Chapter 2. Overview of Digital Forensics

Information in this chapter:

• Digital forensics
• A little computer history
• A brief history of computer forensics
• Computer forensics becomes digital forensics
In this chapter, we discuss a short history of personal computers, computer forensics, and the basic tenets of digital forensics. Digital forensics includes the acquisition, preservation, analysis, and presentation of electronic evidence, no matter where it may come from. This chapter gives a brief overview of the four areas of digital forensics and explains the importance of each.
Keywords
Computer Forensics, Acquisition, Preservation, Analysis, Reporting, Presentation.

Introduction

The widespread adoption of personal computers beginning in the early 1980s led to the need for computer forensics. Digital forensics began as computer forensics in the mid 1980s with the creation of the Federal Bureau of Investigation’s Magnetic Media Program. In this chapter, we give a brief overview of the rise of the personal computer and the creation of computer forensics. We also look at how computer forensics became digital forensics and provide an introduction into what digital forensics is.

2.1. Digital forensics

Digital forensics is the application of forensic science to electronic evidence in a legal matter.
While there are many different subdisciplines and many types of devices, communication, and storage methods around today, the basic tenets of digital forensics apply to all of them.
These tenets encompass four areas:
• Acquisition
• Preservation
• Analysis
• Presentation
Each of these areas includes specific forensic processes and procedures.

2.1.1. Acquisition

Acquisition is the process of actually collecting electronic data. For example, seizing a computer at a crime scene or taking custody of a computer in a civil suit is part of the acquisition process. Making a forensic copy of a computer hard drive is also part of the acquisition process. In the digital forensics field, examiners refer to making these forensic copies of evidence as “acquiring” a hard drive rather than copying a hard drive. This is to avoid the confusion that could be caused by using the term “copy,” since making a copy of something does not imply that the copy was made in a forensically sound manner.
Acquisition is the first step in the forensic process and is critical to ensure the integrity of the evidence. As acquisition is the first contact with the evidence, it is the point where evidence is most likely to be damaged or destroyed. Simply turning on a computer can lead to the modification of hundreds of evidentiary items including files, date and time stamps, introduction of new Internet history, and the destruction of files that could be recovered from areas of the hard drive that are in the area of unallocated space (see the section “Deleted File Recovery” in Chapter 29).

2.1.2. Preservation

As evidence is collected, it must be preserved in a state that is defendable in court. Preservation is the process of creating a chain of custody that begins prior to collection and ends when evidence is released to the owner or destroyed. Any break in the chain of custody can lead to questions about the validity of the evidence. Additionally, preservation includes keeping the evidence safe from intentional destruction by malicious persons or accidental modification by untrained personnel.
A chain of custody log best illustrates an example of preservation. Chain of custody logs should include every instance that a piece of evidence has been touched, including the initial collection of the device storing the evidence, the transport and storage of the evidence, and any time the evidence is checked out for handling by forensic examiners or other personnel. At no time should there be a break in this chain.

2.1.3. Analysis

Analysis is the process of locating and collecting evidentiary items from evidence that has been collected in a case. In a case involving spousal infidelity, the evidence that must be located can include e-mails and chat logs between the spouse and the paramour. In a fraud case, financial records would be the target of the analysis, as well as the possible deletion of records involving financial transactions. In a child pornography case, locating contraband pictures and movies would be the target of the examination. Each case is unique in this respect as the circumstances surrounding each case can vary widely, not only in the evidence being sought, but also in the approach used to perform the analysis. The analysis portion is also the area where the individual skills, tools used, and the training of the forensic examiner have the greatest impact on the outcome of the examination. For information on forensic tools used by examiners, see Chapter 5. Considering that electronic evidence appears in so many forms and comes from so many disparate locations and devices, the training and experience of the examiner begins to have an ever-greater impact on the success of the examination.
The analysis phase is also where the greatest disparity begins to become a factor between the skills and approach of a “computer expert” and those of a computer or digital forensics expert. While a computer expert may understand many aspects of computer usage and data, a properly trained forensic expert will be well versed in recovering data as well as in proper examination techniques.
Analysis of digital evidence is more than just determining whether something like a file or e-mail message exists on a hard drive. It also includes finding out how that file or e-mail message got on the hard drive, and if possible, who put the file or message on the hard drive.

2.1.4. Presentation

Presentation of the examiner’s findings is the last step in the process of forensic analysis of electronic evidence. This includes not only the written findings or forensic report, but also the creation of affidavits, depositions of experts, and court testimony. There are no hard and fast rules or standards for reporting the results of an examination. Each agency or private entity may have its own particular guidelines for reporting. However, forensic examination reports should be written clearly, concisely, and accurately, explaining what was examined, the tools used for the examination, the processes used by the examiner, and the results of that examination. The report should also include the collection methods used, including specific steps taken to protect and preserve the original evidence and how the verification of the evidence was performed.
In general, a digital forensics report should include
• Background and experience of the examiner
• Tools used in the examination
• Methods used to verify the data
• Processes used to recover and extract the data
• Statement of what the examiner found
• Actual data recovered to support the statement of findings.

2.2. A little computer history

In the early days of personal computing, there were no networks accessible to the general public, and very limited storage options. The original personal computers to reach an audience outside of the pure hobbyist realm were the IBM Personal Computer, the Apple computer, the Commodore PET, and the Tandy TRS-80.
However, big businesses were still using mainframe computers and dumb terminals for their business applications such as word processing and financial tracking. This would soon change.
The IBM PC, introduced in 1981, would eventually become the de facto standard for all personal computers, resulting in the term “IBM compatible.” With the introduction of Lotus 1-2-3, a financial spreadsheet program, IBM personal computers began to make inroads into the corporate computing world, driven by the desire of financial managers to have the ability to create electronic spreadsheets. Lotus 1-2-3 became the “super app” that drove sales of IBM personal computers and had a huge impact on the growth of the personal computer industry. As the demand for personal computers grew, companies like Compaq began to produce “IBM clones,” making inroads into the market dominated by IBM. To combat this, IBM introduced Micro Channel Architecture (MCA) in an effort to force companies to purchase IBM parts in order to be compatible. However, the effort failed, and IBM soon returned to building personal computers using a common architecture based on industry standards.
Today, all computer hardware is based on well-known industry standards. The computing platform chosen by consumers today is driven more by aesthetics and specific software preferences than any proprietary hardware platform. However, the dominance of the Microsoft operating system on corporate desktops has resulted in the majority of businesses choosing Microsoft Windows for compatibility with the vast number of vertical market software applications built on the Microsoft Windows platform. Vertical market software is software created for a specific group of users, such as a loan management software application, a document management application, or an automotive shop management application.
Today these applications have been extended beyond the personal computer to portable devices. The popularity of smart phones and pad computers like the Apple iPad and Motorola Xoom has revolutionized the way people work with business documents and e-mail in what amounts to a handheld portable office.

2.3. A brief history of computer forensics

In 1984, the FBI created the Magnetic Media Program, which initially only handled three cases in its first year. The Magnetic Media Program later became the FBI Computer Analysis and Response Team (CART) program. At the end of 2009, the FBI had fourteen Regional Computer Forensic Labs (RCFLs) in operation, with two more under construction.
In addition to the FBI CART program, there are other law enforcement programs in operation today that deal with computer forensics. One example is the Internet Crimes Against Children (ICAC) task force, which trains local and federal law enforcement agents to investigate Internet predators and perform computer forensics. Another is Operation Fairplay, a program that provides software and trains law enforcement agents to investigate peer-to-peer file sharing for child pornography cases.
In recent years, there has been an explosion of growth in computer forensics in the private sector as well. This is primarily driven by electronic discovery in civil suits and internal investigations into employee conduct, and the prevention of data loss by internal and external agents. In addition, companies must protect their customers’ private data stored on their servers by maintaining constant vigilance against attacks both from within and outside the organization. A breach by hackers into a corporate network poses a great financial and reputation risk to any company that is a victim of such an attack. A case recently in the news was the attack on Sony’s PlayStation Network and their other major gaming network maintained by Sony Online Entertainment. In this case, the private information of millions of subscribers to these game networks was stolen, putting this information at risk of being used for nefarious purposes by the hackers who breached these networks.

2.4. Computer forensics becomes digital forensics

As technology has progressed, the field of computer forensics has been forced to expand to cover other types of electronic data, created by a myriad of devices.
Originally, computer forensics examiners only had to be concerned with what evidence might reside on a single computer or floppy disk. With the advent of networked personal computers, and especially with the connection of those networked computers to the outside world, and to each other over the Internet, the field of network forensics or incident response has grown to be the largest area of digital forensics. Network forensics is the process of figuring out how a network has been attacked, stopping the attack, and attempting to locate the attacker. The incident response team that performs the network forensics will examine routers, firewalls, server logs, and other data to attempt to remediate and prosecute network intrusions. Governments and corporations spend billions of dollars each year attempting to protect networks from outside intruders, and when that fails, remediating the damage done when someone breaches a network and causes damage or steals information. As more devices have come online, new areas of digital forensics have also come online, such as cell phone forensics. It is no longer possible to look at a piece of electronic evidence in isolation, where the assumption is that the sum total of the data resides in one place, on a single computer or floppy disk.
With the war on terror, there has been a tremendous increase in demand for trained computer forensics personnel in the military who are able to properly seize and analyze computer data in the field and in the lab.
The tremendous growth of the Internet has also increased the demand for trained network and computer forensics personnel to assist in responding to attacks on corporate and government networks, cyber-warfare, and cyber-defense activities.

Summary

In this chapter, we learned a brief history of the personal computer, computer forensics, and the transformation of computer forensics into digital forensics. We also looked at what digital forensics is and introduced the four areas of digital forensics: acquisition, preservation, analysis, and reporting.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset