Computer forensics
   HOME

TheInfoList



OR:

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of
computer crime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is accepted as reliable within U.S. and European court systems.


Overview

In the early 1980s personal computers became more accessible to consumers, leading to their increased use in criminal activity (for example, to help commit
fraud In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compen ...
). At the same time, several new "computer crimes" were recognized (such as cracking). The discipline of computer forensics emerged during this time as a method to recover and investigate
digital evidence In evidence law, digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence ...
for use in court. Since then computer crime and computer related crime has grown, and has jumped 67% between 2002 and 2003. Today it is used to investigate a wide variety of crime, including
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
, fraud,
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
, cyberstalking, murder and rape. The discipline also features in civil proceedings as a form of information gathering (for example, Electronic discovery) Forensic techniques and expert knowledge are used to explain the current state of a ''digital artifact'', such as a computer system, storage medium (e.g.
hard disk A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magn ...
or
CD-ROM A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains data. Computers can read—but not write or erase—CD-ROMs. Some CDs, called enhanced CDs, hold both com ...
), or an electronic document (e.g. an email message or JPEG image). The scope of a forensic analysis can vary from simple
information retrieval Information retrieval (IR) in computing and information science is the process of obtaining information system resources that are relevant to an information need from a collection of those resources. Searches can be based on full-text or other c ...
to reconstructing a series of events. In a 2002 book, ''Computer Forensics'', authors Kruse and Heiser define computer forensics as involving "the preservation, identification, extraction, documentation and interpretation of computer data". They go on to describe the discipline as "more of an art than a science", indicating that forensic methodology is backed by flexibility and extensive domain knowledge. However, while several methods can be used to extract evidence from a given computer the strategies used by law enforcement are fairly rigid and lack the flexibility found in the civilian world.


Cybersecurity

Computer forensics is often confused with cybersecurity but they both are quite different. Cybersecurity is about prevention and protection whilst computer forensics is more reactionary and active such as tracking and exposing. There are usually two teams, cybersecurity and computer forensics that work co in hand. They complement each other as cybersecurity team would create systems and programs to protect data and if they fail then the computer forensics team recovers and finds out how it happened and tracks etc. There are many similarities however which is why these two fields help each other. They both require knowledge of computer science and both fields are apart of IT/STEM.


Computer-related crimes

Computer forensics are used to convict people who have performed physical and digital crimes. Some of these computer related crimes include interruption, interception, copyright infringement, and fabrication. Interruption relates to the destruction and stealing of computer parts and digital files. Interception is the unauthorized access of files and information stored on technological devices. Copyright Infringement is using, reproducing, and distributing copyrighted information, including software piracy. Fabrication is accusing someone of using false data and information put in the system through an unauthorized source. Examples of interceptions are the Bank NSP case, Sony.Sambandh.com case, and business email compromise scams. The Bank NSP Case was a situation where a bank's management employee's ex-girlfriend created fraudulent emails, which were sent to the bank client to gain money. The Sony.Sambandh.com case was a call center worker using a foreigner's credit card information to buy a TV and headphones. The business email compromise scams refer to hackers gaining access to the CEO/CFO email and using it to gain money from their employees.


Use as evidence

In court, computer forensic evidence is subject to the usual requirements for
digital evidence In evidence law, digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence ...
. This requires that information be authentic, reliably obtained, and admissible. Different countries have specific guidelines and practices for evidence recovery. In the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and ...
, examiners often follow Association of Chief Police Officers guidelines that help ensure the authenticity and integrity of evidence. While voluntary, the guidelines are widely accepted in British courts. Computer forensics has been used as evidence in
criminal law Criminal law is the body of law that relates to crime. It prescribes conduct perceived as threatening, harmful, or otherwise endangering to the property, health, safety, and moral welfare of people inclusive of one's self. Most criminal law ...
since the mid-1980s, some notable examples include: * BTK Killer:
Dennis Rader Dennis Lynn Rader (born March 9, 1945) is an American serial killer known as BTK (an abbreviation he gave himself, for "bind, torture, kill"), the BTK Strangler or the BTK Killer. Between 1974 and 1991, he killed ten people in Wichita and Pa ...
was convicted of a string of serial killings that occurred over a period of sixteen years. Towards the end of this period, Rader sent letters to the police on a floppy disk. Metadata within the documents implicated an author named "Dennis" at "Christ Lutheran Church"; this evidence helped lead to Rader's arrest. * Joseph Edward Duncan: A spreadsheet recovered from Duncan's computer contained evidence that showed him planning his crimes. Prosecutors used this to show premeditation and secure the
death penalty Capital punishment, also known as the death penalty, is the state-sanctioned practice of deliberately killing a person as a punishment for an actual or supposed crime, usually following an authorized, rule-governed process to conclude that ...
. * Sharon Lopatka: Hundreds of emails on Lopatka's computer lead investigators to her killer, Robert Glass. *
Corcoran Group Corcoran Group is an American real estate firm founded in 1973 by Barbara Corcoran. History Barbara Corcoran, a former diner waitress, founded her own real estate company in 1973 with a $1,000 loan. In 2001, Barbara Corcoran sold her company t ...
: This case confirmed parties' duties to preserve
digital evidence In evidence law, digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Before accepting digital evidence a court will determine if the evidence ...
when
litigation - A lawsuit is a proceeding by a party or parties against another in the civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today. The term "lawsuit" is used in reference to a civil act ...
has commenced or is reasonably anticipated. Hard drives were analyzed by a computer forensics expert who could not find relevant emails the Defendants should have had. Though the expert found no evidence of deletion on the hard drives, evidence came out that the defendants were found to have intentionally destroyed emails, and misled and failed to disclose material facts to the plaintiffs and the court. * Dr. Conrad Murray: Dr. Conrad Murray, the doctor of the deceased
Michael Jackson Michael Joseph Jackson (August 29, 1958 – June 25, 2009) was an American singer, songwriter, dancer, and philanthropist. Dubbed the " King of Pop", he is regarded as one of the most significant cultural figures of the 20th century. Over ...
, was convicted partially by digital evidence on his computer. This evidence included medical documentation showing lethal amounts of
propofol Propofol, marketed as Diprivan, among other names, is a short-acting medication that results in a decreased level of consciousness and a lack of memory for events. Its uses include the starting and maintenance of general anesthesia, sedation f ...
.


Forensic process

Computer forensic investigations usually follow the standard digital forensic process or phases which are acquisition, examination, analysis and reporting. Investigations are performed on static data (i.e. acquired images) rather than "live" systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data.


Computer forensics lab

The computer forensic lab is a safe and protected zone where electronic data can be managed, preserved, and accessed in a controlled environment. There, there is a very much reduced risk of damage or modification to the evidence. Computer forensic examiners have the resources needed to elicit meaningful data from the devices that they are examining.


Techniques

A number of techniques are used during computer forensics investigations and much has been written on the many techniques used by law enforcement in particular. ;Cross-drive analysis : A forensic technique that correlates information found on multiple
hard drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with mag ...
s. The process, still being researched, can be used to identify social networks and to perform anomaly detection. ;Live analysis : The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example, where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down. ;Deleted files : A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data. Most
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
s and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical
disk sector In computer disk storage, a sector is a subdivision of a track on a magnetic disk or optical disc. Each sector stores a fixed amount of user-accessible data, traditionally 512 bytes for hard disk drives (HDDs) and 2048 bytes for CD-ROMs and ...
s.
File carving File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. Introduction and basic principles All filesystems contain some metadata that describes the actual file system. At a minimum, this in ...
involves searching for known file headers within the disk image and reconstructing deleted materials. ; Stochastic forensics :A method which uses
stochastic Stochastic (, ) refers to the property of being well described by a random probability distribution. Although stochasticity and randomness are distinct in that the former refers to a modeling approach and the latter refers to phenomena themselv ...
properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft. ; Steganography : One of the techniques used to hide data is via steganography, the process of hiding data inside of a picture or digital image. An example would be to hide pornographic images of children or other information that a given criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of the file and comparing it to the original image (if available.) While the images appear identical upon visual inspection, the hash changes as the data changes.


Mobile device forensics

Phone Logs: Phone companies usually keep logs of calls received, which can be helpful when creating timelines and gathering the locations of persons when the crime occurred. Contacts: Contact lists help narrow down the suspect pool due to their connections with the victim or suspect. Text messages: Messages contain timestamps and remain in company servers indefinitely, even if deleted on the original device. Because of this, messages act as crucial records of communication that can be used to convict suspects. Photos: Photos can be critical in either supporting or disproving alibis by displaying a location or scene along with a timestamp of when the photo was taken. Audio Recordings: Some victims might have been able to record pivotal moments of the struggle, like the voice of their attacker or extensive context of the situation.


Volatile data

Volatile data is any data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off. Volatile data resides in registries, cache, and random access memory (RAM). The investigation of this volatile data is called “live forensics”. When seizing evidence, if the machine is still active, any information stored solely in RAM that is not recovered before powering down may be lost. One application of "live analysis" is to recover RAM data (for example, using Microsoft's
COFEE Computer Online Forensic Evidence Extractor (COFEE) is a tool kit, developed by Microsoft, to help Computer forensics, computer forensic investigators extract evidence from a Windows Personal computer, computer. Installed on a USB flash drive or ot ...
tool, WinDD,
WindowsSCOPE WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory. One of its uses is in the detection and reverse engineering of rootkits and other malware. WindowsSCOPE supports acqu ...
) prior to removing an exhibit. CaptureGUARD Gateway bypasses Windows login for locked computers, allowing for the analysis and acquisition of physical memory on a locked computer. RAM can be analyzed for prior content after power loss, because the electrical charge stored in the memory cells takes time to dissipate, an effect exploited by the
cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) b ...
. The length of time that data is recoverable is increased by low temperatures and higher cell voltages. Holding unpowered RAM below −60 °C helps preserve residual data by an order of magnitude, improving the chances of successful recovery. However, it can be impractical to do this during a field examination. Some of the tools needed to extract volatile data, however, require that a computer be in a forensic lab, both to maintain a legitimate chain of evidence, and to facilitate work on the machine. If necessary, law enforcement applies techniques to move a live, running desktop computer. These include a
mouse jiggler A mouse jiggler is a software used to simulate the movement of a computer mouse. It can also be a mechanical device moving the physical computer mouse. In all cases, it prevents sleep mode, standby mode or the screensaver from activating. Mouse ji ...
, which moves the mouse rapidly in small movements and prevents the computer from going to sleep accidentally. Usually, an
uninterruptible power supply An uninterruptible power supply or uninterruptible power source (UPS) is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails. A UPS differs from an auxiliary or emergency power syste ...
(UPS) provides power during transit. However, one of the easiest ways to capture data is by actually saving the RAM data to disk. Various file systems that have journaling features such as NTFS and ReiserFS keep a large portion of the RAM data on the main storage media during operation, and these page files can be reassembled to reconstruct what was in RAM at that time.


Analysis tools

A number of open source and commercial tools exist for computer forensics investigation. Typical forensic analysis includes a manual review of material on the media, reviewing the Windows registry for suspect information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mail and pictures for review. Autopsy (software), Belkasoft Evidence Center,
COFEE Computer Online Forensic Evidence Extractor (COFEE) is a tool kit, developed by Microsoft, to help Computer forensics, computer forensic investigators extract evidence from a Windows Personal computer, computer. Installed on a USB flash drive or ot ...
, EnCase are the some of tools used in Digital forensics.


Jobs in computer forensics


Computer digital forensic investigator

Computer digital forensic investigators look through suspects devices and data in order to get incriminatory evidence that could be used in the case.


Computer programmer

Computer programmers program systems and programs for computers to run. Computer Forensics work with programming and are eligible to work in this career.


Cyber forensics analyst

Cyber forensics analysts support the detectives and investigators on the crime by analyzing data and evidence and using processes that make it eligible in court.


Computer forensics technician

A computer forensics technician searches for information that may be relevant to an ongoing case. They search through personal devices and storage devices to uncover and submit evidence.


Certifications

There are several computer forensics certifications available, such as the ISFCE Certified Computer Examiner, Digital Forensics Investigation Professional (DFIP) and IACRB Certified Computer Forensics Examiner. The top ''vendor independent'' certification (especially within EU) is considered the CCFP - Certified Cyber Forensics Professional. Others, worth to mention for USA or APAC are: The International Association of Computer Investigative Specialists offers the Certified Computer Examiner program. The International Society of Forensic Computer Examiners offers the Certified Computer Examiner program. Many commercial based forensic software companies are now also offering proprietary certifications on their products. For example, Guidance Software offering the (EnCE) certification on their tool EnCase, AccessData offering (ACE) certification on their tool FTK, PassMark Software offering certification on their tool OSForensics, and X-Ways Software Technology offering (X-PERT) certification for their software, X-Ways Forensics.


Laws


India

Indian Laws Sections 65-77 relate to computer crimes. All the laws are enforced by evidence left digitally and remotely on the computer due to the permanent tracking of our actions on databases. Section 66: Law preventing the hacking of computers. The crime is punishable by three years in prison or a five lakhs rupee fine. Section 66F: Law focused on cyber-terrorism such as malware, phishing, unauthorized access, identity theft, etc. If caught, it usually leads to a life sentence. Section 67B: Law to prevent the spread and publishing of child porn. It could lead to up to 7 years in prison and a ten lakhs rupee fine.


See also

* Certified Computer Examiner * Certified Forensic Computer Examiner * Counter forensics *
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic s ...
* Data remanence *
Disk encryption Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that ...
*
Encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
* Hidden file and hidden directory * Information technology audit * MAC times * Steganalysis * '' United States v. Arnold''


References


Further reading

* A Practice Guide to Computer Forensics, First Edition (Paperback) by David Benton (Author), Frank Grindstaff (Author) * * * Incident Response and Computer Forensics, Second Edition (Paperback) by Chris Prosise (Author), Kevin Mandia (Author), Matt Pepe (Author) "Truth is stranger than fiction..." (more) * * *


Related journals

* ''IEEE Transactions on Information Forensics and Security'' * ''Journal of Digital Forensics, Security and Law'' * ''International Journal of Digital Crime and Forensics'' * ''Journal of Digital Investigation'' * ''International Journal of Digital Evidence'' * ''International Journal of Forensic Computer Science'' * ''Journal of Digital Forensic Practice'' * ''Cryptologia'' * ''Small Scale Digital Device Forensic Journal'' {{DEFAULTSORT:Computer Forensics Computer security procedures Information technology audit