Module 8 PDF
Module 8 PDF
4. The Authority shall have the power to issue such directions to service
providers as it may consider necessary for proper functioning of service
providers.
— T —
\When the L0, s required to carry out search in a place wheres itis
2
suspected that computer network or any other electronic memory device
likeolybe found, it is advisable to cc' a
forensic scienc e laborat ory to accomp an! is not
possile, nformation may be cllectsd regardng the tbe, make, madel
aperatingsyston,netir archiecure,type f loconof dta stcFage, reriele
o possibilties etc, which can be passed on to forensic experts as .thatIt
ul Id help making necessary preparation to collect and preserve evidence
must be remembered that on some occasions, it may ot be possible to remove
the computer system physically and data may have to be copied at the scgne of
crime! place of search. The investigator or expert must cary necessary medi
software, and ofher specialized lems as well s special packing materiak
d by
which can prevent loss of data as data of magnetic media can be destroye
dust, jerks, and electrostatic environment.
\7(' 'PRECAUTION AT THE SEARCH SITE
Taking control of the Location:
forensic
help of computer
complicated, and one should definitely enlist the
specialist in these cases.
PREPARATION FOR SEARCH: —R
oK W
—
X m’va’
system was
of the front and back ©f ::n
feconnected in the Forensic Laboratol
he SWPS
equipments and the way itis connected. He should pay special attention 19
DIP switches on the back of certain eqmmmmm
cunrguwm‘\mmmn
transport creaW
L bel all pars:
ling
The 1.0. should label each part before he starts dismant
any of the equipment. He shouid remember to label all the connectors,
and plugs at both ends, and on the computer so that re-assembly is eas)
and accurafp. A good way to do this is (o Tabel each item its own letter.
For Example, a power card § may be_marked ‘A’ on the end @
be insZTed_J
(ul)POWER SYSTEM DOWN:
TT""Rsa rule, if a computer is of, it should not be tumed
Hackers can make their computer erase data f a certain disc is not in the
drive When The machine is booted Up o f a certain password 15 not
enlered Likewise, if the machine is_on, one should check it before
furning
u off, otherwise it may destroy data. Keep in mind a computer
may look powered down but actually, it may be in a “Sleep” mode.
Hac@?! can their computers to erase data if not proper
from a “sleep” mode so one may be reguired to pufl the plug or resfiove
machine down through the operating system rather than just “Pulling the
plug”. If, however, he does need to “pull the plug”, he should disconnect
it from_the «backof the machine rather than at wall, because if th
maching s Dlugged o3 backup power supply, ft may initiate a sh@
donmprocedus tal coul lerled 4D
Booked upmeanisp: fo Alartup @ Congutes Aiptonby paviing £ with
sequiced eledhnical Wi and Looding fug Srortup Kiviay
bl b &?wkrfikpm'\»lmdeb
combating cyber crimes in the counts and towards this, it operates several
————
help police 3 er Ci ber forensic tools any
sfandard operating procedures— it was released by the Union Home Secretary
in 2011 )
e
CLASSIFICATION OF CYBER F (L
data / information from_stora
ge
Forensic: deals with extracting
Disc Forensic: also from U1 allocated, slack
media by searching actve, deleted fis and
paces. ) and analysis JF)
. Network Forensics: is a sub branc! h relating to monitoring
evidence
of Information Gathering, legal
nétwork traffic for the purposes tigation®
l forensics, network inves "
detection. Unlike other areas of digia is transmitted
k traffic
.P”‘Tm,fl delfwith volafl=e and dynamic information. Networ investigation.
veSnvWertpuk N
and then lost, so networ k forens ic is often a proact ive
mwmeék ic. The main J
M"r ,mj a “Witel ess_Eorensics: is a sy discipine of network forens
\ Bast goal of wireless forensic i to provide the methodolpgy and togis’ required
i ‘?Ea‘ he data collected ().
o 1o{collect and analyse WIréless nework tra
, or, with broad usag e of voice -over -IP
can correspond (o plain_gata
especially over wireless, can include voice
(VolP) technologies,
conversations.
“
&,g_& Database Forensics: is a br anch of digital forensic science relating to the
that
w"’ n“;':"\ {orensic study of databases a7d thei related metadataa set of data 'V\-
esgves information about other data). !
P #""‘} B __gesurivand
SMR 5. nsics: deals with investigation and analysis of Maliciol
Code for identfication of Malware like viruses, Trojans, worms,
. keyloggers etc. and study their payload.
Mw‘fys Ma.i“e Device Forensics: deals with examining and analyzing Mobile
\"’idfb“ ” devices lie mobile phones, pagers, to retrieve address book, call logs,
é\efiif" Vol (Vg0 1) V206 Interpet-otucr, @ atecbaoligy tral allous
Gnrechn
qou to hake Vb (alle wango broad bant lutemet
crabesdh o) a. eguler (oranalep) Yelephont Gall -
Documer
(a) Cable tags (b) indelible feft-tip markers (c) stick on labels.
T ——
ty of non-magnetic sizes
* Dissembling an d removal tools are available in varie
includes packaging and transporting
supplies such as
and types that ence Bag
le wraps (b) cable ties and Evid
/fif‘sflfic bags and bubb boxes of vario us sizes
(d) sturdy
©) Evidence and packing tape
FFAA-2008.
Ensure that a technical person from the_responder side along with 2
independent witnesses are part of search and seizure procedure to identify the
‘/uuiument correctly and guide the 1.O. and witnesses.
Time zone/system time play a very critical role in investigation. Please make
sure this information is noted carefully in the Panchanama, from the systems
that are switched on condition.
_/ Please do not switch on any device
Please make sure that a serial number is allotted for each device and same
should be duly noted not only on panchnama but also in the chain of
custody and Digital evidence collection form.
CHAIN OF CUSTODY:
Chain of custody refers to documentation that shows the people who
have been entrusted with the evidence. These would be people who had‘seized
the equipment, psople who are in charge of trapsferring the evidence from the
CHAIN OF CUSTODY
Details of the Digital Evidence
Crime number - Date of Seizure -
Name of 1.O. - Time -
PF Number -
Technical information
[Manufacturer [Model [[Seral Number [ PF Number |
Chain
of Custody
]Rsasan/Acnon |Recewedfmm [Reoewad By ‘Da!e lTimelemarks ‘
« Model Number
« Serial Numberfany unique identification feature
« BIOS DatefTime
« Property form number/Evidence Number L
HASHING:
Establishing the integrity of seized evidence through forensically proving
procedure
technicaly by trained |.OJ or with help of a technical expert wil k:‘i
ennancmofiz:‘iwen the case is taken for prosecution. The
integrity of the_evidence on a digital media can be established by 'P :
using a process called HASHING.
" Hashing program produces a fixed integer value (ranging from 80 to 240
bits) represent data on seized media. Any changes made to the original
evidence will result in change of the hash value.
(A)ENCASE SOF
/{ GUIDANCE SOFTWARE: (Version 7)
Vidence: with Encase Forensic, examiner can be confident the
integrity of evidence will not be compromised. This s_is_widely_used
throughout world.
Process Evidence: As the amount of evidence in each case increases,
examiners need speedy, reliable processing capabilities in_order to
completeinvestigaiioh”ficiently. Encase version 7, now_can_dive
invaluable En Scfiptswhich is indexed for unified search and review of
i evidence from one, easy to use interface.
Perform Deep Forensic Analysis: This tool now has capability to analyse
all files deeply and.analyse. It can also analyse EXT4 and HF:
ofice_2010 fies, checl oain_point sec encrypled version, and SO
ohysical image. It can emailinvestigation.
also help in with a streamline
interface and features enablln
email conversatior
analysis,
Compile Findings: This gives an easily configurable report, with
customized templates, for any type of case which is easy of read
Archive case: To ensure examiners have everything they need when a
case needs o be reviewed in future. It has a buit in archiving capability
and with a click, it gives evidence, findings , and report associated with
the case and ensures everything remains intact.
5 (B) FORENSIC TOOL KIT FROM ACCESS DATA : (FTK)
Handle Massive Data sets without crashing:
% Experience fast searching and easy data navigation.
istributed processing and fully leveraging.
K:;Ae 0S analysis: FTK provides most comprehensive Apple O.S.
nalysis.
V) E-mail analysis — Emails of all types of all digital companies can be
analysed.
Vi) Encryption support : FTK supports popular encryption technologies.
DEFINITIONS:
STANDARDS
PRINCIPLE1: In order to ensure that digital evidence is collected, preserved,
examined, or transferred in a manner safeguarding the accuracy and reliability
of the evidence, law enforcement and forensic organization must establish and
maintain an effective quality system. Standard operating procedures (SOPs)
are documented quality- control guidelines that must be supported by proper
case records and use broadly accepted procedures, equipment, and materials.
Standards and Criteria (1.1
All agencies that seized andlor examine digital evidence must maintain
an appropriate SOP document. All elements of an agency's policies and
procedures concerning digital evidence must be clearly set forth in this S.0.P
document, which must be issued under the agency's management authority.
Standards and Criteria (1.2)
Agency Management must review the SOPs on an annual basis to
ensure their continued suitability and effectiveness.
The Agency must use hardware and software that is appropriate and
effective for the seizure or examination procedure.
Any action that has the potential to alter, damage, or destroy any aspect
of original evidence must be performed by qualified persons in a forensically
sound manner.
INTERNATIONAL ORGANISATION ON COMPUTER EVIDENCE (.O.C.E)
—
Scanned with CamScanner