
  • All findings must be supported by referenced evidence
  • Reports should be written for potential court presentation

Unit IV Summary

Previous: Unit III - Tools and Methods Next: Unit V - Security Policies and Laws