Sop of Digital Evidence Collection PDF
Sop of Digital Evidence Collection PDF
Sop of Digital Evidence Collection PDF
Version 1.0
1st July 2013
The purpose of this Standard Operating Procedure (SOP) is to provide generic guidance and suggested
process on collection of digital evidence. It was developed based on input from the Technical Working
Group, compilation of best available information, knowledge and field experience to provide guidance
to Malaysian law enforcement officers so that digital evidence collection activities are performed in a
consistent and standardized manner.
This SOP should be used as a reference. However, differences may exist between the procedures
referenced in this SOP and what is appropriate under field-specific conditions.
For the avoidance of doubt, the use of this SOP shall not in any way create, or be relied upon to give rise
to, any right in the user which may be enforceable at law in any matter whether civil or criminal.
Any products, manufacturers or organisations referenced in this SOP are presented for informational
purposes only and do not in any way constitute approval or endorsement by CyberSecurity Malaysia.
ii PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
In September 2010, a technical working group was formed with the aim of discussing the best way of preserving
digital evidence at crime scene as well as to develop a standard process among the local law enforcement
agencies. The working group successfully delivered a mutual understanding among the law enforcement agencies
on investigating digital evidence related matters; however, it was never made into final draft.
This SOP is an enhancement from the drafted version developed then. The following names have not only made
the technical working group possible, but have also contributed knowledge and experience in investigating digital
related crimes.
Table of Content
Contents
INTRODUCTION....................................................................................................................................................5
DIGITAL FORENSIC METHODOLOGY.................................................................................................................5
A. IDENTIFICATION...............................................................................................................................................6
B. COLLECTION....................................................................................................................................................8
B1. PREPARE...................................................................................................................................................9
B2. CONDUCT................................................................................................................................................10
B3. COLLECT.................................................................................................................................................11
B4. TRANSPORT............................................................................................................................................12
C. ANALYSIS........................................................................................................................................................13
E. PRESERVATION.............................................................................................................................................14
SPECIAL CONSIDERATION FOR DIGITAL EVIDENCE COLLECTION.............................................................15
CAN I PRE-ANALYZE EVIDENCE BEFORE I SEIZE/MAKE FORENSIC COPY? ….….…..….….…..….….…. 15
CAN I TENDER A COPY OF DIGITAL EVIDENCE INTO COURT?.........................….….…..….….…..….….….16
iv PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
INTRODUCTION
Digital evidence collection must be handled by following a proper process. This is important to ensure
that maximum data can be preserved and that the integrity of the exhibit is intact. Understanding the
digital forensic methodology enables the Digital Evidence First Responder (DEFR) to understand the
holistic view of conducting forensic on digital evidence.
A. IDENTIFICATION
B. COLLECTION
C. ANALYSIS
D. PRESENTATION
E. PRESERVATION
The methodology involves with 5 basic phases; Identification, Collection, Analysis, Presentation and
Preservation. Most of the time, DEFR shall involve with only three (3) phases of the Digital Forensics
Methodology; which are the Identification, Collection and Preservation phase. The next topic shall
describe the process involves in handling the digital evidence.
PUBLIC RELEASE 5
CyberSecurity Malaysia SOP of Digital Evidence Collection
A. IDENTIFICATION
When a case involving digital device occurs, DEFR shall discuss with team members of the best strategy
to gather the evidence prior to set off to the premise. The DEFR shall come as early as possible to the
premise to preserve the evidence.
This phase, the Identification, is a phase where DEFR collects some preliminary information prior to
collecting the evidence. Preliminary information may help DEFR to strategize the process of collecting
the evidence, especially if the incidents happen at several locations.
In most cases, evidence that need to be collected varies from one case to another. For example, a web
related case may involve with collection of the web server and the database server, whereas a document
counterfeiting case may involve with the collection of a personal computer.
The following lists some of the questions that may guide DEFR in establishing the facts of the case:
WHAT • What types of crime is it? (Financial fraud, harassment, cyber terrorism, bribery)
• What are the resources needed? (People, equipment, budget)
• What are the needed documents? (Warrant, Seizure list, Chain of custody form)
• What is the IP address?
• Who owns the IP address?
6 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
The following flow chart detailed out the process involves in Identification phase.
A. IDENTIFICATION
DEFR must be aware that some of the information gathered during this phase might be tendered into
court, for example, the web page that contained harassment messages and the Whois information.
Thus, it is necessary that all information gathered during this phase be documented or preserved.
Preserving the information is also important in order to conduct a smooth storyline to stakeholders. The
preserved information or the written document is best to be printed out, signed and dated by the person
who produces it.
PUBLIC RELEASE 7
CyberSecurity Malaysia SOP of Digital Evidence Collection
B. COLLECTION
The next phase is to set off to the premise to collect the evidence. During collection phase, there are
several steps that a DEFR may follow. The process of collection is summarized in the following flow
chart:
B. COLLECTION
B1. PREPARE
B2. CONDUCT
B3. COLLECT
B4. TRANSPORT
The detailed explanation of the process of collection is described in the following paragraph.
8 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
B1. PREPARE
The following flow chart explains in detail the process involves in Prepare phase.
PUBLIC RELEASE 9
CyberSecurity Malaysia SOP of Digital Evidence Collection
B2. CONDUCT
The following flow chart explains in detail the process involves in Conduct phase.
10 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
B3. COLLECT
The following flow chart explains in detail the process involves in Collect phase.
Computer Appendix C
Mobile devices Appendix D
CCTV Appendix E
Social Media & Internet Applications Appendix F
Server & Cloud Computing Appendix G
PUBLIC RELEASE 11
CyberSecurity Malaysia SOP of Digital Evidence Collection
B4. TRANSPORT
The following flow chart explains in detail the process involves in Transport phase.
• This process takes place after the evidence has been properly
Package labeled.
• The evidence must then be packaged with anti static bag, or other
materials such as bubble wrapper or plastic bag.
• DEFR must ensure that the packaging:
-- Able to detect any attempt to gain access to the evidence.
Refer Appendix I.
-- Does not damage the evidence; ie. Water-resistant.
• Both party; DEFR and the occupier, sign the Seizure List. Please
refer Appendix J.
• The chain of custody now starts here.
• Any transfer from one officer to another shall be recorded in Chain
of Custody Form. Please refer Appendix K.
12 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
C. ANALYSIS
Table 2: Useful Information that may help analyst to conduct forensic analysis
PUBLIC RELEASE 13
CyberSecurity Malaysia SOP of Digital Evidence Collection
E. PRESERVATION
Preservation is process where evidence is taken care to ensure that it is not tampered, chain of custody
is not broken and integrity is intact. DEFR must ensure that evidence is properly preserved from the
point of taken, to the point of it is handed over to other authorized personnel. DEFR must also be able to
demonstrate that evidence is properly preserved to stakeholders. The methods are:
Evidence Preservation
• Items to be documented:
-- Evidence’s Serial number
-- Manufacturer & Model
-- Storage size (if applicable)
-- Any defects from normal condition, example: keyboard missing ‘k’ letter
-- MAC address (if applicable)
-- Hash value (if applicable)
• This can all be written down in the Seizure List, which is signed by the occupier and
the DEFR. Refer Appendix J.
• Name and signature of each person, including internal staff, whom take possession or
transport the evidence.
• Date of transfer.
• Evidence’s label or serial number.
• Refer to Appendix J for sample of chain of custody.
14 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
For that reason, DEFR may browse the data in the computer. DEFR must aware that THIS ACTION
MAY TAMPER THE EVIDENCE.
Evidence Pre-Analysis
What is it?
• Browsing through the digital evidence to ensure the relevant data or file is in the computer. This
is done in order to eliminate the need to seize unrelated evidence.
• Before you start browsing into files, write down the device’s offset time.
• Browse into files. Be caution NOT to EDIT anything, including RESAVING it.
• If you found the related file, and decide to seize the computer, follow First Responder Flow
Chart for Computer.
• Or, if the situation does not permit you to seize the computer, follow First Responder Flow
Chart for Server & Cloud Computing.
• In all steps taken, DEFR must cautiously calculate his steps, and ensure that his actions shall
cause the least alterations to the data.
PUBLIC RELEASE 15
CyberSecurity Malaysia SOP of Digital Evidence Collection
There are some situations where DEFR could not, or not permitted to seize the evidence and bring back
to laboratory, for the following reasons:
1. Evidence is too bulky; for example a server or a car with an embedded GPS.
2. Seizing the evidence will disrupt normal operations/business; for example CCTV system at a petrol
station, or a server containing websites of five(5) different companies not related to the case.
3. DEFR is not authorized to seize the evidence.
For that reason, DEFR is allowed to make a forensic copy of the evidence. Depending on situations,
DEFR may create image of the evidence, download relevant files, or use manual method (print screen/
photograph related data).
How does this copy of evidence be treated? Before it is explained further, DEFR need to understand the
magnitude of evidence.
Working Copy
16 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 17
CyberSecurity Malaysia SOP of Digital Evidence Collection
Can I tender evidence in a logical form into court? How should I handle logical
form evidence?
Technically, digital evidence can either be in a physical form or logical form. Example of evidence in
physical form is a mobile phone. In this case, the mobile phone will be tendered in court. Example of
evidence in a logical form is when related files are downloaded from a server into a storage device. This
storage device, however, is not the real evidence; rather it is just a container that is used to store the
real evidence.
Yes, DEFR can still tender evidence in logical form into the court. For this purpose, DEFR must store this
logical form evidence into a storage device.
There are some requirements that need to be met in order to ensure a smooth process of tendering this
evidence. This storage device shall be treated as ORIGINAL SOURCE. Please follow the Flow Chart 3:
Improved Digital Evidence Handling.
18 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
REFERENCE
ISO/IEC 27037:2013, Guidelines for Identification, Collection, Acquisition and Preservation of digital
evidence, International Standard Organization.
Forensic Examination of Digital Evidence: A Guide for Law Enforcement, National Institute of Justice,
Apr. 2004, https://www.ncjrs.gov/pdffiles1/nij/199408.pdf, viewed on 24th June 2013.
Good Practice Guide for Computer-Based Electronic Evidence, Official release version, Association of
Chief Police Officers’ (ACPO), http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_
evidence.pdf , viewed on 25th June 2013.
ISO/IEC 17025:2005, General Requirements for the Competence of Testing and Calibration Laboratories,
1st Revision, 2005, International Standard Organization.
Supplemental Requirements for the Accreditation of Forensic Science Testing Laboratories, 2011
edition, ASCLD/LAB-International, 2010.
SWGDE Best Practices for Computer Forensics, Scientific Working Group for Digital Evidence, Version
2.1, https://www.swgde.org/documents/Current%20Documents/2006-07-19%20SWGDE%20Best%20
Practices%20for%20Computer%20Forensics%20v2.1 , viewed on 23rd June 2013.
PUBLIC RELEASE 19
CyberSecurity Malaysia SOP of Digital Evidence Collection
IDENTIFICATION
Gather information
Preserve information
COLLECTION
Prepare document
Prepare equipment
Identify evidence
Document premise
Discuss strategy
Label evidence
Photograph evidence
Transport evidence
ANALYSIS
PRESENTATION
PRESERVATION
20 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 21
CyberSecurity Malaysia SOP of Digital Evidence Collection
22 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 23
CyberSecurity Malaysia SOP of Digital Evidence Collection
24 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
APPENDIX F: First Responder Flow Chart for Social Media & Inter-
net Application
PUBLIC RELEASE 25
CyberSecurity Malaysia SOP of Digital Evidence Collection
APPENDIX G: First Responder Flow Chart for Server & Cloud Com-
puting
26 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 27
CyberSecurity Malaysia SOP of Digital Evidence Collection
Sample 1
Sample 2
28 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 29
CyberSecurity Malaysia SOP of Digital Evidence Collection
Sample 1
Sample 2
30 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
APPENDIX L: WHAT-IS
2. Type cmd in blank box. For XP, click Run and then type cmd.
4. Look for IPv4 Address value. The location of the IPv4 value depends on types of network connection,
as below:
Network type IP address is displayed under column…
Cable Ethernet adapter Local Area Connection
Wireless Ethernet adapter Wireless Network Connection
Mobile broadband PPP adapter
5. Write down the numbers next to IP Address V4. Example of an IP address: 192.10.10.0.
PUBLIC RELEASE 31
CyberSecurity Malaysia SOP of Digital Evidence Collection
Windows 7
adfasdf
Windows XP
32 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
PUBLIC RELEASE 33
CyberSecurity Malaysia SOP of Digital Evidence Collection
34 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
How to know if Machine is Networked & How to Isolate Machine from Network?
Machine may be connected to network if;
1. Network cable is connected to the machine. Pull the cable off.
2. Wireless connection is visible on the screen. Click on the wireless icon and turn it off.
3. Mobile broadband is connected to the machine. Pull the device off.
Or when you see a large size file, possibly with unknown extension, or without an extension at all
appears in the computer.
Large size
No identification of type of file. Just
plain ‘File’.
PUBLIC RELEASE 35
CyberSecurity Malaysia SOP of Digital Evidence Collection
Mac
Click Apple logo, select About This Mac.
Click Storage
If the computer is using SSD, it will
display ‘Solid State’.
36 PUBLIC RELEASE
CyberSecurity Malaysia SOP of Digital Evidence Collection
GLOSSARY
Digital Evidence Person who is authorized, trained and qualified to act first at an incident
First Responder scene in performing digital evidence collection and acquisition with the
(DEFR) responsibility for handling that evidence. [ISO/IEC 27037].
Primary evidence means the document itself produced for the inspection
of the court. [Evidence Act 1950, Section 62].
Primary Source A term refers by the digital forensics community. Refers to the first
instance in which an image is recorded onto any media that is a
separate, identifiable object. Examples include a digital image recorded
on a flash card or digital image downloaded from the Internet. [SWGDE].
Original Source A term refers by the digital forensics community. An accurate and
complete replica of the primary image, irrespective of media. For film
and analog video, the primary image is the original image. [SWGDE].
Working Copy A term refers by the digital forensics community. A copy or duplicate of
a recording or data that can be used for subsequent processing and/or
analysis. [SWGDE].
PUBLIC RELEASE 37
Corporate Office:
CyberSecurity Malaysia, Level 5, Sapura@Mines, No 7, Jalan Tasik, The Mines Resort City,
43300 Seri Kembangan, Selangor Darul Ehsan | Tel : +603 8992 6888 | Fax : +603 8992 6841
Email: [email protected] | Customer Service Hotline: 1300-88-2999 | www.cybersecurity.my