Page 17 - Understandinging Forensic Technology Landscape
P. 17

What types of evidence may exist on acquisition targets?  Tools and techniques
           Evidence could be located in many places, on many
           different types of media and systems. It is critical to   Forensic collection of electronic evidence requires care
           identify the best sources of responsive data and define   and appropriate skill. Qualified professionals should
           the most appropriate acquisition protocol. The following   be consulted since corrupted evidence may be lost or
           represent some of the types of evidence that may exist   rendered permanently unusable. Any suggestion that
           within an acquired data set:                         the data on the original drive may have been altered,
                                                                deleted or appended may result in a spoliation claim by
           •  Active files
                                                                counsel or the court, which may result in the ESI being
           •  Deleted files                                     inadmissible in court.
           •   Fragments of files that have been partially overwritten   Specialized hardware and software are used to create
             from within slack or unallocated space
                                                                duplicate images of computer or network files, system
           •   Information related to the operating system and   logs, and other ESI. These images must be exact bit-by-
             applications loaded on a device                    bit duplicates of the original information. Typically, the
           •   Configurations and user activity information from    specialist will document the chain of custody so that the
             the Microsoft Windows Registry or other operating   underlying evidence can be properly authenticated.
             system files
                                                                The accuracy of an image is tested by running a
           •  Logon information                                 program against the original data and producing a
           •   Internet history for multiple web browsers and    unique 32-character alphanumeric code called a hash
             cloud-based products                               number, which is the “fingerprint” of the data to be
                                                                imaged. The imaged data is also analyzed, and a hash
           •  Lists of most recently used files
                                                                number is produced and must match the hash number
           •  Network drive mappings                            of the original data that was imaged.
           •   USB device use (external storage media, peripherals,
             and the like)                                      The scale of ESI collections may vary from case to case,
                                                                ranging from the imaging of a single computer drive to
           •  Evidence of any mass data copies                  the collection of thousands of data sources. Depending

           •  Information related to drive-wiping activities    on the scale and complexity of the project and the
           •  Temporary files created by various applications   systems and sources involved, different approaches, the
                                                                number of professionals, and the skills of the team may
           •  Information indicating when applications were used  differ substantially.
           •  Microsoft Windows Recycle Bin activities
                                                                Forensic capture
           •  Print spooler information                         In the simplest configuration, the hardware used in
           •   LNK files pointing to things like actively used files,   forensic collection of electronic evidence consists of
             applications or external storage locations         a laptop configured with specialized software. The
           •  Local archived or active email files              software tools used to create duplicate images include
                                                                EnCase, Cellebrite, FTK Imager, SANS Investigative
           •  Chat history for a number of products             Forensic Toolkit, X-Ways Forensics, and Open
           •  Apple Mac OS or Linux specific forensic artifacts  Computer Forensics Architecture (OCFA). During
           •   Evidence specific to mobile devices, such as call logs,   the capture process, a “write blocker” blocks two-way
             SMS messages, MMS messages, mobile internet        communication between the drive being imaged and the
             history, location related information, or chat data   duplicate image being analyzed to prevent unintentional
             within third-party applications                    alteration or deletion during the imaging process.




                                                                  Understanding the forensic technology landscape | 13
   12   13   14   15   16   17   18   19   20   21   22