forensics tries to reconstruct and explain activities and events - - PowerPoint PPT Presentation
forensics tries to reconstruct and explain activities and events - - PowerPoint PPT Presentation
forensics tries to reconstruct and explain activities and events their actors and participants causes consequences individual forensic procedures in the best case can only provide parts of the puzzle for the whole
2
- forensics tries to reconstruct and explain activities and events
–
their actors and participants
–
causes
–
consequences
- individual forensic procedures
–
in the best case can only provide parts of the puzzle
- for the whole picture/story
–
they need to be put in the right sequence
–
interpreted in broader context
- the legal ramifications of forensic investigation it is important to
–
make sure that forensic material cannot be changed (tampered)
- after being acquired
–
and that this can be proved
- therefore we need a well defined procedure(s)
2015-2017 (c) P.Pale: Računalna forenzika - Procedures 21.12.2018.
3
- police (court) forensics
▪ have their required, mandatory procedures ▪ scope defined by law
- this course teaches generic/general forensics
▪ applicable in industry
- therefore it is not based on
procedures defined by any law(s)
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
4
- reconnaissance of the target system
- planning the evidence acquisition
- acquisition of evidence material
- storing and guarding the material
- analysis of the material
- reporting
- But!
▪ before the beginning ▪ acquire/define the questions you need to give answers to
- in written form
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
5
- what is it all about – what are we invetigating
▪ disaster, attack, problems , suspicion…
- define the scope of the system –
what are we going to observe/analyse
▪ computer/device, cluster, system, data, organization, public …
- enumerate/list components
▪ servers, workstations, portable devices, phones, other equipment connected with IT components
- interview actors and stakeholders
▪ operators, managers, management, users, partners …
- gather the documentation
▪ communication system’s blueprints ▪ logic blueprints of information system
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
6
- gather as many as possible information
▪ about the subject of investigation
- passive gathering
- interviews
▪ users ▪ operates ▪ authorized persons ▪ everybody involved
- find out
▪ which network resources are used ▪ which communication systems
- mail servers
- social networks
- …
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
7
- identify target device/program/data
- if this is not possible, than enumerate/list:
▪ computers: servers, users’ ▪ handheld devices ▪ communication equipment ▪ other
- identify other target devices
- identify other targed data
- determine which devices can be turned off
- define the sequence of acquisition
- ensure the legitimacy
- f the procedure, authority, support
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
8
- remove all persons from the
physical space except forensics
- do not touch anything
- take photos of the scene
▪ record (in written) everything that seems important
- take photos and document
how things were connected
- seize devices
- take cables too, if they are special
▪ power supplies
- take media
- do not forget printed documents
▪ hand written, reminders etc.
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
- physically protect
the objects
▪ for transport ▪ for storage ▪ prepare instructions for transport
- label every object
uniquely
▪ the very object ▪ and its packaging
- prepare all necessary
documentation for takeover of evidence
▪ and acquire all signatures
9
- do not turn off devices which are turned on gasite
▪ du not turn on those which are turned off
- communication devices which have wireless
communication put in Faraday bags
- look around the devices
▪ take all gadgets which could be part of the device
- if you have to turn the device off
▪ first take the photo of the screen ▪ make a list of active applications, visited web sites, …
- if it can be done safely!!!
▪ capture the RAM ▪ take the battery out from portable devices
- when detaching cables
▪ label them, make sketches ▪ and take photos
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
10
- storage and protection must be according to law
- keep separate inventory of stored materials
- copy everything that can be copied
▪ analysis should not be done on original evidence material
- access to stored evidence material
must be under strict surveillance
▪ this pertains to investigator’s notes and reports ▪ keep the access log to stored material
- take special care about parts of devices
that can be detached
▪ each part should be separately labeled and logged
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
11
- acquire the order for analysis
▪ what are we looking for? ▪ which questions do we need to answer?
- perform the forensic analysis
▪ but on copies of data
- keep precise log
▪ what was investigated ▪ why ▪ who performed investigation ▪ how, with what ▪ what did they find
- data
- conclusions
- prepare data for report
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
12
- question or hypothesis
- the object (which material) will be analyzed
- which method
- which tools
- when (from– to)
- results
- conclusion/finding
- next step - proposal
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
- Investigation
- Expert
- Date
- Place
- ID of analysis
- ….
13
- who (all) will receive reports & what are their questions
- separate report for different recipients
▪ based on gathered documentation and ▪ results of analyses
- Important! Forensic expert is not the judge.
Does not define the responsibility.
▪ but merely states facts & offers expert interpretation ▪ in ideal case, the forensic expert merely answers the questions
- take care about the level of confidentiality
▪ mark confidentiality in appropriate manner
- get ready for oral presentation of findings and or
▪ questions ▪ counter-arguments
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
Keep detailed log about given answers
14
- Case description
- Broader assignment
▪ order/warrant
- Expert opinion
▪ answer to question #1 ▪ answer to question # 2 ▪ … ▪ answer to question # N
- Argumentation
▪ by each question ▪ short
- Findings od analyses
▪ results ▪ by each question/analysis
- Forensic team
▪ their competences
- Methods od work
- Addenda
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures
- the report is result of your entire work
- thers do not seee te rest
- any other expert should understand it
- and reach same conclusions
15
- when you are sure there will be no more
investigation
▪ return all evidence material ▪ archive all documentation
- lists
- minutes
- logs
- reports
▪ in special cases – destroy all work materials
- and have the proof you did it
21.12.2018. 2015-2017 (c) P.Pale: Računalna forenzika - Procedures