Eti Chapter 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Emerging Trends in CO and IT (22618)

Unit-4 Digital Evidences

Content
4.1 Digital forensics
● Introduction to digital forensic
● Digital forensics investigation process
● Models of Digital Forensic Investigation –
o Abstract Digital Forensics Model (ADFM)
o Integrated Digital Investigation Process (IDIP)
o An extended model for cybercrime investigation
4.2 Ethical issues in digital forensic
● General ethical norms for investigators
● Unethical norms for investigation
4.3 Digital Evidences
● Definition of Digital Evidence
● Best Evidence Rule
● Original Evidence
4.4 Characteristics of Digital Evidence
● Locard’s Exchange Principle
● Digital Stream of bits
4.5 Types of Evidence : Illustrative, Electronics, Documented, Explainable, Substantial,
Testimonial
4.6 Challenges in evidence handling
o Authentication of evidence
o Chain of custody
o Evidence validation
4.7 Volatile evidence

4.1 Digital Forensics


4.1.1 Introduction to Digital Forensics
Forensics science is a well-established science that pays vital role in criminal justice
systems. It is applied to both criminal and civil action. Digital forensics sometimes
known as digital forensic science, is a branch of forensic science encompassing the
recovery and investigation of material found in digital devices, often in relation to
computer crime.
Digital forensics includes the identification, recovery, investigation, validation, and
presentation of facts regarding digital evidence found on computers or similar digital
storage media devices.
4.1.2 History of Forensic
1. Field of pc forensics began in 1980s when personal computers became a viable
possibility for the buyer.
Maharashtra State Board of Technical Education P a g e 75 | 151
Emerging Trends in CO and IT (22618)

2. In 1984, an associate Federal Bureau of Investigation program was created,


which was referred to as magnet media program.
3. It is currently referred to as Computer Analysis and Response Team (CART).
4. Michael Anderson, the Father of Computer Forensics, came into limelight during
this period.
5. International Organization on Computer Evidence (IOCE) was formed in 1995.
6. In 1997, the great countries declared that law enforcement personnel should be
trained and equipped to deal with sophisticated crimes.
7. In 1998, INTERPOL Forensic Science symposium was apprehended.
8. In 1999, the FBI CART case load goes beyond 2000 case examining, 17
terabytes of information.
9. In 2000, the first FBI Regional Computer Forensic Laboratory was recognized.
10. In 2003, the FBI CART case load exceeds 6500 cases, examining 782 terabytes
of information.

4.1.3 Rule of Digital Forensics


While performing digital forensics investigation, the investigator should follow the
given rules:
Rule 1. An examination should never be performed on the original media.
Rule 2. A copy is made onto forensically sterile media. New media should
always be used if available.
Rule 3. The copy of the evidence must be an exact, bit-by-bit copy.
(Sometimes referred to as a bit-stream copy).
Rule 4. The computer and the data on it must be protected during the acquisition
of the media to ensure that the data is not modified.
Rule 5. The examination must be conducted in such a way as to prevent any
modification of the evidence.
Rule 6. The chain of custody of all evidence must be clearly maintained to
provide an audit log of whom might have accessed the evidence and at what time.
4.1.4 Definition of Digital Forensics
Digital forensics is a series of steps to uncover and analyze electronic data through
scientific method. Major goal of the process is to duplicate original data and preserve
original evidence and then performing the series of investigation by collecting,
identifying and validating digital information for the purpose of restructuring past
events.
4.1.5 Digital Forensic Investigation
Digital forensic investigation (DFI) is a special type of investigation where the scientific
procedures and techniques used will be allowed to view the result- digital evidence- to
be admissible in a court of law.
4.1.6 Goal of Digital Forensic Investigation:

Maharashtra State Board of Technical Education P a g e 76 | 151


Emerging Trends in CO and IT (22618)

The main objective of computer forensic investigation is to examine digital evidences


and to ensure that they have not been tampered in any manner. To achieve this goal
investigation must be able to handle all below obstacles:
1. Handle and locate a certain amount of valid data from a large amount of files
stored in the computer system.
2. It is viable that the information has been deleted, in such a situation searching
inside the file is worthless.
3. If the files are secured by some passwords, investigators must find a way to read
the protected data in an unauthorized manner.
4. Data may be stored in damaged device but the investigator searches the data in
working devices.
5. Major obstacle is that each and every case is different. Identifying the techniques
and tools will take a long time.
6. The digital data found should be protected from being modified. It is very tedious
to prove that data under examination is unaltered.
7. Common procedures for investigation and standard techniques for collecting and
preserving digital evidence are desired.
4.1.7 Models of Digital Forensics:
I. Abstract Digital Forensic Model (ADFM)
Reith, Carr, Gunsh proposed the Abstract Digital Forensic model in 2002.

Identification

Preparation

Approach Strategy

Preservation

Collection

Examination

Analysis

Presentation

Returning Evidence

Fig.4.1: Abstract Digital Forensic Model (ADFM)

Maharashtra State Board of Technical Education P a g e 77 | 151


Emerging Trends in CO and IT (22618)

● Phases of ADFM model are as follows:


1. Identification –it recognizes an incident from indicators and determines its type.
2. Preparation –it involves the preparation of tools, techniques, search warrants
and monitoring authorization and management support
3. Approach strategy –formulating procedures and approach to use in order to
maximize the collection of untainted evidence while minimizing the impact to
the victim
4. Preservation–it involves the isolation, securing and preserving the state of
physical and digital evidence
5. Collection –This is to record the physical scene and duplicate digital evidence
using standardized and accepted procedures
6. Examination –An in-depth systematic search of evidence relating to the
suspected crime. This focuses on identifying and locating potential evidence.
7. Analysis –This determines importance and probative value to the case of the
examined product
8. Presentation -Summary and explanation of conclusion
9. Returning Evidence –Physical and digital property returned to proper owner

II. Integrated Digital Investigation Process (IDIP)


DFPM along with5 groups and 17 phases are proposed by Carrier and Safford.
DFPM is named the Integrated Digital Investigation Process (IDIP). The groups are
indexed as shown in following Figure 2.3.

Physical
Readiness Deployment Crime Review
Investigation

Digital
Crime
Investigatio

Fig. 4.2: An Integrated Digital Investigation Process


● The phases of IDIP are as follows:
1. Readiness phase The goal of this phase is to ensure that the operations and
infrastructure are able to fully support an investigation. It includes two phases:
- Operations Readiness phase
- Infrastructure Readiness phase
2. Deployment phase The purpose is to provide a mechanism for an incident to be
detected and confirmed. It includes two phases:

Maharashtra State Board of Technical Education P a g e 78 | 151


Emerging Trends in CO and IT (22618)

● Detection and Notification phase; where the incident is detected and then
appropriate people notified.
● Confirmation and Authorization phase; which confirms the incident and
obtains authorization for legal approval to carry out a search warrant.

3. Physical Crime Investigation phase The goal of these phases is to collect and
analyze the physical evidence and reconstruct the actions that took place during
the incident.
It includes six phases:
● Preservation phase; which seeks to preserve the crime scene so that evidence can
be later identified and collected by personnel trained in digital evidence
identification.
● Survey phase; that requires an investigator to walk through the physical crime
scene and identify pieces of physical evidence.
● Documentation phase; which involves taking photographs, sketches, and videos
of the crime scene and the physical evidence. The goal is to capture as much
information as possible so that the layout and important details of the crime scene
are preserved and recorded.
● Search and collection phase; that entails an in-depth search and collection of the
scene is performed so that additional physical evidence is identified and hence
paving way for a digital crime investigation to begin
● Reconstruction phase; which involves organizing the results from the analysis
done and using them to develop a theory for the incident.
● Presentation phase; that presents the physical and digital evidence to a court or
corporate management.

4. Digital Crime Investigation phaseThe goal is to collect and analyze the digital
evidence that was obtained from the physical investigation phase and through
any other future means. It includes similar phases as the Physical Investigation
phases, although the primary focus is on the digital evidence. The six phases are:
● Preservation phase; which preserves the digital crime scene so that evidence
can later be synchronized and analyzed for further evidence.
● Survey phase; whereby the investigator transfers the relevant data from a
venue out of physical or administrative control of the investigator to a
controlled location.
● Documentation phase; which involves properly documenting the digital
evidence when it is found. This information is helpful in the presentation
phase.
● Search and collection phase; whereby an in-depth analysis of the digital
evidence is performed. Software tools are used to reveal hidden, deleted,
swapped and corrupted files that were used including the dates, duration, log

Maharashtra State Board of Technical Education P a g e 79 | 151


Emerging Trends in CO and IT (22618)

file etc. Low-level time lining is performed to trace a user’s activities and
identity.
● Reconstruction phase; which includes putting the pieces of a digital puzzle
together, and developing investigative hypotheses.
● Presentation phase; that involves presenting the digital evidence that was
found to the physical investigative team.
It is noteworthy that this DFPM facilitates concurrent execution of physical and
digital investigation.
5. Review phase this entails a review of the whole investigation and identifies areas
of improvement. The IDIP model does well at illustrating the forensic process,
and also conforms to the cyber terrorism capabilities which require a digital
investigation to address issues of data protection, data acquisition, imaging,
extraction, interrogation, ingestion/normalization, analysis and reporting. It also
highlights the reconstruction of the events that led to the incident and emphasizes
reviewing the whole task, hence ultimately building a mechanism for quicker
forensic examinations.
III. An Extended Model of Cybercrime Investigation (EMCI)

The DFPM proposed by S. O. Ciardhuain- an Extended Model of Cybercrime


Investigation (EMCI) - is more likely the most comprehensive till date.
● Phases of EMCI: The EMCI follows the waterfall model as every activity
occurs in sequence. The sequence of examine, hypothesis, present, and
prove/defend are bound to be repeated as the evidence heap increases during the
investigation.
1. Awareness is the phase during which the investigators are informed that a crime
has taken place; the crime is reported to some authority. An intrusion detection
system may also trigger such awareness.
2. Authorization is the stage where the nature of investigation has been identified
and the unplanned authorization may be required to proceed and the
authorization is obtained internally or externally.
3. Planning is impacted by information from which and outside the organization
that will affect the investigation. Internal factors are the organization policies,
procedures, and former investigative knowledge while outside factors consist of
legal and other requirements not known by the investigators.

Maharashtra State Board of Technical Education P a g e 80 | 151


Emerging Trends in CO and IT (22618)

Storage of
Awareness Evidence

Authorization Examination
of evidence

Planning Hypothesis

Notification
Presentation
of hypothesis

Search for
identify evidence Proof/
Defense of
hypothesis
Collection
of
evidence
Dissemination
of information
Transport
of Evidence

Figure 4.3: An Extended Model of Cybercrime Investigation


4.2 Ethical issues in Digital Forensic
Ethics in the digital forensic field can be defined as a set of moral principles that regulate
the use of computers. Ethical decision making in digital forensic work comprises of one
or more of the following:
1. Honesty towards the investigation
2. Prudence means carefully handling the digital evidences
3. Compliance with the law and professional norms.
4.2.1 General ethical norms for investigator
Investigator should satisfy the following points:
1. Should contribute to the society and human being
2. Should avoid harm to others
3. Should be honest and trustworthy
4. Should be fair and take action not to discriminate
5. Should honor property rights, including copyrights and patents
6. Should give proper credit to intellectual property
Maharashtra State Board of Technical Education P a g e 81 | 151
Emerging Trends in CO and IT (22618)

7. Should respect the privacy of others


8. Should honor confidentiality
4.2.2 Unethical norms for Digital Forensic Investigation
Investigator should not:
1. Uphold any relevant evidence
2. Declare any confidential matters or knowledge
3. Express an opinion on the guilt or innocence belonging to any party
4. Engage or involve in any kind of unethical or illegal conduct
5. Deliberately or knowingly undertake an assignment beyond him or her capability
6. Distort or falsify education, training, credentials
7. Display bias or prejudice in findings or observation
8. Exceed or outpace authorization in conducting examination
4.3 Digital Evidences:
The field of computer security includes events that provide a successful courtroom
experience, which are both worthwhile and satisfactory. Investigation of a computer
security incident leads to legal proceeding, such as court proceeding, where the digital
evidence and documents obtained are likely used as exhibits in the trial.
To meet the requirements of the judging body and to withstand or face any challenges,
it is essential to follow the evidence-handling procedure. Also, it is necessary to ensure
that the evidence-handling procedures chosen are not difficult to implement at your
organization as this can sometimes become an overhead for an organization.
While investigating a computer security incident, we are sometimes unsure and
indecisive whether an item(viz. a chip, floppy disk, etc)should be considered as an
evidence or an attachment or an addendum.
Digital devices are everywhere in today’s world, helping people communicate locally
and globally with ease. Most people immediately think of computers, cell phones and
the Internet as the only sources for digital evidence, but any piece of technology that
processes information can be used in a criminal way. For example, hand-held games
can carry encoded messages between criminals and even newer household appliances,
such as a refrigerator with a built-in TV, could be used to store, view and share illegal
images. The important thing to know is that responders need to be able to recognize and
properly seize potential digital evidence.
4.3.1 Digital Evidences: (Electronic evidence)
● Evidence: Any information that can be confident or trusted and can prove
something related to a case in trial that is, indicating that a certain substance or
condition is present.
● Relevant Evidence: An information which has a positive impact on the action
occurred, such as the information supporting an incident.

Maharashtra State Board of Technical Education P a g e 82 | 151


Emerging Trends in CO and IT (22618)

● Digital Evidence: Digital evidence is any information or data that can be


confident or trusted and can prove something related to a case trial, that is,
indicating that a certain substance or condition is present. It is safe to use to use
such information as evidence during an investigation.

Digital evidence or Electronic evidence is any probative information stored or


transmitted in digital form that a party to a court case may use at trial. Before accepting
digital evidence a court will determine if the evidence is relevant, whether it is authentic,
if it is hearsay and whether a copy is acceptable or the original is required.
Digital evidence is also defined as information and data of value to an investigation that
is stored on, received or transmitted by an electronic device. This evidence can be
acquired when electronic devices are seized and secured for examination. Digital
evidence:
● Is latent (hidden), like fingerprints or DNA evidence
● Crosses jurisdictional borders quickly and easily
● Can be altered, damaged or destroyed with little effort
● Can be time sensitive

There are many sources of digital evidence; the topic is divided into three major forensic
categories of devices where evidence can be found: Internet-based, stand-alone
computers or devices, and mobile devices. These areas tend to have different evidence-
gathering processes, tools and concerns, and different types of crimes tend to lend
themselves to one device or the other.
Some of the popular electronic devices which are potential digital evidence are: HDD,
CD/DVD media, backup tapes, USB drive, biometric scanner, digital camera, smart
phone, smart card, PDA, etc.

4.3.2 Forms of digital evidence: Text message, emails, pictures, videos and internet
searches are the most common types of Digital evidences.
The digital evidence is used to establish a credible link between the attacker,
victim, and the crime scene. Some of the information stored in the victim’s system can
be potential digital evidence, such as IP address, system log-in & remote log-in details,
browsing history, log files, emails, images, etc.

Digital Evidences may be in the form:


● Email Messages (may be deleted one also)
● Office file
● Deleted files of all kinds
● Encrypted file
● Compressed files
● Temp files
● Recycle Bin
Maharashtra State Board of Technical Education P a g e 83 | 151
Emerging Trends in CO and IT (22618)

● Web History
● Cache files
● Cookies
● Registry
● Unallocated Space
● Slack Space
● Web/E-Mail server access Logs
● Domain access Logs

4.3.3 Best Evidence Rule:


The original or true writing or recording must be confessed in court to prove its contents
without any expectations. An original copy of the document is considered as superior
evidence.
One of the rules states that if evidence is readable by sight or reflects the data accurately,
such as any printout or data stored in a computer or similar devices or any other output,
it is considered as "original".
It states that multiple copies of electronic files may be a part of the "original" or
equivalent to the "original". The collected electronic evidence is mostly transferred to
different media. Hence, many computer security professionals are dependent on this
rule.
Best Evidence: The most complete copy or a copy which includes all necessary parts
of evidence, which is closely related to the original evidence.
Example-A client has a copy of the original evidence media.
The "Best Evidence Rule" says that an original writing must be offered as evidence
unless it is unavailable, in which case other evidence, like copies, notes, or other
testimony can be used. Since the rules concerning evidence on a computer are fairly
reasonable (what you can see on the monitor is what the computer contains, computer
printouts are best evidence) computer records and records obtained from a computer are
best evidence.
4.3.4 Original Evidence:
The procedure adopted to deal with a situation or case takes it outside the control of the
client/victim. A case with proper diligence or a case with persistence work will end up
in a judicial proceeding, and we will handle the evidences accordingly.
For this purpose original evidence as the truth or real (original) copy of the evidence
media which is given by victim/client.
We define best incidence as the most complete copy, which includes all the necessary
parts of the evidence that are closely related to the original evidence. It is also called as
duplication of the evidence media. There should be an evidence protector which will
Maharashtra State Board of Technical Education P a g e 84 | 151
Emerging Trends in CO and IT (22618)

store either the best evidence or original evidence for every investigation in the evidence
safe.
4.4 Characteristics of Digital Evidence:
Characteristics of digital evidences can help and challenge investigators during an
investigation.The main goals in any investigation are to follow the trails that offenders
leave during the commission of a crime and to tie perpetrators to the victims and crime
scenes. Although witnesses may identify a suspect, tangible evidence of an individual’s
involvement is usually more compelling and reliable. Forensic analysts are employed
to uncover compelling links between the offender, victim, and crime scene.

4.4.1 Locard’s Exchange Principle:


According to Edmond Locard’s principle, when two items make contact, there will be
an interchange. The Locard principle is often cited in forensic sciences and is relevant
in digital forensics investigations.
When an incident takes place, a criminal will leave a hint evidence at the scene and
remove a hint evidence from the scene. This alteration is known as the Locard exchange
principle. Many methods have been suggested in conventional forensic sciences to
strongly prosecute criminals. Techniques used consists of blood analysis, DNA
matching and fingerprint verification. These techniques are used to certify the existence
of a suspected person at a physical scene. Based on this principle, Culley suggests that
where there is communication with a computer system, clues will be left.
According to Locard’s Exchange Principle, contact between two items will result in
an exchange. This principle applies to any contact at a crime scene, including between
an offender and victim, between a person with a weapon, and between people and the
crime scene itself. In short, there will always be evidence of the interaction, although in
some cases it may not be detected easily (note that absence of evidence is not evidence
of absence). This transfer occurs in both the physical and digital realms and can provide
links between them as depicted in Figure 1. In the physical world, an offender might
inadvertently leave fingerprints or hair at the scene and take a fiber from the scene. For
instance, in a homicide case the offender may attempt to misdirect investigators by
creating a suicide note on the victim’s computer, and in the process leave fingerprints
on the keyboard. With one such piece of evidence, investigators can demonstrate the
strong possibility that the offender was at the crime scene. With two pieces of evidence
the link between the offender and crime scene becomes stronger and easier to
demonstrate. Digital evidence can reveal communications between suspects and the
victim, online activities at key times, and other information that provides a digital
dimension to the investigation.

Maharashtra State Board of Technical Education P a g e 85 | 151


Emerging Trends in CO and IT (22618)

Figure 4.4:
Evidence transfer in the physical and digital dimensions helps investigators
establish connections between victims, offenders, and crime scenes.
In computer intrusions, the attackers will leave multiple traces of their presence
throughout the environment, including in the fi le systems, registry, system logs, and
network-level logs. Furthermore, the attackers could transfer elements of the crime
scene back with them, such as stolen user passwords or PII in a file or database. Such
evidence can be useful to link an individual to an intrusion.
In an e-mail harassment case, the act of sending threatening messages via a Web-
based e-mail service such as Hotmail can leave a number of traces. The Web browser
used to send messages will store fi les, links, and other information on the sender’s hard
drive along with date-time–related information. Therefore, forensic analysts may find
an abundance of information relating to the sent message on the offender’s hard drive,
including the original message contents. Additionally, investigators may be able to
obtain related information from Hotmail, including Web server access logs, IP
addresses, and possibly the entire message in the sent mail folder of the offender’s e-
mail account.

4.4.2 Digital Stream of Bits :


Cohen refers to digital evidence as a bag of bits, which in turn can be arranged in arrays
to display the information. The information in continuous bits will rarely make scene
and tools are needed to show these structures logically so that it is readable.
The circumstance in which digital evidence are found also helps the investigator during
the inspection. Metadata is used to portray data more specifically and is helpful in
determining the background of digital evidence.
4.5 Types of Evidences:
There are many types of Evidences, each with their own specific or unique
characteristics. Some major types of evidences are :

Maharashtra State Board of Technical Education P a g e 86 | 151


Emerging Trends in CO and IT (22618)

1. Illustrative evidence:Illustrative evidence is also called as demonstrative evidence.


It is generally a representation of an object which is a common form of proof. For
example , photographs , videos , sound recordings , X-rays , maps , drawing , graphs ,
charts , simulations , sculptors , and models.
2. Electronic Evidence:Electronic evidence is nothing but digital evidence. As we
know, the use of digital evidence in trials has greatly increased .The evidences or proof
that can be obtained from the electronic source is called the digital evidence.(viz. Email
, hard drives etc.)
3. Documented Evidence:Documented evidence is same as demonstrative evidence.
However, in documentary evidence , the proof is presented in writing (Viz. Contracts ,
wills , invoices etc.).
4. Explainable Evidence:This type of evidence is typically used in criminal cases in
which it supports the dependent, either partially or totally removing their guilt in the
case.It is also referred to as exculpatory.
5.Substantial Evidence: A proof that is introduced in the form of a physical object,
whether whole or in part, is referred to as substantial evidence. It is also called physical
evidence. Such evidence might consist of dried blood, fingerprint, and DNA samples,
casts of footprints or tries at the scene of crime.
6. Testimonial:It is the kind of evidence spoken by the spectator under the oath , or
written evidence given under the oath by an official declaration that is affidavit. This is
the common forms of evidence in the system.
4.6 Challenges in Evidence handling:
While responding to a computer security incident, a failure to adequately document is
one of the most common mistakes made by computer security professional’s .Analytical
data might never be collected, critical data may be lost or data's origin or meaning may
become unknown. As there are many evidences collected based on technical complexity
is the fact that the properly retrieved evidence requires a paper trial.
Such documentations give an impression of having a certain quality against the natural
instincts of the technical practical knowledge of individuals, who often investigate
computer security incidents.
The challenges faced in the evidence handling must be properly understood by all the
investigators. They should also understand how to meet these challenges. Therefore, it
is essential for every organization to have formal evidence handling procedures that
support computer security investigation. The most difficult task for an evidence handler
is to substantiate the collected evidence at the judicial proceedings. Maintaining the
chain of custody is also necessary. You must have both power and skill to validate your
evidence.

Maharashtra State Board of Technical Education P a g e 87 | 151


Emerging Trends in CO and IT (22618)

4.6.1 Authentication of Evidence:


The laws of many state jurisdictions define data as Written Works and Record keeping.
Before introducing them as evidence, documents and recorded material must be
authenticated.
The evidence that are collected by any person/investigator should be collected using
authenticate methods and techniques because during court proceedings these will
become major evidences to prove the crime. In other words, for providing a piece of
evidence of the testimony, it is necessary to have an authenticated evidence by a
spectator who has a personal knowledge to its origin.
For an evidence to be admissible, it is necessary that it should be authenticated,
otherwise the information cannot be presented to judging only. The matter of record is
that the evidence collected by any person should meet the demand of authentication.
The evidence collected must have some sort of internal documentation that records the
manner of collected information.
4.6.2 Chain of Custody:

What Is the Chain of Custody in Computer Forensics?


The chain of custody in digital forensics can also be referred to as the forensic link, the
paper trail, or the chronological documentation of electronic evidence. It indicates the
collection, sequence of control, transfer, and analysis. It also documents each person
who handled the evidence, the date/time it was collected or transferred, and the purpose
for the transfer.

Why Is It Important to Maintain the Chain of Custody?


It is important to maintain the chain of custody to preserve the integrity of the evidence
and prevent it from contamination, which can alter the state of the evidence. If not
preserved, the evidence presented in court might be challenged and ruled inadmissible.

Importance to the Examiner:

Suppose that, as the examiner, you obtain metadata for a piece of evidence. However,
you are unable to extract meaningful information from it. The fact that there is no
meaningful information within the metadata does not mean that the evidence is
insufficient. The chain of custody in this case helps show where the possible evidence
might lie, where it came from, who created it, and the type of equipment that was
used. That way, if you want to create an exemplar, you can get that equipment, create
the exemplar, and compare it to the evidence to confirm the evidence properties.

Importance to the Court:

It is possible to have the evidence presented in court dismissed if there is a missing link
Maharashtra State Board of Technical Education P a g e 88 | 151
Emerging Trends in CO and IT (22618)

in the chain of custody. It is therefore important to ensure that a wholesome and


meaningful chain of custody is presented along with the evidence at the court.

What Is the Procedure to Establish the Chain of Custody?


In order to ensure that the chain of custody is as authentic as possible, a series of steps
must be followed. It is important to note that, the more information a forensic expert
obtains concerning the evidence at hand, the more authentic is the created chain of
custody. Due to this, it is important to obtain administrator information about the
evidence: for instance, the administrative log, date and file info, and who accessed the
files. You should ensure the following procedure is followed according to the chain of
custody for electronic evidence:
● Save the original materials: You should always work on copies of the digital
evidence as opposed to the original. This ensures that you are able to compare
your work products to the original that you preserved unmodified.
● Take photos of physical evidence: Photos of physical (electronic) evidence
establish the chain of custody and make it more authentic.
● Take screenshots of digital evidence content: In cases where the evidence is
intangible, taking screenshots is an effective way of establishing the chain of
custody.
● Document date, time, and any other information of receipt. Recording the
timestamps of whoever has had the evidence allows investigators to build a
reliable timeline of where the evidence was prior to being obtained. In the event
that there is a hole in the timeline, further investigation may be necessary.
● Inject a bit-for-bit clone of digital evidence content into our forensic
computers. This ensures that we obtain a complete duplicate of the digital
evidence in question.
● Perform a hash test analysis to further authenticate the working clone.
Performing a hash test ensures that the data we obtain from the previous bit-by-
bit copy procedure is not corrupt and reflects the true nature of the original
evidence. If this is not the case, then the forensic analysis may be flawed and
may result in problems, thus rendering the copy non-authentic.
The procedure of the chain of custody might be different. depending on the
jurisdiction in which the evidence resides; however, the steps are largely identical to the
ones outlined above.

What Considerations Are Involved with Digital Evidence?


A couple of considerations are involved when dealing with digital evidence. We shall
take a look at the most common and discuss globally accepted best practices.
1. Never work with the original evidence to develop procedures: The biggest
consideration with digital evidence is that the forensic expert has to make a
complete copy of the evidence for forensic analysis. This cannot be overlooked
because, when errors are made to working copies or comparisons are required, it
Maharashtra State Board of Technical Education P a g e 89 | 151
Emerging Trends in CO and IT (22618)

will be necessary to compare the original and copies.


2. Use clean collecting media: It is important to ensure that the examiner’s storage
device is forensically clean when acquiring the evidence. This prevents the
original copies from damage. Think of a situation where the examiner’s data
evidence collecting media is infected by malware. If the malware escapes into
the machine being examined, all of the evidence can become compromised.
3. Document any extra scope: During the course of an examination, information
of evidentiary value may be found that is beyond the scope of the current legal
authority. It is recommended that this information be documented and brought
to the attention of the case agent because the information may be needed to obtain
additional search authorities. A comprehensive report must contain the following
sections:
● Identity of the reporting agency
● Case identifier or submission number
● Case investigator
● Identity of the submitter
● Date of receipt
● Date of report
● Descriptive list of items submitted for examination, including serial
number, make, and model
● Identity and signature of the examiner
● Brief description of steps taken during examination, such as string
searches, graphics image searches, and recovering erased files
● Results/conclusions
4. Consider safety of personnel at the scene. It is advisable to always ensure the
scene is properly secured before and during the search. In some cases, the
examiner may only have the opportunity to do the following while onsite:
● Identify the number and type of computers.
● Determine if a network is present.
● Interview the system administrator and users.
● Identify and document the types and volume of media, including
removable media.
● Document the location from which the media was removed.
● Identify offsite storage areas and/or remote computing locations.
● Identify proprietary software.
● Determine the operating system in question.
The considerations above need to be taken into account when dealing with digital
evidence due to the fragile nature of the task at hand.

Chain of custody prevents evidence from being tainted; it thus establishes


trustworthiness of items brought into evidence. The U.S. legal system wants the

Maharashtra State Board of Technical Education P a g e 90 | 151


Emerging Trends in CO and IT (22618)

proponent of evidence to be able to demonstrate an unbroken chain of custody for items


he wants to have admitted.

Often, there is a stipulation,for example, when there is an agreement between the


parties or a concession by the opponent of the evidence that allows it to be admitted
without requiring testimony to prove the foundational elements. The purpose of
stipulation is to move the trial quickly forward, without pondering idle questions.

If there is a break in the chain of custody brought to the attention of the court,
then the court has to decide whether the breach is so severe as to meet exclusion of the
item from trial. Alternatively, the court can decide that the Trier (trial judge or jury)
need to decide the value of the evidence. To prevent a breach, a forensic investigation
should follow a written policy, so that necessary deviations of the policy can be argued.
The policy itself should take all reasonable (or arguably reasonable) precautions against
tampering.

For example, assume that a PDA is seized from a suspected drug dealer. In the
case of an PDA, there is no hard drive image to mirror, that is, the examination will
have to be done on the powered-on original. The PDA can lose data, for example by
disconnecting it from its battery. On seizure, the device should not be switched on. If it
is seized switched on, it should be switched off in order to preserve battery power. It
needs to be put into an evidence bag that does not allow access to the PDA without
breaking the seal (no clear plastic bag!). The evidence needs to be tagged with all
pertinent data, including the serial number of the PDA and the circumstances of the
seizure. The PDA should never be returned to the accused at the scene, because the
device can lose data if reset. To maintain the data in the PDA, it needs to be kept in a
continuously charged mode. It should only be used to extract evidence by a competent
person who can testify in court. As long as the PDA could be evidence, it needs to be
kept in an evidence locker, with check-out logs, so that it can be determined who had
access to the PDA at any time.

4.6.3 Evidence Validation: The challenge is to ensure that providing or obtaining the
data that you have collected is similar to the data provided or presented in court. Several
years pass between the collection of evidence and the production of evidence at a
judiciary proceeding, which is very common. To meet the challenge of validation, it is
necessary to ensure that the original media matches the forensic duplication by using
MD5 hashes. The evidence for every file is nothing but the MD5 hash values that are
generated for every file that contributes to the case.
The verify function within the Encase application can be used while duplicating
a hard drive with Encase. To perform a forensic duplication using dd , you must record
MD5 hash for both the original evidence media and binary files or the files which
compose the forensic duplication.

Maharashtra State Board of Technical Education P a g e 91 | 151


Emerging Trends in CO and IT (22618)

Note: Evidence collection calculated by MD5 after 6 months may not be helpful.MD5
hashes should be performed when the evidence is obtained.
4.7 Volatile Evidence: Not all the evidence on a system is going to last very long. Some
evidence is residing in storage that requires a consistent power supply; other evidence
may be stored in information that is continuously changing. When collecting evidence,
you should always try to proceed from the most volatile to the least. Of course, you
should still take the individual circumstances into account—you shouldn’t waste time
extracting information from an unimportant/unaffected machine’s main memory when
an important or affected machine’s secondary memory hasn’t been examined.
You need to respond to the target system at the console during the collection of
volatile data rather than access it over the network. This way the possibility of the
attacker monitoring your responses is eliminated, ensuring that you are running trust
commands. If you are creating a forensic duplication of the targeted system, you should
focus on obtaining the volatile system data before shutting down the system.
To determine what evidence to collect first, you should draw up an Order of
Volatility—a list of evidence sources ordered by relative volatility. An example an
Order of Volatility would be:

1. Registers and cache


2. Routing tables
3. Arp cache
4. Process table
5. Kernel statistics and modules
6. Main memory
7. Temporary file systems
8. Secondary memory
9. Router configuration
10. Network topology

Note: Once you have collected the raw data from volatile sources you may be able to
shutdown the system.{Matthew Braid, “Collecting Electronic Evidence After A System
Compromise,” Australian Computer Emergency Response Team}

Registers, Cache: The contents of CPU cache and registers are extremely volatile,
since they are changing all of the time. Literally, nanoseconds make the difference here.
An examiner needs to get to the cache and register immediately and extract that
evidence before it is lost.

Routing Table, ARP Cache, Process Table, Kernel Statistics, Memory: Some of
these items, like the routing table and the process table, have data located on network
devices. In other words, that data can change quickly while the system is in operation,
Maharashtra State Board of Technical Education P a g e 92 | 151
Emerging Trends in CO and IT (22618)

so evidence must be gathered quickly. Also, kernel statistics are moving back and forth
between cache and main memory, which make them highly volatile. Finally, the
information located on random access memory (RAM) can be lost if there is a power
spike or if power goes out. Clearly, that information must be obtained quickly.

Temporary File Systems: Even though the contents of temporary file systems have the
potential to become an important part of future legal proceedings, the volatility concern
is not as high here. Temporary file systems usually stick around for awhile.

Disk: Even though we think that the data we place on a disk will be around forever, that
is not always the case (see the SSD Forensic Analysis post from June 21). However, the
likelihood that data on a disk cannot be extracted is very low.

Remote Logging and Monitoring Data that is Relevant to the System in Question:
The potential for remote logging and monitoring data to change is much higher than
data on a hard drive, but the information is not as vital. So, even though the volatility of
the data is higher here, we still want that hard drive data first.

Physical Configuration, Network Topology, and Archival Media: Here we have


items that are either not that vital in terms of the data or are not at all volatile. The
physical configuration and network topology is information that could help an
investigation, but is likely not going to have a tremendous impact. Finally, archived data
is usually going to be located on a DVD or tape, so it isn’t going anywhere anytime
soon. It is great digital evidence to gather, but it is not volatile.

Case Studies :

Case-1: Credit Card Fraud


State : Tamil Nadu
City : Chennai
Sections of Law : Section of Law: 66 of Information Technology Act

2000 & 120(B), 420,467,468,471 IPC.

Background:
The assistant manager (the complainant) with the fraud control unit of a large business
process outsourcing (BPO) organization filed a complaint alleging that two of its
employees had conspired with a credit card holder to manipulate the credit limit and as
a result cheated the company of INR 0.72 million.

The BPO facility had about 350 employees. Their primary function was to issue the
Maharashtra State Board of Technical Education P a g e 93 | 151
Emerging Trends in CO and IT (22618)

bank's credit cards as well as attend to customer and merchant queries. Each employee
was assigned to a specific task and was only allowed to access the computer system for
that specific task. The employees were not allowed to make any changes in the credit-
card holder's account unless they received specific approvals.

Each of the employees was given a unique individual password. In case they entered an
incorrect password three consecutive times then their password would get blocked and
they would be issued a temporary password.

The company suspected that its employees conspired with the son (holding an add-on
card) of one of the credit card holders. The modus operandi suspected by the client is
as follows.

The BPO employee deliberately keyed in the wrong password three consecutive times
(so that his password would get blocked) and obtained a temporary password to access
the computer system. He manually reversed the transactions of the card so that it
appeared that payment for the transaction has taken place. The suspect also changed the
credit card holder's address so that the statement of account would never be delivered
to the primary card holder.

Investigation: A procedure to find the Digital Evidence


The investigating team visited the premises of the BPO and conducted detailed
examination of various persons to understand the computer system used. They learnt
that in certain situations the system allowed the user to increase the financial limits
placed on a credit card. The system also allowed the user to change the customer's
address, blocking and unblocking of the address, authorisations for cash transactions
etc.

The team analysed the attendance register which showed that the accused was present
at all the times when the fraudulent entries had been entered in the system. They also
analysed the system logs that showed that the accuser's ID had been used to make the
changes in the system.

The team also visited the merchant establishments from where some of the transactions
had taken place. The owners of these establishments identified the holder of the add-on
card.

Current status:The BPO was informed of the security lapse in the software utilised.
Armed with this evidence the investigating team arrested all the accused and recovered,
on their confession, six mobile phones, costly imported wrist watches, jewels, electronic
items, leather accessories, credit cards, all worth INR 0. 3 million and cash INR 25000.

Maharashtra State Board of Technical Education P a g e 94 | 151


Emerging Trends in CO and IT (22618)

The investigating team informed the company of the security lapses in their software so
that instances like this could be avoided in the future.

This case won the second runner-up position for the India Cyber Cop Award, for its
investigating officer Mr S. Balu, Assistant Commissioner of Police, Crime, Chennai
Police. The case was remarkable for the excellent understanding displayed by the
investigating team, of the business processes and its use in collecting digital evidence.

Case-2: Hosting Obscene Profiles


State : Tamil Nadu
City : Chennai
Sections of Law : 67 of Information Technology

Act 2000 469, 509 of the Indian Penal code


Background:The complainant stated that some unknown person had created an e-mail
ID using her name and had used this ID to post messages on five Web pages describing
her as a call-girl along with her contact numbers.
As a result she started receiving a lot of offending calls from men.

Investigation: A procedure to find the Digital Evidence


After the complainant heard about the Web pages with her contact details, she created
a username to access and view these pages.

Using the same log-in details, the investigating team accessed the Web pages where
these profiles were uploaded. The message had been posted on five groups, one of which
was a public group. The investigating team obtained the access logs of the public group
and the message to identify the IP addresses used to post the message. Two IP addresses
were identified.

The ISP was identified with the help of publicly available Internet sites. A request was
made to the ISPs to provide the details of the computer with the IP addresses at the time
the messages were posted. They provided the names and addresses of two cyber cafes
located in Mumbai to the police.

The investigating team scrutinised the registers maintained by the cyber cafes and found
that in one case the complainant's name had been signed into the register.

The team also cross-examined the complainant in great detail. During one of the
meetings she revealed that she had refused a former college mate who had proposed
marriage.

Maharashtra State Board of Technical Education P a g e 95 | 151


Emerging Trends in CO and IT (22618)

In view of the above the former college mate became the prime suspect. Using this
information the investigating team, with the help of Mumbai police, arrested the suspect
and seized a mobile phone from him. After the forensic examination of the SIM card
and the phone, it was observed that phone had the complainant’s telephone number that
was posted on the internet. The owner of the cyber cafes also identified the suspect as
the one who had visited the cyber cafes.

Based on the facts available with the police and the sustained interrogation the suspect
confessed to the crime.

Current status:The suspect was convicted of the crime and sentenced to two years of
imprisonment as well as a fine.

Case - 3: Illegal money transfer


State : Maharashtra
City : Pune
Sections of Law : 467,468, 471, 379,419, 420, 34 of IPC & 66 of IT ACT
Background: The accused in the case were working in a BPO, that was handling the
business of a multinational bank. The accused, during the course of their work had
obtained the personal identification numbers (PIN) and other confidential information
of the bank’s customers. Using these the accused and their accomplices, through
different cyber cafes, transferred huge sums of money from the accounts of different
customers to fake accounts.

Investigation: A procedure to find the Digital Evidence


On receiving the complaint the entire business process of the complainant firm was
studied and a systems analysis was conducted to establish the possible source of the
data theft.

The investigators were successful in arresting two people as they laid a trap in a local
bank where the accused had fake accounts for illegally transferring money.

During the investigation the system server logs of the BPO were collected. The IP
addresses were traced to the Internet service provider and ultimately to the cyber cafes
through which illegal transfers were made.

The registers maintained in cyber cafes and the owners of cyber cafes assisted in
identifying the other accused in the case. The e-mail IDs and phone call print outs were
also procured and studied to establish the identity of the accused. The e-mail accounts

Maharashtra State Board of Technical Education P a g e 96 | 151


Emerging Trends in CO and IT (22618)

of the arrested accused were scanned which revealed vital information to identify the
other accused. Some e-mail accounts of the accused contained swift codes, which were
required for internet money transfer.

All the 17 accused in the case were arrested in a short span of time. The charge sheet
was submitted in the court within the stipulated time. In the entire wire transfer scam,
an amount to the tune of about INR 19 million was transferred, out of this INR 9 million
was blocked in transit due to timely intimation by police, INR 2 million was held in
balance in one of the bank accounts opened by the accused which was frozen. In
addition the police recovered cash, ornaments, vehicles and other articles amounting to
INR 3 million.

During the investigation the investigating officer learned the process of wire transfer,
the banking procedures and weakness in the system. The investigating officer suggested
measures to rectify the weakness in the present security systems of the call centre. This
has helped the local BPO industry in taking appropriate security measures.

Current status: Pending trial in the court.


This case won the India Cyber Cop Award, for its investigating officer Mr Sanjay
Jadhav, Assistant Commissioner of Police, Crime, Pune Police. The panel of judges felt
that this case was the most significant one for the Indian IT industry during 2005 and
was investigated in a professional manner, with substantial portion of the swindled
funds being immobilised, a large number of persons were arrested and the case was sent
to the court for trial within 90 days.

Case-4: Fake Travel Agent


State : Maharashtra
City : Mumbai
Sections of : 420, 465, 467, 468, 471, 34 of IPC r/w 143 of Indian
Law Railway Act 1989.

Background: The accused in this case was posing to be a genuine railway ticket agent
and had been purchasing tickets online by using stolen credit cards of non residents.
The accused created fraudulent electronic records/ profiles, which he used to carry out
the transactions.The tickets so purchased were sold for cash to other passengers. Such
events occurred for a period of about four months.
The online ticket booking service provider took notice of this and lodged a complaint
with the cyber crime investigation cell.
Investigation: A procedure to find the Digital Evidence

Maharashtra State Board of Technical Education P a g e 97 | 151


Emerging Trends in CO and IT (22618)

The service provider gave the IP addresses, which were used for the fraudulent online
bookings, to the investigating team. IP addresses were traced to cyber cafes in two
locations.
The investigating team visited the cyber cafŽs but was not able to get the desired logs
as they were not maintained by the cyber cafŽ owners. The investigating team was able
to short list the persons present at cyber cafes when the bookings were made. The
respective owners of the cyber cafes were able to identify two persons who would
regularly book railway tickets.
The investigating team then examined the passengers who had travelled on these tickets.
They stated that they had received the tickets from the accused and identified the
delivery boy who delivered the tickets to them. On the basis of this evidence the
investigating team arrested two persons who were identified in an identification parade.

Current status:The charge sheet has been submitted in the court.

Case-5: Creating Fake Profile


State : Andhra Pradesh
City : Hyderabad
Sections of : 67 Information Technology Act 2000 507, 509 of the
Law Indian Penal Code

Background:The complainant received an obscene e-mail from an unknown e-mail ID.


The complainant also noticed that obscene profiles along with photographs of his
daughter had been uploaded on matrimonial sites.

Investigation: A procedure to find the Digital Evidence


The investigating officer examined and recorded the statements of the complainant and
his daughter. The complainant stated that his daughter was divorced and her husband
had developed a grudge against them due to the failure of the marriage.

The investigating officer took the original e-mail from the complainant and extracted
the IP address of the same. From the IP address he could ascertain the Internet service
provider.

The IP address was traced to a cable Internet service provider in the city area of
Hyderabad. The said IP address was allotted to the former husband sometime back and
his house was traced with the help of the staff of ISP.

A search warrant was obtained and the house of the accused was searched. During the
search operation, a desktop computer and a handicam were seized from the premises. A
forensic IT specialist assisted the investigation officer in recovering e-mails (which
Maharashtra State Board of Technical Education P a g e 98 | 151
Emerging Trends in CO and IT (22618)

were sent to the complainant), using a specialised disk search tool as well as
photographs (which had been posted on the Internet) from the computer and the
handicam respectively. The seized computer and the handicam were sent to the forensic
security laboratory for further analysis.

The experts of the forensic security laboratory analysed the material and issued a report
stating that: the hard disk of the seized computer contained text that was identical to
that of the obscene e-mail; the computer had been used to access the matrimonial
websites on which the obscene profiles were posted; the computer had been used to
access the e-mail account that was used to send the obscene e-mail; the handicam seized
from the accused contained images identical to the ones posted on the matrimonial
Websites. Based on the report of the FSL it was clearly established that the accused had:
created a fictitious e-mail ID and had sent the obscene e-mail to the complainant; posted
the profiles of the victim along with her photographs on the matrimonial sites.

Current status:Based on the material and oral evidence, a charge sheet has been filed
against the accused and the case is currently pending for trial.

References

1. http://www.forensicsciencesimplified.org/digital/
2. http://www.forensicsciencesimplified.org/digital/
3. https://www.helpnetsecurity.com/2007/07/20/the-rules-for-computer-
forensics/ as on 28 August 2019
4. Digital Evidence and Computer Crime, Third Edition © 2011 Eoghan Casey.
Published by Elsevier Inc.
5. www.cse.scu.edu/~tschwarz/COEN252_13/LN/legalissues.html

Sample Multiple Choice Questions

1. Digital forensics is all of them except:


a) Extraction of computer data
b) Preservation of computer data
c) Interpretation of computer data
d) Manipulation of computer data
2. IDIP stands for
a) Integrated Digital Investigation Process
b) Integrated Data Investigation Process
c) Integrated Digital Investigator Process
d) Independent Digital Investigator Process

Maharashtra State Board of Technical Education P a g e 99 | 151

You might also like