Study Material DF
Study Material DF
Study Material
Study Material
(Digital Forensics – BNCSC602)
Table of Contents
1
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Forensic Science:
Forensic science involves the application of the natural, physical, and social sciences to matters of law.
Forensic science refers to the application of natural, physical, and social sciences to matters of the law.
Most forensic scientists hold that investigation begins at the scene, regardless of their associated field.
The proper investigation, collection, and preservation of evidence are essential for fact-finding and for
ensuring proper evaluation and interpretation of the evidence, whether the evidence is bloodstains,
human remains, hard drives, ledgers, and files or medical records. Scene investigations are concerned
with the documentation, preservation, and evaluation of a location in which a criminal act may have
occurred and any associated evidence within the location for the purpose of reconstructing events using
the scientific method. The proper documentation of a scene and the subsequent collection, packaging,
and storage of evidence are paramount. Evidence must be collected in such a manner to maintain its
integrity and prevent loss, contamination, or deleterious change. Maintenance of the chain of custody of
the evidence from the scene to the laboratory or a storage facility is critical. A chain of custody refers to
the process whereby investigators preserve evidence throughout the life of a case. It includes information
about: who collected the evidence, the manner in which the evidence was collected, and all individuals
who took possession of the evidence after its collection and the date and time which such possession
2
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
took place. Significant attention has been brought to the joint scientific and investigative nature of scene
investigations. Proper crime scene investigation requires more than experience; it mandates analytical
and creative thinking as well as the correct application of science and the scientific method. There is a
growing movement toward a shift from solely experiential-based investigations to investigations that
include scientific methodology and thinking. One critic of the experience-based approach lists the
following pitfalls of limiting scene investigations to lay individuals and law enforcement personnel: lack
of scientific supervision and oversight, lack of understanding of the scientific tools employed and
technologies being used at the scene, and an overall lack of understanding of the application of the
scientific method to develop hypotheses supported by the evidence (Schaler 2012). Another criticism is
that some investigators (as well as attorneys) will draw conclusions and then obtain (or present) evidence
to support their version of events while ignoring other types of evidence that do not support their version
or seem to contradict their version (i.e., confirmation bias). Many advocates of the scientific-based
approach believe that having scientists at the scene will minimize bias and allow for more objective
interpretations and reconstructions of the events under investigation.
The history of digital forensics traces back to the pre-1970s era when cybercrimes were addressed under
existing laws. The first recognition of cybercrimes occurred in the 1978 Florida Computer Crimes Act,
which targeted unauthorized data modification or deletion. As computer crimes expanded, state and
federal laws were enacted globally, with Canada leading in 1983, followed by the United States in 1986,
Australia in 1989, and Britain in 1990.
In the 1980s and 1990s, the surge in cybercrime prompted the establishment of specialized national units
for technical investigations by law enforcement agencies, such as the FBI's Computer Analysis and
Response Team and the British Metropolitan Police's computer crime department. Notably, the pursuit
of hacker Markus Hess in 1986 marked one of the early practical applications of digital forensics by
Cliff Stoll.
3
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
The 1990s witnessed a growing demand for digital forensic resources, leading to the maturation of the
field from ad-hoc tools to a more structured discipline. By 1992, the term "computer forensics" appeared
in academic literature, though the discipline still faced challenges like a lack of standardization and
training.
The 2000s saw increased standardization efforts as law enforcement shifted to regional units, prompting
the creation of guidelines and groups like the British National Hi-Tech Crime Unit. The Scientific
Working Group on Digital Evidence (SWGDE) published Best Practices for Computer Forensics in
2002. The Convention on Cybercrime in 2004 aimed to harmonize global computer crime laws, and in
2005, an ISO standard for digital forensics (ISO 17025) was released.
However, the field encountered ongoing challenges, including biases in research favoring Windows
operating systems, the rise of internet crime, cyber warfare, and terrorism. In 2010, concerns were raised
about the increasing size of digital media, encryption, diverse operating systems, training issues, and
high entry costs in digital forensics. Despite these challenges, the field continued to evolve with
increased attention to training programs and standardization efforts.
1970s- Birth of 'Computer Forensics', Manual investigations with floppy disks and mainframes,
1980s Landmark cases: 414s hacking group, Morris’s worm attack
Specialization and dedicated tools for data acquisition, analysis, and reporting, Focus on evidence
1990s- admissibility and standardized methodologies (e.g., ACPO Guidelines), Expansion beyond crime
2000s to corporate investigations, data breaches, and e-discovery
4
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Challenges with cloud computing, mobile devices, and encrypted storage, Advanced threats and
2010s- Big Data: cybercrime, network forensics, incident response, Automation and AI for faster
2020s processing, evidence identification, and proactive threat detection
5
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1) Law of Individuality -
This law states that, “Every object whether natural or man-made has a distinctive quality or
characteristic in it which is not duplicated in any other object,” in other words, no two things in this
universe are alike. Most common example is the human fingerprints; they are unique, permanent and
prove individuality of a person. Even the twins did not have the same fingerprints. Consider grains of
sand, salt, seeds or man-made objects such as currency notes, laptop, typewriter, etc. they may look
similar but a unique characteristic is always present between them.
2) Law of Progressive Change –
This principle emphasizes that, “Everything changes with the passage of time and nothing remains
constant. “The changing frequency varies from sample to sample and on different objects. The crime
scene must be secured in time otherwise a change in weather (rain, heat, wind), presence of
animals/humans, etc. affects the crime scene. For example, a road accident on a busy highway may
lose all essential evidence if not properly secured on time.
3) Locard’s principle of Exchange (Law of exchange) –
This principle was stated by French scientist -Edmond Locard (a pioneer in criminology and forensic
science). Law of exchange states that, “As soon as two things come in connection with each other,
they mutually interchange the traces between them.” Whenever criminal or his weapon/instrument
made connection with the victim or the things surrounding him he left some traces at crime scene and
also picked up the traces from the area or person he has been in contacted with (mutual exchange of
matter). These traces are very helpful for investigation purposes as these traces are identified by the
expert and linked to its original source resulted in the decisive linkage of the criminal with the crime
scene and the victim. This law forms the basis of scientific crime investigation.
4) Principle of Comparison –
For laboratory Investigation this law is very important. The law state that “Only the likes can be
compared”. It highlights the requirement of providing like samples and specimens for evaluation with
the questioned items’
6
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
For example, if the murder is done by a firearm weapon, then it is useless to send a knife for
comparison. So, the important condition of this principle is to supply specimen/samples of like nature
for proper assessment with the questioned sample discovered from the crime scene.
5) Principle of Analysis –
This principle states that, “The quality of any analysis would be better by collection of correct samples
and its correct preservation in the prescribed manner”. This leads to better result and avoid tampering,
contamination and destruction of a sample. If you collect a hard disk in a paper bag, it can be damaged
when it falls within the range of a strong electromagnetic field resulted in poor results. Hence, always
appropriate and effective collection and packaging techniques must be used.
6) Law of Probability –
This law states that, “All identifications (definite or indefinite), made consciously or unconsciously
on the basis of probability.” The perpetrator blood group is also the blood group of various people is
high, but the probability of the same occurring in the case is low.
7) Law of Circumstantial facts -
According to this law, “Facts cannot be wrong, they cannot lie not wholly absent but men can and do.”
This law emphasizes the significance of circumstantial facts and supports that a statement given by a
human may or may not be accurate. In an investigation identified and discovered facts are more
accurate and reliable than any eyewitness.
Forensic science by these principles is used for recognition, identification; individualization of pieces
of evidence collected from the scene of crime and guides the criminal proceedings from the discovery
of a crime to the conviction of the accused, helping the process of investigation.
7
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
used as a synonym for computer forensics but has expanded to cover the investigation of all devices
that store digital data.
As society increases reliance on computer systems and cloud computing, digital forensics becomes a
crucial aspect of law enforcement agencies and businesses. Digital forensics is concerned with the
identification, preservation, examination and analysis of digital evidence, using scientifically accepted
and validated processes, to be used in and outside of a court of law. While its root stretch back to the
personal computing revolution in the late 1970s, digital forensics begun to take shape in the 1990s
and it wasn't until the early 21st century that countries like the United States begun rolling out nation-
wide policies. Today, the technical aspect of an investigation is divided into five branches that
encompass the seizure, forensic imaging and analysis of digital media.
Computer forensics:
Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
tapes, etc.) for evidence. In other words, computer forensics is the collection, preservation, analysis,
and presentation of computer-related evidence. Computer forensics also referred to as computer
forensic analysis, electronic discovery, electronic evidence discovery, digital discovery, data
recovery, data discovery, computer analysis, and computer examination. Computer evidence can be
useful in criminal cases, civil disputes, and human resources/ employment proceedings.
Mobile forensics:
The National Institute of Standards and Technology (NIST) defines mobile forensics or cell phone
forensics as "the science of recovering digital evidence from a mobile phone under forensically sound
conditions using accepted methods." It is one of the specialties under digital forensics.
Network Forensics:
“Network forensics is a science that centers on the discovery and retrieval of information surrounding
a cybercrime within a networked environment. Common forensic activities include the capture,
recording and analysis of events that occurred on a network in order to establish the source of
cyberattacks.”
8
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Database Forensics:
Database forensics is a branch of digital forensics related to databases and their related metadata.
Cached information may also exist in a server's RAM requiring live analysis techniques. A forensic
examination of a database may relate to timestamps that apply to the update time of a row in a
relational database that is being inspected and tested for validity to verify the actions of a database
user. Alternatively, it may focus on identifying transactions within a database or application that
indicate evidence of wrongdoing, such as fraud.
Forensic image:
A forensic image (forensic copy) is a bit-by-bit, sector-by-sector direct copy of a physical storage
device, including all files, folders and unallocated, free and slack space.
Digital footprint:
A digital footprint – sometimes called a digital shadow or an electronic footprint – refers to the trail
of data you leave when using the internet. It includes websites you visit, emails you send, and
information you submit online.
9
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Digital forensics experts are also hired by the private sector as part of cybersecurity and information
security teams to identify the cause of data breaches, data leaks, cyber-attacks and other cyber threats.
Digital forensic analysis may also be part of incident response to help recover or identify any sensitive
data or personally identifiable information (PII) that was lost or stolen in a cybercrime.
10
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
The type of data analyzed varies but will generally include email, chat logs, images, internet history
and documents. The data can be recovered from accessible disk space, deleted space or from the
operating system cache.
4. Reporting: Once the investigation is complete, the information is collated into a report that is
accessible to non-technical individuals. It may include audit information or other meta documentation.
11
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
5. Internet analysis tools
6. Email analysis tools
7. Mobile devices analysis tools
8. Mac OS analysis tools
9. Network forensics tools
10. Database forensics tools
Some of the tools we use -
1. Autopsy
2. FTK image
3. Wireshark
COMPUTER CRIME:
Computer crime or alternatively referred to as cyber-crime, e-crime, electronic crime, or hi-tech crime.
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a
hacker that illegally browses or steals a company's or individual's private information.
In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt
the computer or data files. Why do people commit computer crimes? In most cases, someone commits
a computer crime to obtain goods or money. Greed and desperation are powerful motivators for some
people to try stealing by way of computer crimes. Some people may also commit a computer crime
because they are pressured, or forced, to do so by another person. Some people also commit a
computer crime to prove they can do it. A person who can successfully execute a computer crime may
find great personal satisfaction in doing so. These types of people, sometimes called black hat hackers,
like to create chaos, wreak havoc on other people and companies. Another reason computer crimes
are sometimes committed is because people are bored. They want something to do and don't care if
they commit a crime.
Examples of computer crimes Below is a list of the different types of computer crimes today. Clicking
any of the links gives further information about each crime.
Child pornography - Making, distributing, storing, or viewing child pornography.
12
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Copyright violation - Stealing or using another person's Copyrighted material without permission.
Cracking - Breaking or deciphering codes designed to protect data.
Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
Cyberbully or Cyberstalking - Harassing or stalking others online.
Cybersquatting - Setting up a domain of another person or company with the sole intention of
selling it to them later at a premium price.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)
Data diddling - Computer fraud involving the intentional falsification of numbers in data entry.
Denial of Service attack - Overloading a system with so many requests it cannot serve normal
requests.
Doxing - Releasing another person's personal information without their permission.
Espionage - Spying on a person or business.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or
participating in credit card fraud.
Green Graffiti - A type of graffiti that uses projectors or lasers to project an image or message onto
a building. Harvesting - Collect account or account-related information on other people.
Human trafficking - Participating in the illegal act of buying or selling other humans. Identity
theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic
substances.
Intellectual property theft - Stealing practical or conceptual information developed by another
person or company.
IPR violation - An intellectual property rights violation is any infringement of another's Copyright,
patent, or trademark.
Phishing or vishing - Deceiving individuals to gain private or personal information about that
person.
Ransomware - Infecting a computer or network with ransomware that holds data hostage until a
ransom is paid.
13
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Salami slicing - Stealing tiny amounts of money from each transaction.
Scam - Tricking people into believing something that is not true.
Slander - Posting libel or slander against another person or company.
Software piracy - Copying, distributing, or using software that was not purchased by the user of
the software. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different
addresses.
Spoofing - Deceiving a system into thinking you are someone you're not.
Swatting - The act of calling in a false police report to someone else's home.
Theft - Stealing or taking anything (e.g., hardware, software, or information) that doesn't belong to
you.
Typosquatting - Setting up a domain that is a misspelling of another domain.
Unauthorized access - Gaining access to systems you have no permission to access.
Vandalism - Damaging any hardware, software, website, or other object.
Wiretapping - Connecting a device to a phone line to listen to conversations.
CRIMINALISTICS:
The criminal justice system in America is the overarching establishment through which crimes and
those who commit them are discovered, tried, and punished. This includes all of the institutions of
government aimed at upholding social order, deterring and mitigating crime, and sanctioning those
who violate the law, such as law enforcement and the court and jail systems.
Criminology and criminalistics are two subsets of the criminal justice system. Criminology relates to
studying and preventing crime—typically with behavioral sciences like sociology, psychology, and
anthropology. Criminalistics refers to a type of forensics—the analysis of physical evidence from a
crime scene. While criminology has preventative components, criminalistics comes into effect only
after a crime has been committed.
A criminalist applies scientific principles to the recognition, documentation, preservation, and analysis
of physical evidence from a crime scene. Criminalistics can also include crime scene investigations.
14
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
The Bureau of Labor Statistics (BLS) classifies criminalists as forensic science technicians. Most
professionals regard criminalistics as a specialty within the field of forensic science.
15
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
16
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
17
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Criminalists determine what evidence was collected, discuss the preliminary scene findings with
scene personnel, discuss potential forensic tests that will take place, and initiate any action required
to complete the crime scene investigation.
18
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
• Data Volume and Complexity: The sheer volume and complexity of digital data require
advanced tools and methodologies to process, analyze, and derive meaningful insights for
investigations.
• Attribution and Jurisdiction: Identifying and attributing cybercrimes to specific individuals or
groups across international borders poses significant challenges in terms of jurisdiction and legal
frameworks.
• Emerging Threats: Constantly evolving tactics of cybercriminals, including AI-based attacks,
ransomware, and supply chain vulnerabilities, demand ongoing research and adaptive strategies.
19
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
20
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
In conclusion, a holistic approach to cyber-forensics is essential in today's complex digital landscape.
It integrates technical, legal, and procedural aspects, enabling a comprehensive understanding of cyber
incidents and facilitating more robust responses to mitigate risks and protect digital assets.
21
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
crimes. This dynamic nature allows cybercriminals to constantly adapt and evolve their tactics
to avoid detection.
• Impact on Society and Individuals: Cybercrime poses significant threats to individuals'
privacy, financial security, and personal safety, as well as to the stability of businesses and
critical
infrastructure. It can disrupt services, steal sensitive information, and undermine trust in digital
systems.
Legal Aspects of Digital Forensics, IT Act 2000 and amendment of IT Act 2008:
The Information Technology (IT) Act, 2000 is a significant legislation in India that deals with various
aspects of electronic communication, digital records, and cybersecurity. Over the years, several
amendments have been made to the Act to address emerging challenges and technological
advancements. One of the key amendments was the Information Technology (Amendment) Act, 2008.
Information Technology Act, 2000:
Overview: The IT Act, 2000 was enacted to provide legal recognition for electronic records and
facilitate e-commerce, e-governance, and other online activities. It addresses issues related to digital
signatures, hacking, data protection, and electronic communication.
Key Provisions:
1. Digital Signatures: Recognizes digital signatures as legally valid and provides the framework for
their usage.
2. Cybercrimes and Offenses: Criminalizes unauthorized access, hacking, data theft, and computer-
related offenses.
22
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
3. Data Protection and Privacy: Addresses issues related to data protection, privacy, and confidentiality
of electronic information.
4. Role in Digital Forensics: The IT Act, 2000 plays a crucial role in digital forensics by providing
legal validity to electronic evidence and establishing procedures for its collection, preservation, and
presentation in courts.
23
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
3. Chain of Custody: It emphasizes maintaining the integrity and chain of custody of digital evidence
to ensure its admissibility in court, outlining proper procedures for its collection, preservation, and
presentation.
4. Penalties and Enforcement: The Act stipulates penalties for various cyber offenses, allowing law
enforcement agencies to take action against offenders and ensuring a legal framework for prosecuting
cybercriminals.
Understanding the legal aspects outlined in the IT Act and its subsequent amendments is crucial for
digital forensic practitioners, law enforcement personnel, and legal professionals involved in handling
electronic evidence and investigating cybercrimes.
3. Which type of evidence involves the examination of blood, hair, and bodily fluids?
- a) Trace evidence - b) Biological evidence
- c) Physical evidence - d) Digital evidence
24
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. What term refers to unauthorized access to computer systems with malicious intent?
- a) Hacking
- b) Phishing
- c) Spoofing
- d) Cyberbullying
5. What is ransomware?
- a) Malicious software that steals personal information
- b) Malware that encrypts files and demands payment for their release
- c) A type of computer virus
- d) Software used for ethical hacking
Study Material
- c) Collecting and preserving evidence
- d) All of the above
10. The Information Technology (IT) Act of 2000 in India primarily deals with:
- a) Cybersecurity
- b) Digital forensics
- c) Intellectual property rights
- d) Cybercrimes and e-commerce
11. Which amendment in the IT Act 2000 expanded the definition of cybercafés and their
responsibilities?
- a) Amendment of 2006
- b) Amendment of 2008
- c) Amendment of 2010
- d) Amendment of 2012
12. According to the IT Act 2000, what does "unauthorized access" refer to?
- a) Accessing personal emails
- b) Accessing computer systems without permission
- c) Accessing social media profiles
- d) Accessing public domain information
26
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
13. What is the punishment for hacking under the IT Act 2000?
- a) Imprisonment up to 3 years and/or a fine
- b) Imprisonment up to 5 years and/or a fine
- c) Imprisonment up to 7 years and/or a fine
- d) Imprisonment up to 10 years and/or a fine
14. The IT Amendment Act of 2008 introduced a new offense related to:
- a) Cyberstalking
- b) Cyber terrorism
- c) Cyber espionage
- d) Cyber defamation
15. What is the term used in the IT Act 2000 for the person responsible for maintaining the electronic
record?
- a) Record Keeper
- b) Data Custodian
- c) System Administrator
- d) Certifying Authority
16. According to the IT Amendment Act 2008, what is the maximum punishment for sending
offensive messages through communication services?
- a) Imprisonment up to 3 years and/or a fine
- b) Imprisonment up to 5 years and/or a fine
- c) Imprisonment up to 7 years and/or a fine
- d) Imprisonment up to 10 years and/or a fine
17. What is the legal term for the process of validating and ensuring the integrity of digital evidence
in court?
27
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- a) Digital authentication
- b) Chain of custody
- c) Legal preservation
- d) Digital admissibility
18. In the context of digital forensics, what does the term "chain of custody" refer to?
- a) A sequence of digital evidence
- b) A legal document describing the evidence
- c) The chronological documentation of evidence handling
- d) The physical security of digital devices
19. Which section of the IT Act 2000 deals with the punishment for publishing or transmitting obscene
material?
- a) Section 66A
- b) Section 67
- c) Section 69
- d) Section 70
20. According to the IT Amendment Act 2008, what is the punishment for identity theft?
- a) Imprisonment up to 3 years and/or a fine
- b) Imprisonment up to 5 years and/or a fine
- c) Imprisonment up to 7 years and/or a fine
- d) Imprisonment up to 10 years and/or a fine
21. The IT Amendment Act 2008 introduced the concept of "digital signature certificate" under which
section?
- a) Section 14
- b) Section 15
28
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- c) Section 16
- d) Section 17
22. What is the primary purpose of digital signature certificates under the IT Act 2000?
- a) Ensuring data confidentiality
- b) Ensuring data availability
- c) Ensuring data integrity
- d) Ensuring data authenticity
23. In the context of the IT Act 2000, what does the term "intermediary" refer to?
- a) A software developer
- b) An internet service provider
- c) A computer hardware manufacturer
- d) A government agency
24. Which section of the IT Act 2000 deals with the punishment for breach of confidentiality and
privacy?
- a) Section 66
- b) Section 67
- c) Section 72
- d) Section 74
25. The IT Amendment Act 2008 inserted a new section dealing with:
- a) Cyber defamation
- b) Cyber terrorism
- c) Cyberstalking
- d) Cyber espionage
29
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
26. According to the IT Act 2000, which section deals with the power to investigate offenses?
- a) Section 65
- b) Section 66
- c) Section 67
- d) Section 68
27. What does the term "adjudicating officer" mean in the context of the IT Act 2000?
- a) A legal expert
- b) An officer appointed to resolve disputes and impose penalties
- c) A forensic analyst
- d) A law enforcement officer
28. Which section of the IT Act 2000 deals with the punishment for tampering with source code?
- a) Section 65
- b) Section 66
- c) Section 67A
- d) Section 69
29. What is the term used for the process of converting plaintext into an unreadable format to secure
information during transmission?
- a) Decryption
- b) Hashing
- c) Encryption
- d) Compression
30. Under the IT Amendment Act 2008, what is the punishment for attempting to commit an offense?
- a) Half of the punishment for the actual offense
- b) Same punishment as the actual offense
30
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
31
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
24. c) Section 72
25. a) Cyber defamation
26. d) Section 68
27. b) An officer appointed to resolve disputes and impose penalties
28. c) Section 67A
29. c) Encryption
30. a) Half of the punishment for the actual offense
2. Discuss the concept of jurisdiction in the context of cybercrimes. How do international boundaries
impact the investigation and prosecution of cybercriminals? Provide specific examples.
3. Describe the key steps involved in a cyber forensics investigation. How does the process differ
from traditional forensic investigations, and what challenges may arise in collecting and preserving
digital evidence?
32
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. Analyze the significance of the IT Act 2000 in addressing cybercrimes in India. Highlight the key
provisions and penalties outlined in the Act and discuss any major amendments introduced by the IT
Amendment Act of 2008.
5. Elaborate on the role of digital signature certificates in the legal framework of the IT Act 2000.
How do they contribute to the authenticity and integrity of electronic records, and what legal
implications arise in their use?
6. Explain the concept of chain of custody in forensic science. Discuss its importance in maintaining
the integrity of evidence during the investigative process, and outline the potential consequences of a
compromised chain of custody.
7. Discuss the challenges law enforcement faces in attributing cybercrimes to specific individuals or
entities. Explore the role of anonymity, encryption, and advanced hacking techniques in complicating
cybercrime investigations.
8. Evaluate the role of digital forensics in addressing corporate cyber incidents. Discuss how digital
forensics techniques can be employed to investigate data breaches, insider threats, and other cyber
incidents affecting organizations.
9. Examine the legal provisions related to cyber defamation under the IT Act 2000 and its
amendments. Discuss the challenges in prosecuting and proving cyber defamation cases, and suggest
potential improvements to the legal framework.
10. Analyze the impact of the IT Amendment Act 2008 on enhancing cybersecurity measures in India.
Discuss the new offenses introduced and their implications for individuals, businesses, and law
enforcement agencies involved in the digital space.
33
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
MODULE II: INCIDENT-RESPONSE METHODOLOGY, CYBERCRIME
SCENE ANALYSIS
Incident response:
Incident response is a structured approach to addressing and managing the aftermath of a cybersecurity
incident or breach. The primary goal of incident response is to limit the damage and reduce recovery
time and costs. The process typically follows a well-defined methodology, which can be summarized
in the following phases:
1. Preparation:
- Establish an incident response team and define roles and responsibilities.
- Develop an incident response plan that includes procedures, communication strategies, and
escalation paths.
- Conduct regular training and drills to ensure the team is prepared to handle incidents effectively.
2. Identification:
- Detect and identify potential security incidents through monitoring, alerting systems, and other
security measures.
- Classify the incident based on severity and impact.
- Confirm whether an incident has occurred and gather initial information.
3. Containment:
- Isolate the affected systems to prevent further damage or unauthorized access.
- Implement temporary fixes or workarounds to minimize the impact.
- Determine the extent of the compromise and the affected assets.
4. Eradication:
- Identify and remove the root cause of the incident.
34
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- Patch vulnerabilities and eliminate the threat actor's presence from the environment.
- Review and update security controls to prevent similar incidents in the future.
5. Determining tools:
- Determining the tools for cybercrime scene analysis is crucial for effective incident response.
Initially, identify tools for real-time monitoring, such as intrusion detection systems.
- For evidence collection and analysis, digital forensics tools like EnCase or Forensic Toolkit are
essential.
- Network analysis tools like Wireshark aid in understanding communication patterns. Additionally,
malware analysis tools, such as IDA Pro or VirusTotal, help dissect malicious code. Open-source tools
like volatility for memory analysis and log analysis tools like ELK Stack can also be invaluable.
- The selection should align with the incident type, ensuring a comprehensive approach to evidence
gathering and analysis throughout the cybercrime investigation process.
6. Recovery:
- Restore systems and data to a trusted state.
- Validate the integrity of restored systems.
- Monitor for any signs of continued malicious activity.
7. Lessons Learned:
- Conduct a post-incident analysis to understand the root causes and contributing factors.
- Document lessons learned and update incident response plans and procedures accordingly.
- Share insights with relevant stakeholders to improve overall security posture.
8. Communication:
- Maintain open and transparent communication with internal and external stakeholders.
- Notify relevant parties such as customers, regulatory bodies, and law enforcement, as required.
35
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- Coordinate with public relations to manage the organization's public image.
9. Documentation:
- Document all actions taken during the incident response process.
- Keep a record of findings, remediation steps, and communication logs.
- This documentation aids in future incident investigations and improvements.
36
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
A Guide for First Responders,” which provides guidelines for U.S. law enforcement and other
responders who protect an electronic crime scene and search for, collect, and preserve electronic
evidence.
Following are the general tasks investigators perform when working with digital evidence:
• Identify digital information or artifacts that can be used as evidence.
• Collect, preserve, and document evidence.
• Analyze, identify, and organize evidence.
• Rebuild evidence or repeat a situation to verify that the results can be reproduced reliably. Collecting
computers and processing a criminal or incident scene must be done systematically.
Study Material
Establish a Response Team:
Assemble a dedicated incident response team within the organization, comprising individuals with
expertise in digital forensics, IT security, legal affairs, and management.
Document the Incident:
Begin by documenting the incident details, including the date and time of discovery, a brief description
of the incident, and initial actions taken. Thorough documentation is crucial for legal and investigative
purposes.
Preserve the Scene:
Take immediate steps to preserve the integrity of the incident scene. Isolate affected systems and
networks to prevent further damage or compromise. Document physical and environmental
conditions.
Legal Considerations:
Understand and adhere to local and international laws governing the collection and handling of digital
evidence. Consult legal counsel to ensure that the investigation aligns with legal requirements.
Obtain Necessary Authorizations:
If applicable, obtain legal authorization to investigate and collect evidence. This may involve obtaining
search warrants, subpoenas, or other court orders, depending on the jurisdiction and the nature of the
incident.
Digital Forensic Tools:
Use specialized digital forensic tools to collect evidence from affected systems. Ensure that these tools
are up-to-date, forensically sound, and well-documented. Employ write-blocking devices to prevent
inadvertent data alterations.
Chain of Custody:
Establish and maintain a chain of custody for all collected evidence. Document every person who
handles the evidence, from the initial collection to its presentation in court. This documentation is
crucial for establishing the evidence's reliability.
38
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Volatility of Evidence:
Recognize the volatility of digital evidence. Collect volatile data first, such as network connections
and running processes, before proceeding to non-volatile data like file systems. Minimize the time
between discovery and collection.
Network Traffic Analysis:
Analyze network traffic logs and capture relevant data to understand the scope and nature of the
incident. Identify communication patterns, potential attack vectors, and affected systems.
Interviews and Statements:
Conduct interviews with individuals who may have information about the incident. Obtain statements
from relevant personnel and witnesses. This information can provide context and aid in the
investigation.
Evidence Documentation:
Document the collected evidence thoroughly, including details such as file paths, timestamps, and hash
values. Maintain a comprehensive record of findings, actions taken, and tools used during the
investigation.
Data Privacy and Confidentiality:
Respect data privacy and confidentiality concerns. Handle sensitive information with care and ensure
that the investigation complies with the organization's privacy policies and legal requirements.
Collaborate with Law Enforcement:
If necessary, collaborate with law enforcement agencies. Provide them with the required information
and evidence, and follow any legal procedures for cooperation.
Incident Report:
Prepare a detailed incident report summarizing the findings, actions taken, and lessons learned. This
report can be crucial for internal reviews, legal proceedings, and future incident response
improvements.
Post-Incident Analysis:
Conduct a post-incident analysis to identify vulnerabilities, weaknesses, or gaps in security. Use the
insights gained to enhance the organization's security posture.
39
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
By following these guidelines, organizations in the private sector can conduct effective and legally
compliant incident response and digital forensics activities, contributing to a thorough understanding
of security incidents and facilitating appropriate remediation measures.
Understanding the concepts and terms used in warrants:
It is crucial for legal professionals, law enforcement, and individuals involved in legal processes. Here
are some key concepts and terms related to warrants:
Warrant:
A legal document issued by a court or magistrate authorizing law enforcement to perform a specific
act, such as a search, seizure, or arrest.
Types: Search warrant, arrest warrant, bench warrant, etc.
Affidavit:
A written statement made under oath or affirmation, often by a law enforcement officer, used to support
the issuance of a warrant.
Purpose: Provides facts and evidence to establish probable cause.
Probable Cause:
A standard of evidence indicating that it is more likely than not that a crime has occurred or that
evidence of a crime can be found in a particular location.
Requirement: Necessary for the issuance of search and arrest warrants.
Particularity:
The requirement that a warrant must specify with particularity the place to be searched or the person
or things to be seized.
Purpose: Prevents general searches and ensures the focus is on specific evidence or individuals.
Execution of Warrant:
Carrying out the actions authorized by the warrant, such as conducting a search or making an arrest.
Guidelines: Law enforcement must follow the specified instructions in the warrant, respecting legal
limitations.
No-Knock Warrant:
A warrant that allows law enforcement to enter a property without announcing their presence.
40
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Conditions: Typically granted when announcing their presence could jeopardize officer safety or result
in the destruction of evidence.
Exclusionary Rule:
A legal principle that prohibits the use of evidence obtained in violation of a person's Fourth
Amendment rights.
Outcome: Evidence obtained through an illegal search or seizure is excluded from court proceedings.
Good Faith Exception:
An exception to the exclusionary rule that allows evidence to be admitted if law enforcement believed
in good faith that their actions were legal.
Conditions: Applies when officers reasonably relied on a warrant later found to be invalid.
Return of Warrant:
The documentation provided by law enforcement to the court after executing a warrant, detailing the
actions taken and items seized.
Purpose: Ensures transparency and accountability in the execution of the warrant.
Ride-Along Warrant:
A warrant that allows non-law enforcement personnel, such as journalists or observers, to accompany
officers during the execution of a warrant.
Conditions: May be subject to court approval and specific limitations.
Seal of the Warrant:
The court may order the warrant to be sealed, restricting public access to its contents for a certain
period.
Purpose: Protects ongoing investigations and sensitive information.
Anticipatory Warrant:
A warrant issued based on the anticipation that a crime will occur, usually contingent on specific
conditions being met.
Conditions: Often used in cases involving controlled deliveries or undercover operations.
Understanding these concepts and terms is essential for ensuring that the legal processes involving
warrants are carried out properly, with respect for individuals' rights and adherence to legal standards.
41
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Legal professionals and law enforcement personnel should be familiar with the nuances of warrant-
related terminology to navigate the legal landscape effectively.
Various court orders:
Court orders related to cybercrime scene analysis are legal directives issued by courts to gather
evidence and investigate cybercrime incidents. These orders are crucial for law enforcement agencies
and investigators to carry out forensic analysis, collect digital evidence, and identify and prosecute
cybercriminals.
Several types of court orders may be relevant to cybercrime scene analysis:
1. Search Warrant:
Purpose: Authorizes law enforcement to search specific premises for evidence related to a
cybercrime.
Application: Investigators must demonstrate probable cause to believe that evidence of a crime exists
at the specified location.
2. Seizure Warrant:
Purpose: Permits the seizure of specific items or assets related to a cybercrime.
Application: Similar to a search warrant, investigators must provide evidence of the need to seize
particular items.
3. Production Order:
Purpose: Compels an individual or entity to produce specific documents, records, or information
relevant to a cybercrime investigation.
Application: Investigators must convince the court that the requested information is essential to the
investigation.
4. Pen Register/Trap and Trace Order:
Purpose: Allows law enforcement to monitor and record incoming and outgoing electronic
communications (such as phone numbers dialed and IP addresses contacted) in real-time.
Application: Requires a demonstration of relevance to an ongoing investigation.
42
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
5. Surveillance Order:
Purpose: Grants permission for the interception and monitoring of electronic communications,
including emails, chat messages, and other forms of online communication.
Application: Requires a high level of justification and typically involves a high standard of proof.
6. Data Preservation Order:
Purpose: Directs individuals or entities to preserve and protect specific digital evidence from
alteration or destruction.
Application: Issued to prevent the loss of critical evidence before a formal investigation can take
place.
7. Ex Parte Order:
Purpose: Allows law enforcement to obtain a court order without notifying the subject of the
investigation.
Application: Used when notifying the subject might jeopardize the investigation or lead to evidence
destruction.
8. International Mutual Legal Assistance Treaty (MLAT) Requests:
Purpose: Enables law enforcement in one country to seek assistance from another country in obtaining
evidence for a cybercrime investigation.
Application: Follows international legal agreements and protocols for cross-border cooperation.
It's important to note that the specifics of these court orders can vary by jurisdiction, and legal
procedures must be followed diligently to ensure the admissibility of evidence in court. Additionally,
the legal landscape in the realm of cybercrime is continually evolving, and new regulations and court
decisions may impact the tools available to law enforcement for investigating and prosecuting
cybercriminal activities.
43
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
44
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. Live Forensics:
Description: Analyzing a computer or device in real-time while it is still running.
Process: Skilled forensic examiners use specialized tools to collect volatile data without shutting down
the system.
Application: Useful when immediate analysis is necessary, but it requires expertise to avoid altering
the system's state.
Study Material
in court. Additionally, the involvement of trained digital forensics experts is essential to maintaining
the integrity of the evidence throughout the process.
Electronic evidence:
Electronic evidence is the lifeblood of cyber-crime scene analysis, offering crucial clues to reconstruct
events, identify perpetrators, and build a solid case. Analyzing these digital footprints requires
meticulous methodology and expertise to ensure their integrity and admissibility in court. Let's delve
into the different types of electronic evidence and their potential insights:
2. User Activity:
Browser history and bookmarks: These reveals visited websites, searched keywords, and
downloaded files, painting a picture of the user's online activities.
Email records: Sent, received, and deleted emails can uncover communication exchanges, document
transfer, and potential evidence of phishing or spamming.
Chat logs and instant messages: Conversations on various platforms shed light on communication
with accomplices, victim interactions, and planning details.
46
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Document edits and revisions: Tracking changes made to documents within word processors,
spreadsheets, or presentations can expose hidden text, deleted information, and collaboration patterns.
3. Network Evidence:
Firewall logs: These logs track network traffic entering and leaving the device, potentially revealing
connections to malicious servers or suspicious IP addresses.
DNS records: Domain Name System records map website names to IP addresses, showing which
websites were accessed and when.
Network sniffing captures: Analyzing captured network traffic can uncover hidden data transfers,
malware communication, and even identify compromised devices on the network.
Study Material
• Timeline construction: By correlating timestamps from various sources, analysts can establish a
chronological sequence of events, revealing crucial context and perpetrator actions.
Conclusion:
Electronic evidence, despite its complexities, offers invaluable insights into the digital footprints of
cybercrime. Through meticulous analysis and interpretation, these clues can illuminate the who, what,
where, and why of cyberattacks, contributing significantly to building successful investigations and
bringing perpetrators to justice.
2. Which phase of incident response involves collecting and analyzing data to determine the scope and
impact of the incident?
- a. Preparation
- b. Identification
- c. Containment
- d. Eradication
48
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. Which of the following is NOT a primary objective during the containment phase of incident
response?
- a. Limiting damage
- b. Restoring services
- c. Identifying the attacker
- d. Preventing further compromise
6. Which of the following is a critical aspect of preserving the cybercrime scene integrity?
- a. Sharing information with the public
- b. Allowing unauthorized personnel access
- c. Documenting actions taken
- d. Ignoring potential witnesses
8. During cybercrime scene analysis, what does the term "volatile data" refer to?
- a. Data that changes frequently
- b. Encrypted data
- c. Archived data
- d. Data stored in cloud servers
49
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
9. What legal instrument is often required for law enforcement to conduct a search and seizure in
digital investigations?
- a. Cybersecurity policy
- b. Search warrant
- c. Subpoena
- d. Arrest warrant
10. Which court order is used to compel a person to testify or produce evidence in a cybercrime
investigation?
- a. Search warrant
- b. Subpoena
- c. Arrest warrant
- d. Bench warrant
11. What is a National Security Letter (NSL) commonly used for in the context of cybercrime
investigations?
- a. Gaining access to classified information
- b. Requesting financial records
- c. Compelling disclosure of information without a warrant
- d. Conducting surveillance on suspects
12. In cybercrime investigations, what does a preservation order typically instruct the parties involved
to do?
- a. Destroy evidence
- b. Maintain and protect evidence
- c. Share evidence with the public
- d. Submit evidence to the court
13. What is the term for data that is stored on a computer or electronic device and can be used as
evidence in court?
- a. Analog data
- b. Electronic evidence
- c. Physical evidence
- d. Hearsay evidence
50
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
51
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
20. When conducting electronic evidence analysis, what is the significance of the term "file slack"?
- a. Unused space on a storage device
- b. Hidden files
- c. Encrypted files
- d. Compressed files
Answers:
1. b. System recovery
2. b. Identification
3. d. All of the above
4. c. Identifying the attacker
5. b. Securing the scene
6. c. Documenting actions taken
7. a. Tracking the movement of evidence
8. a. Data that changes frequently
9. b. Search warrant
10. b. Subpoena
11. c. Compelling disclosure of information without a warrant
12. b. Maintain and protect evidence
13. b. Electronic evidence
14. b. Data about data
15. b. RAM
16. b. Data hiding
17. c. Integrity verification
18. b. Timestamped document
19. c. Protecting evidence from being altered
20. a. Unused space on a storage device
52
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Explain the significance of the "Eradication" phase in incident response and its role in minimizing
the impact of a cybersecurity incident.
2. Describe three key elements that should be included in a comprehensive digital forensic readiness
plan to enhance an organization's ability to respond to incidents effectively.
3. In the context of cyber crime scene analysis, discuss the importance of preserving the integrity of
digital evidence and provide three practical steps investigators can take to achieve this goal.
4. Explain the term "volatile data" in the context of cyber crime scene analysis, and provide examples
of volatile data sources that investigators should prioritize during an examination.
5. Differentiate between a search warrant and a subpoena in the context of cyber crime investigations.
Provide examples of situations where each might be utilized.
6. Discuss the role of a National Security Letter (NSL) in cyber crime investigations, highlighting its
legal implications and the circumstances under which it might be issued.
7. Define metadata in the context of digital forensics, and explain its significance in analyzing
electronic evidence. Provide an example of how metadata can be crucial in an investigation.
8. Discuss the importance of maintaining a proper chain of custody for electronic evidence. Identify
three potential challenges investigators may face in preserving the chain of custody and suggest
strategies to overcome them.
53
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Explain the key phases of an incident response methodology in digital forensics. For each phase,
elaborate on the specific tasks and objectives that contribute to an effective incident response strategy.
2. Discuss the role and significance of a search warrant in the context of cyber crime scene analysis.
Explain the legal requirements for obtaining a search warrant and how it ensures the admissibility of
evidence in court.
3. Describe the concept of digital forensics and its role in analyzing electronic evidence. Provide
examples of electronic evidence types and explain the challenges associated with preserving and
analyzing such evidence.
4. Explain the significance of the chain of custody in handling electronic evidence. Discuss the
potential consequences of a poorly maintained chain of custody in the context of a digital forensic
investigation.
5. Explore the concept of steganography in the realm of electronic evidence. Provide examples of how
steganography is used, and discuss the challenges it presents for digital forensic investigators.
6. Discuss the legal implications of electronic evidence, focusing on issues such as authentication,
admissibility, and the role of expert witnesses in presenting electronic evidence in court.
54
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
55
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
encrypted file, message or network packet payload is clearly marked and identifiable as such, using
steganographic techniques helps to obscure the presence of a secure channel.
Steganography software is used to perform a variety of functions, including the following:
• Hiding data, including encoding the data to prepare it to be hidden inside another file.
• Keeping track of which bits of the cover text file contain hidden data.
Proprietary and open-source programs are available to do steganography. OpenStego is one open-source
steganography program. Other programs can be characterized by the types of data that can be hidden,
as well as what types of files that data can be hidden inside. Some online steganography software tools
include Xiao Steganography, used to hide secret files in BMP images or WAV files; Image
Steganography, a JavaScript tool that hides images inside other image files; and Crypture, a command-
line tool.
Metadata Extraction: Files often contain metadata, which is information about the file itself. This can
include details such as authorship, creation date, and editing history. Extracting metadata can provide
additional insights into a document.
Metadata extraction is a crucial aspect of digital forensics that involves retrieving hidden information,
known as metadata, from digital files. This information can be used to reconstruct events that occurred
on a device and can provide valuable insights into the activities of a suspect. One of the key techniques
in digital forensic investigations is the recovery of file system metadata, which can be used to recover
metadata when it is not possible to obtain metadata in a regular manner because the file system
structure is damaged due to an accident, disaster, or cyber terrorism.
In a recent study, researchers proposed a recovery method for records without fixed values in the
metadata file of the New Technology File System (NTFS), which is one of the most used file systems
56
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
at present. The proposed method was implemented as a tool and verified through comparative
experiments with existing forensic tools that recover LogFiledata. The experimental results showed
that the proposed recovery method was able to recover all the data that existing tools are unable to
recover in situations where the LogFile data were damaged.
There are several metadata extraction tools available that can help you uncover valuable data about
your digital files, such as the camera settings used, the location of the image, the creation date, and
more. Some of the popular metadata extraction tools include ExifTool, Daminion, and Forensic Toolkit
(FTK).
Study Material
identify both regular patterns and irregular deviations. Methodologies for capturing and recording
network packets, the role of flow data in summarizing complex interactions, and the use of intrusion
detection systems (IDS) and intrusion prevention systems (IPS) to monitor real-time network activities
are all examined in this paper. Also, the review dives into utilizing AI and man-made reasoning
methods for prescient investigation and inconsistency identification inside network traffic.
58
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Digital Watermarking:
In some cases, data is intentionally hidden using digital watermarking techniques. Extracting this
hidden information requires specialized algorithms and tools.
Watermarking is a technique used in digital forensics to identify, trace and protect digital content. It
embeds a unique, hidden mark (usually an image, logo or text message) into a digital file or video.
These watermarks are difficult to detect but can be traced back to the original source of the file/video.
This technique plays an important role in digital forensics by providing an effective means of storing
evidence, determining the originator of a digital file and verifying its authenticity. Watermarking
systems are used in various fields, including security, copyright protection, media analytics and
forensic analysis.
Web Scraping:
Extracting data from websites might involve finding and retrieving information that is not visible on
the surface. This could include hidden tags, elements loaded dynamically through JavaScript, or data
embedded in the HTML source.
Web scraping is a data extraction technique where automated scripts or tools extract information from
websites, parsing HTML or other structured data formats. It involves analyzing the website's structure,
sending HTTP requests, and parsing the received HTML to retrieve specific data elements. Web
scraping is used for various purposes, including gathering business intelligence, monitoring prices,
and aggregating content. However, it raises ethical and legal considerations, and practitioners should
be mindful of terms of service and potential impacts on the target website.
59
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Data Storage:
Data Storage Overview:
Data storage refers to the retention of information in a persistent manner for future retrieval and use.
In computing, data can be stored in various forms, ranging from physical media like hard drives to
cloud-based storage solutions.
Types of Data Storage:
Primary Storage (RAM): Volatile and fast storage used by the computer's processor to store and access
data actively during operations.
Secondary Storage (Hard Drives, SSDs): Non-volatile storage for long-term data retention, typically
larger in capacity but slower than RAM.
Tertiary Storage (Tapes, Optical Drives): Used for archiving and backup purposes, offering high
capacity but slower access times.
Storage Devices:
Hard Disk Drives (HDDs): Use magnetic storage for data on spinning disks.
Solid State Drives (SSDs): Utilize flash memory for faster and more reliable data storage.
Optical Storage (CDs, DVDs, Blu-rays): Uses lasers to read/write data on optical discs.
Tape Drives: Sequential storage using magnetic tape for backup and archival purposes.
Storage Hierarchy:
Data storage is often organized into a hierarchy based on speed and cost. Faster and more expensive
storage is used for frequently accessed data, while slower and cheaper storage is employed for archival
purposes.
60
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
In this hierarchy all the storage devices are arranged according to speed and cost. The higher levels
are expensive, but they are fast. As we move down the hierarchy, the cost per bit generally decreases,
whereas the access time generally increases.
The storage systems above the electronic disk are Volatile, where as those below are Non-Volatile.
An Electronic disk can be either designed to be either Volatile or Non-Volatile. During normal
operation, the electronic disk stores data in a large DRAM array, which is Volatile. But many electronic
disk devices contain a hidden magnetic hard disk and a battery for backup power. If external power is
interrupted, the electronic disk controller copies the data from RAM to the magnetic disk. When
external power is restored, the controller copies the data back into the RAM.
Data Backup and Recovery:
Establishing regular data backup procedures ensures data integrity and provides recovery options in
case of data loss or system failures. Backup strategies include full, incremental, and differential
backups. Understanding data storage and its structures is fundamental to effective data management,
ensuring that information is stored securely, efficiently, and is readily accessible when needed.
61
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Storage Structure:
Hard disk is organized into two different ways like as physical structure and logical structure; below shown
each one in detail, you can check them:
62
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Spindle: Help to connects all the platters and is connected to a motor. The motor of the spindle rotates
with a constant speed, causing the disk platter to spin at a constant speed.
Arm Assembly: It holds the read/write heads. The arm assembly is moved in or out to position a head
on a desired track.
NB:
Partitioning:
Storage devices can be partitioned into logical sections, each with its own file system. Partitions can
improve data organization, security, and management.
Formatting:
Formatting prepares a storage device for use by establishing a file system. Common file systems
include FAT32, NTFS, and exFAT in Windows, and ext4 in Linux.
63
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
File Systems:
File systems organize and store data on storage devices. They manage the hierarchy of files and
directories, providing a logical structure for data retrieval.
A file system gives an OS a road map to data on a disk. The type of file system an OS uses determines
how data is stored on the disk. When you need to access a suspect’s computer to acquire or inspect
data related to your investigation, you should be familiar with both the computer’s OS and file system
so that you can access and modify system settings when necessary.
Characteristics of NTFS:
Compatibility –
It supports compression of files and directories to optimize storage space.
Scalability –
It introduced with improved performance, scalable in comparison to its precursor.
64
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Efficiency –
It utilizes the disk space efficiently by using smaller size of clusters.
Attributes –
NTFS’s attributes Read-only, hidden, system, archive, not content indexed, off-line, temporary,
compressed.
Advantages of NTFS:
Easily recovers file system and supports long file names.
Provides users with local security by protecting files and directories.
NTFS is a journaling file system.
It supports spanning volumes spread across several physical drives.
Support larger sized hard drives with increasing general performance of the drive.
Disadvantages of NTFS:
NTFS performance does not decrease as FAT does.
Removable devices such as Android smart phones, do not support NTFS.
Doesn’t include a system that guarantee file system performance.
FAT32:
File Allocation Table, abbreviated as FAT, is the straightforward file system endorsed by the Windows
Operating System. It is commonly employed with floppy disks, flash drives, and embedded devices,
although it is no longer the default file system for Microsoft Windows computers. The FAT file system
encompasses various variants, including FAT12, FAT16, and FAT32, each tailored to accommodate
different disk drive capacities.
65
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
While FAT32 is frequently utilized in some earlier versions of Windows, it is not the default choice
for the latest iterations. Serving as an enhancement to the FAT16 file system, FAT32 finds support in
Windows 95 OSR2, Windows 98, and Windows Me.
With a minimum cluster size of 4 KB, FAT32 is equipped to handle hard disk sizes exceeding 2
Gigabytes. Originating from Microsoft in 1996, the FAT32 file system made its debut in MS-DOS 7.1
and Windows 95 OSR2, addressing the volume size constraints inherent in FAT16.
Features of FAT32:
FAT32 has the following features that overcome the issues in previous versions of File systems:
It can support drive sizes up-to 2 terabytes.
It is space-efficient because it uses smaller clusters, which provides efficient use of available disk
space compared to FAT16 devices.
It does not contain any limit for the number of root folder entries on the drive. The root folder is a
simple cluster chain that can be placed anywhere within the drive.
The dynamic resizing of FAT32 partitions is possible.
It contains a robust nature because, in this, the folder can be relocated, and it can use the backup copy
of the FAT instead of the default copy.
Advantages of FAT32:
The FAT32 file system is compatible with various devices such as smartphones, digital cameras,
gaming consoles, USB drives, etc.
FAT32 uses only a small disk space for large partitions because the minimum cluster size of FAT32
always remains 4KB for partitions under 8GB.
Disadvantages of FAT32:
In FAT32, the maximum file size is about 4 GB only.
It can work with partitions with a maximum size of up to 8 TB.
If the user formats the drive with FAT32, data may be lost if a power loss occurs during formatting.
66
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Differences between FAT32, NTFS, and exFAT:
FAT32 is the oldest file system, NTFS is the modern or latest file It is the newer File system
which was released in the year system, used as the default file and introduced in the year
1996 to replace the FAT16 files system in Windows. 2006 by Microsoft.
system.
The performance is good. The performance is better than The performance is High.
FAT32.
The accessing speed is less The accessing speed is more The accessing speed is
compared to NTFS. compared to FAT32. less compared to NTFS.
There is no provision for file It supports file compression. It also does not support
compression. File Compression.
It supports a maximum file size of It supports a maximum file size of It supports a maximum
4 GB. 16TB. file size of up to 16EB (16
Exabyte).
It is compatible with the old It is compatible with the later It is compatible with all
version of the Windows Operating version of the Windows Operating versions of Windows and
system, such as Win system, such as the latest version of MAC
95/98/2K/2K3/XP. NT/2K/XP/Vista/7. OS.
It is best suitable for removable It is best suitable for the windows It is best suitable for flash
storage devices with a maximum system and internal drives of drives.
file size of 8TB. windows.
67
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
It does not have any built-in It contains a built-in security It also contains a built-in
security. feature. security feature.
Disk Partitions:
Many hard disks are partitioned, or divided, into two or more sections. A partition is a logical drive.
Windows OSs can have three primary partitions followed by an extended partition that can contain one
or more logical drives. Someone who wants to hide data on a hard disk can create hidden partitions or
voids—large unused gaps between partitions on a disk drive. For example, partitions containing unused
68
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
space can be created between the primary partitions or logical partitions. This unused space between
partitions is called the partition gap. It’s possible to create a partition, add data to it, and then remove
references to the partition so that it can be hidden in Windows. If data is hidden in this partition gap, a
disk editor utility could be used to access it. Another technique is to hide incriminating digital evidence
at the end of a disk by declaring a smaller number of bytes than the actual drive size.
With disk-editing tools, however, you can access these hidden or empty areas of the disk. One way to
examine a partition’s physical level is to use a disk editor, such as WinHex or Hex Workshop. These
tools enable you to view file headers and other critical parts of a file. Both tasks involve analyzing the
key hexadecimal codes the OS uses to identify and maintain the file system.
69
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
70
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
8. Document Findings:
As you examine the disk, document your findings carefully. Note the file names, timestamps, and any
other relevant information. Proper documentation is crucial for forensic analysis and may be required if
the findings are to be used as evidence.
Remember, working with forensic tools and examining disks should be done carefully, especially when
dealing with evidence.
71
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. Analyze the Master File Table (MFT):
The MFT is a critical component of NTFS that stores information about each file and directory on the
disk. Examine the MFT to understand the file system's layout and to retrieve details about files, such
as names, attributes, and data runs.
72
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
9. Document Findings:
As with examining FAT disks, carefully document your findings. Record file names, timestamps,
attributes, and any other relevant information. Proper documentation is crucial for forensic analysis
and may be required if the findings are used as evidence.
Study Material
74
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
5. File Systems Impact:
Different file systems handle file deletion differently. For example, in FAT file systems, deleting a file
typically involves marking its cluster as available, while in NTFS, the Master File Table (MFT) is
updated.
75
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
To recover deleted files from the Recycle Bin, follow these steps:
1. Use forensic software to scan the Recycle Bin.
2. Validate the recovered data against other sources to ensure accuracy.
3. Extract the contents of the $R files to recover the deleted files.
Tools:
Several tools are available for Windows Recycle Bin forensics:
- RecBin.exe: A command-line tool by Harlan Carvey for parsing $I file contents.
The tool takes the path of the $I file as a command-line argument and provides information about the
associated deleted file, such as its filename, full path, size, and deletion date and time. The tool can be
useful for forensic investigations, as it provides an easy way to access and analyze the metadata of
deleted files in the Recycle Bin.
recbin.exe -f "%SystemRoot%\$Recycle.Bin\SID\$IVJDKEL.docx"
This example shows how to use the tool to parse a specific $I file located at
“C:$Recycle.Bin\SID$IVJDKEL.docx”. The “-f” option is used to specify the file to parse. Note that
you would need to replace “SID” with the actual SID of the user account associated with the deleted
file.
- FTK Imager: A forensic imaging tool for creating images of the Recycle Bin and extracting deleted
files.
76
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- EnCase: A digital forensics tool for analyzing the Recycle Bin and recovering deleted files.
- Recuva: A free data recovery tool for retrieving files from the Recycle Bin.
- Disk Drill: A data recovery tool for the Recycle Bin and other storage devices.
- TestDisk: A free, open-source tool for recovering files from the Recycle Bin and other storage
devices.
- WinHex: A hex editor and disk editor for viewing and analyzing Recycle Bin contents.
- Autopsy: A free, open-source digital forensics platform with a Recycle Bin analysis module.
These tools cater to various forensic needs, ranging from advanced investigations to simpler data
recovery scenarios.
Live Machine:
In live Windows forensics, PowerShell can be utilized to gather Recycle Bin information:
1. Open PowerShell as an administrator.
2. Use the Get-ChildItem cmdlet to view Recycle Bin contents.
3. Use the Get-Content cmdlet to view $I and $R files and recover their contents.
Conclusion:
The Windows Recycle Bin serves as a valuable resource for forensic investigators, offering insights
into deleted files. However, the potential inaccuracies in Recycle Bin information underscore the need
for a meticulous examination using forensic software. By following the steps outlined in this guide,
investigators can successfully recover deleted files and leverage the retrieved data for forensic
analyses.
Password Cracking:
In the context of digital forensics, the term "cracking passwords" typically refers to attempting to gain
unauthorized access to a system or protected data by deciphering or bypassing password protection.
Password cracking is a common technique used by both attackers and forensic analysts for different
purposes. It's important to note that while digital forensics professionals may employ password
77
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
cracking techniques for legitimate reasons, any unauthorized attempts to crack passwords are illegal
and unethical.
Here are some key aspects to consider when discussing password cracking in digital forensics:
1. Legitimate Use in Digital Forensics:
Password Recovery: Forensic experts may need to recover passwords during an investigation to access
encrypted data or files. This is typically done with proper legal authorization.
2. Common Password Cracking Techniques:
Brute Force Attacks: Trying every possible combination of characters until the correct password is
found. This method is time-consuming and resource-intensive.
Dictionary Attacks: Using a list of known words, phrases, or commonly used passwords to attempt
to crack a password.
Rainbow Table Attacks: Precomputed tables of hash values for commonly used passwords are
compared against the hashed passwords in a system.
Hybrid Attacks: Combining dictionary words with numbers or symbols to increase the chances of
success.
3. Hashing and Password Storage: Passwords are often stored as cryptographic hash values in
databases rather than in plain text. Cracking the hashed password involves attempting to find a
plaintext value that, when hashed, matches the stored hash.
Study Material
In conclusion, password cracking in digital forensics can be a legitimate and necessary activity when
conducted with proper authorization and within legal and ethical boundaries. It plays a crucial role in
recovering critical information during investigations, but it must always be done in adherence to
applicable laws and regulations. Unauthorized password cracking is illegal and can result in severe
consequences.
- Dark Web Activities: Illegal transactions and activities conducted on the dark web.
2. Challenges in Internet Crime Investigation:
- Anonymity: Perpetrators often use techniques to conceal their identities, making it challenging to
trace and apprehend them.
79
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- Jurisdictional Issues: Cybercrimes may span multiple jurisdictions, requiring coordination between
law enforcement agencies internationally.
- Rapid Evolution of Technology: Criminal tactics evolve quickly, necessitating continuous
adaptation of investigative techniques and tools.
3. Key Investigative Techniques:
- Digital Forensics: Examining electronic devices, networks, and digital evidence to uncover
information related to cybercrimes.
- Network Analysis: Tracing the flow of data and connections between devices and systems to
identify patterns and vulnerabilities.
- Open Source Intelligence (OSINT): Gathering information from publicly available sources on the
internet to aid investigations.
- Undercover Operations: Infiltrating online communities to gather intelligence on criminal
activities.
- Collaboration: Cooperation between law enforcement agencies, government bodies, private sector,
and international organizations to share information and resources.
4. Legal Framework and Legislation:
- Laws and regulations vary globally, and investigators must operate within the legal frameworks of
the jurisdictions involved.
- Countries may have specific legislation addressing cybercrimes and providing law enforcement
with the authority to investigate and prosecute.
5. International Cooperation:
- Cybercrimes often transcend borders, necessitating collaboration between countries and
international organizations to combat cyber threats effectively.
- Organizations like INTERPOL and Europol play essential roles in fostering international
cooperation.
6. Prevention and Cybersecurity Measures:
- Developing and promoting cybersecurity best practices to prevent individuals and organizations
from falling victim to cybercrimes.
80
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- Educating the public on recognizing and reporting cyber threats.
7. Emerging Trends:
- Artificial Intelligence (AI) and Machine Learning: Both used by cybercriminals and investigators
to enhance their capabilities.
- Cryptocurrencies: Used in cybercrime transactions due to their pseudonymous nature, posing
challenges for investigators.
- Internet of Things (IoT) Security: With the increasing connectivity of devices, ensuring the security
of IoT networks becomes critical.
8. Public-Private Partnerships:
- Collaboration between law enforcement agencies, private sector companies, and academic
institutions to share threat intelligence and enhance collective cybersecurity efforts.
9. Education and Training:
- Continuous education and training for law enforcement professionals to keep up with evolving
cyber threats and investigative techniques.
10. Ethical Considerations:
- Balancing the need for effective investigations with the protection of individuals' privacy rights.
- Adhering to ethical standards in conducting investigations and handling digital evidence.
In conclusion, internet crime investigation is a dynamic and complex field that requires a multi-faceted
approach. It involves leveraging advanced technologies, international cooperation, legal frameworks,
and ongoing education to address the ever-evolving landscape of cybercrimes and ensure a secure
digital environment.
81
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
(XSS), and other vulnerabilities that malicious actors exploit to compromise web assets. Here are key
aspects to consider when discussing web attack investigation in digital forensics:
Study Material
- Capturing images of affected systems and maintaining a chain of custody for evidence.
5. Attribution and Identification of Attackers:
- Tracing the origin of the attack, which may involve determining IP addresses, geolocation, and
potential threat actor groups.
- Establishing patterns and tactics used by attackers for future prevention.
6. Collaboration with Other Security Measures:
- Coordinating with intrusion detection and prevention systems, firewalls, and other security
measures to enhance the overall security posture.
7. Legal Considerations:
- Adhering to legal requirements when collecting and handling digital evidence.
- Cooperating with law enforcement agencies and legal authorities during investigations.
8. Mitigation and Remediation:
- Developing strategies to mitigate the impact of the attack and prevent further exploitation.
- Implementing security patches, updating software, and improving security configurations.
9. Post-Incident Analysis:
- Conducting a thorough analysis of the attack to understand the tactics, techniques, and procedures
(TTPs) employed by the attackers.
- Documenting lessons learned and implementing improvements to prevent similar attacks in the
future.
10. Training and Skill Development:
- Ensuring that digital forensic investigators are well-trained in the latest web attack techniques and
forensic tools.
- Staying updated on emerging threats and vulnerabilities in the web application landscape.
In conclusion, web attack investigation in digital forensics is a critical aspect of cybersecurity that
requires a systematic and comprehensive approach. It involves leveraging various forensic techniques
and tools to identify, analyze, and respond to web-based incidents, ultimately enhancing the resilience
of web services against malicious activities.
83
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
84
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
9. Which storage medium is most suitable for archival purposes and long-term data retention?
- A) Hard disk drive
- B) Magnetic tape
- C) Optical disc
- D) USB flash drive
10. What is the role of the actuator arm in a hard disk drive?
- A) Reading and writing data on the platters
- B) Rotating the platters
- C) Controlling the power supply
- D) Cooling the hard disk
13. Which file system is commonly used in modern Windows operating systems?
- A) NTFS
- B) FAT32
- C) HFS+
85
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
- D) Ext4
15. Which file system is more suitable for removable storage devices like USB flash drives?
- A) NTFS
- B) FAT32
- C) exFAT
- D) Ext3
18. Which file attribute may be associated with a deleted file that can aid in its recovery?
- A) Read-only
- B) Hidden
- C) Archive
- D) Recycle Bin
Study Material
- C) Easily memorable
- D) Common words
22. What is the main function of the Master File Table (MFT) in NTFS?
- A) File compression
- B) File allocation
- C) File indexing and metadata storage
- D) File encryption
23. Which forensic technique is used to validate the integrity of digital evidence?
- A) Hashing
- B) Encryption
- C) Compression
- D) Steganography
26. Which part of a computer system is responsible for managing hardware resources and providing
services for computer programs?
- A) Central Processing Unit (CPU)
- B) Operating System
- C) Random Access Memory (RAM)
- D) Hard Disk Drive (HDD)
87
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
29. What does RAID stand for in the context of data storage?
- A) Random Access Integrated Disk
- B) Redundant Array of Independent Disks
- C) Remote Access and Intranet Data
- D) Rapid Application and Information Deployment
Answers:
1. B. Hidden data extraction method
2. B. To uncover concealed information
3. C. Steganographic images
4. C. To monitor and detect suspicious activities
5. C. HTTPS
6. B. To analyze and capture network packets
7. B. Solid-state drive
8. B. Temporary data storage for quick access
9. B. Magnetic tape
10. A. Reading and writing data on the platters
88
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
11. A. In binary code
12. C. Rotating the platters
13. A. NTFS
14. B. Support for large file sizes and volumes
15. B. FAT32
16. C. By using file recovery tools
17. B. The file system marks the space as available
18. C. Archive
19. B. Attempting all possible password combinations
20. B. Long and complex
21. D. Preventing password cracking
22. C. File indexing and metadata storage
23. A. Hashing
24. A. A trap set to detect and deflect hacking attempts
25. C. To map hash values to plaintext passwords
26. B. Operating System
27. C. To prevent unauthorized access
28. B. MAC address filtering
29. B. Redundant Array of Independent Disks
30. B. To monitor and alert on suspicious activities
Short answer type questions (3 marks):
1. What is hidden data extraction?
2. Why is hidden data extraction important in digital forensics?
3. Provide an example of hidden data in a document.
4. What is network traffic analysis?
5. How does network traffic analysis contribute to cybersecurity?
6. Name one tool used for network traffic analysis.
89
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
90
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
91
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
• Clear and Concise Reporting: Present your findings in a clear, concise, and objective manner.
Avoid technical jargon and focus on the facts and their interpretations. Tailor your report to
your audience, whether it's a judge, lawyer, or technical expert.
5. Be Prepared for the Road Ahead:
• Anticipate Challenges: Be prepared to face objections, technical hurdles, and potential data
loss. Having a contingency plan ensures you can adapt and overcome unforeseen obstacles.
• Expert Testimony: If necessary, prepare to testify in court and explain your findings to a non-
technical audience. Practice your explanations and anticipate potential questions from opposing
counsel.
Remember:
• Ethics and Legality: Always adhere to ethical and legal considerations throughout the
investigation. Obtain proper warrants and authorization before accessing data, and ensure your
methods comply with relevant laws and regulations.
• Continuous Learning: The field of computer forensics is constantly evolving. Stay updated on
the latest tools, techniques, and cyber threats to remain at the forefront of your profession.
92
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
93
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Initial Analysis: Perform a preliminary analysis of the acquired data to identify potential leads and
areas requiring further investigation. This could involve searching for keywords, analyzing file
timestamps, and identifying suspicious activity.
Remember:
Act with Urgency: Digital evidence is volatile and can be easily overwritten or lost. The sooner you
begin the investigation, the higher the chances of preserving crucial data.
Document Everything: Maintain detailed logs of your every action during the investigation. This
includes the tools used, timestamps, observations made, and any decisions taken. Thorough
documentation strengthens your findings and ensures case transparency.
Seek Guidance when Needed: Don't hesitate to seek advice and assistance from experienced computer
forensics professionals, especially for complex cases or unfamiliar devices. Collaboration and
mentorship can be invaluable assets in navigating the intricacies of digital investigations.
Study Material
Before shutting down the computer, the acquisitions officer photographs all open windows on the
Windows desktop, including one showing Windows Explorer, and gives you the photos. (Before
shutting down the computer, a live acquisition should be done to capture RAM, too.)
As a computer forensics investigator, you’re grateful the officers followed proper procedure when
acquiring the evidence. With digital evidence, it’s important to realize how easily key data, such as the
last access date, can be altered by an overeager investigator who’s first on the scene. The U.S.
Department of Justice (DOJ) has a document you can download that reviews proper acquisition of
electronic evidence, including the search and seizure of computers
(www.usdoj.gov/criminal/cybercrime/s&smanual2002.html). If this link has changed because of site
updates, use the search feature. In your preliminary assessment, you assume that the hard disk and
storage media include intact files, such as e-mail messages, deleted files, and hidden files. A range of
software is available for use in your investigation; your office uses the tool Technology Pathways Pro
Discover After your preliminary assessment, you identify the potential challenges in this case.
Because drug dealers don’t usually make information about their accomplices available, the files on the
disks you received are probably password protected. You might need to acquire password-cracking
software or find an expert who can help you decrypt a file. Later, you perform the steps needed to
investigate the case, including how to address risks and obstacles. Then you can begin the actual
investigation and data retrieval.
Study Material
he wouldn’t be at work. Another employee, Martha, is also missing and hasn’t informed anyone of the
reason for her absence. Steve asks the IT Department to confiscate George’s hard drive and all storage
media in his work area. He wants to know whether there’s any information on George’s computer and
storage media that might offer a clue to George’s whereabouts and job performance concerns. To help
determine George and Martha’s whereabouts, you must take a systematic approach, described in the
following section, to examining and analyzing the data found on George’s desk.
Employee Termination Cases The majority of investigative work for termination cases involves
employee abuse of corporate assets. Incidents that create a hostile work environment, such as
viewing pornography in the workplace and sending inappropriate e-mail messages, are the predominant
types of cases investigated. The following sections describe key points for conducting an investigation
that might lead to an employee’s termination. Consulting with your organization’s general counsel and
Human Resources Department for specific directions on how to handle these investigations is
recommended. Your organization must have appropriate policies in place, asdescribed in Chapter 1.
Study Material
• Suspect computer’s IP address obtained from your organization’s network administrator
• Suspect computer’s disk drive
• Your preferred computer forensics analysis tool (ProDiscover, Forensic Toolkit, EnCase, X-Ways
Forensics, and so forth)
The following steps outline the recommended processing of an Internet abuse case:
1. Use the standard forensic analysis techniques and procedures described in this book for the disk
drive examination.
2. Using tools such as DataLifter or Forensic Toolkit’s Internet keyword search option, extract all
Web page URL information.
3. Contact the network firewall administrator and request a proxy server log, if it’s available, of the
suspect computer’s network device name or IP address for the dates of interest. Consult with your
organization’s network administrator to confirm that these logs are maintained and how long the time
to live (TTL) is set for the network’s IP address assignments that use Dynamic Host Configuration
Protocol (DHCP).
4. Compare the data recovered from forensic analysis to the proxy server log data to confirm that they
match.
5. If the URL data matches the proxy server log and the forensic disk examination, continue analyzing
the suspect computer’s drive data, and collect any relevant downloaded inappropriate pictures or Web
pages that support the allegation. If there are no matches between the proxy server logs, and the
forensic examination shows no contributing evidence, report that the allegation is unsubstantiated.
Before investigating an Internet abuse case, research your state or country’s privacy laws. Many
countries have unique privacy laws that restrict the use of computer log data, such as proxy server
logs or disk drive cache files, for any type of investigation. Some state or federal laws might supersede
your organization’s employee policies. Always consult with your organization’s attorney. For
companies with international business operations, jurisdiction is a problem; what is legal in the United
States, such as examining and investigating a proxy server log, might not be legal in Germany, for
example. For investigations in which the proxy server log doesn’t match the forensic analysis that
found inappropriate data, continue the examination of the suspect computer’s disk drive. Determine
97
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
when inappropriate data was downloaded to the computer and whether it was through an
organization’s intranet connection to the Internet. Employees might have used their employer’s laptop
computers to connect to their own ISPs to download inappropriate Web content. For these situations,
you need to consult your organization’s employee policy guidelines for what’s considered appropriate
use of the organization’s computing assets.
98
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Attorney-Client Privilege Investigations:
When conducting a computer forensics analysis under attorney-client privilege (ACP) rules for an
attorney, you must keep all findings confidential. The attorney you’re working for is the ultimate
authority over the investigation. For investigations of this nature, attorneys typically request that you
extract all data from drives. It’s your responsibility to comply with the attorney’s directions. Because
of the large quantities of data a drive can contain, the attorney will want to know about everything of
interest on the drives. Many attorneys like to have printouts of the data you have recovered, but
printouts can present problems when you have log files with several thousand pages of data or CAD
drawing programs that can be read only by proprietary programs. You need to persuade and educate
many attorneys on how digital evidence can be viewed electronically. In addition, learn how to teach
attorneys and paralegals to sort through files so that you can help them efficiently analyze the huge
amount of data a forensic examination produces.
You can also encounter problems if you find data in the form of binary files, such as CAD drawings.
Examining these files requires using the CAD program that created them. In addition, engineering
companies often have specialized drafting programs. Discovery demands for lawsuits involving a
product that caused injury or death requires extracting design plans for attorneys and expert witnesses
to review. You’re responsible for locating the programs for these design plans so that attorneys and
expert witnesses can view the evidence files.
The following list shows the basic steps for conducting an ACP case:
1. Request a memorandum from the attorney directing you to start the investigation. The
memorandum must state that the investigation is privileged communication and list your name and
any other associates’ names assigned to the case.
2. Request a list of keywords of interest to the investigation.
3. After you have received the memorandum, initiate the investigation and analysis. Any findings you
made before receiving the memorandum are subject to discovery by the opposing attorney.
(For drive examinations, make two bit-stream images (discussed later in this chapter) of the drive using
a different tool for each image, such as EnCase for the first and ProDiscover or SafeBack for the
99
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
second. If you have large enough storage drives, make each bit-stream image uncompressed so that
if it becomes corrupt, you can still examine uncorrupted areas with your preferred forensic analysis
tool.)
4. If possible, compare hash values on all files on the original and re-created disks. Typically,
attorneys want to view all data, even if it’s not relevant to the case. Many GUI forensics tools perform
this task during bit-stream imaging of the drive.
5.Methodically examine every portion of the drive (both allocated and unallocated data areas) and
extract all data.
6. Run keyword searches on allocated and unallocated disk space. Follow up the search results to
determine whether the search results contain information that supports the case.
7. For Windows OSs, use specialty tools to analyze and extract data from the Registry, such as
AccessData Registry Viewer or a Registry viewer program (discussed in more detail in Chapter 6).
Use the Edit, Find menu option in Registry Editor, for example, to search for keywords of interest to
the investigation.
8. For binary files such as CAD drawings, locate the correct program and, if possible, makeprintouts
of the binary file content. If the files are too large, load the specialty program on a separateworkstation
with the recovered binary files so that the attorney can view them.
9. For unallocated data (file slack space or free space, explained in Chapter 6) recovery, use a tool
that removes or replaces nonprintable data, such as X-Ways Forensics Specialist Gather Textfunction.
10. Consolidate all recovered data from the evidence bit-stream image into wellorganized folders and
subfolders. Store the recovered data output, using a logical and easy-to-follow storage method for the
attorney or paralegal.
Here are some other guidelines to remember for ACP cases:
• Minimize all written communication with the attorney; use the telephone when you need to ask
questions or provide information related to the case.
• Any documentation written to the attorney must contain a header stating that it’s “Privileged Legal
Communication—Confidential Work Product,” as defined under the attorney-work-product rule.
• Assist the attorney and paralegal in analyzing the data. If you have difficulty complying with the
100
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
directions or don’t understand the directives from the memorandum, contact the attorney andexplain
the problem. Always keep an open line of verbal communication with the attorney during these types
of investigations. If you’re communicating via e-mail, use encryption (such as PGP) or another secure
e-mail service for all messages.
Examine proxy server logs to check for log activities that might show use of free e-mail services,
such as Gmail. Track back to the specific workstations where these messages originated andperform
a forensic analysis on the drives to help determine what was communicated.
• Examine known suspects’ workstations, perform computer forensics examinations on persons of
interest, and develop other leads on possible associates.
• Examine all company phone records for any calls to known media organizations. The following list
outlines steps to take for media leaks:
101
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Interview management privately to get a list of employees who have direct knowledge of the
sensitive data.
2. Identify the media source that published the information.
3. Review company phone records to see who might have had contact with the news service.
4. Obtain a list of keywords related to the media leak.
5. Perform keyword searches on proxy and e-mail servers.
6. Discreetly conduct forensic disk acquisitions and analysis of employees of interest.
7. From the forensic disk examinations, analyze all e-mail correspondence and trace any sensitive
messages to other people who haven’t been listed as having direct knowledge of the sensitive data.
Expand the discreet forensic disk acquisition and analysis for any new persons of interest.
8. Consolidate and review your findings periodically to see whether new clues can be discovered.
9. Report findings to management routinely, and discuss how much further to continue the
investigation. Industrial Espionage Investigations Industrial espionage cases, similar to media leaks,
can be time consuming and are subject to the same scope creep problems.
The following list includes staff you might need when planning an industrial espionage investigation.
This list isn’t exhaustive, so use your knowledge to improve on these recommendations:
• The computing investigator who is responsible for disk forensic examinations.
• The technology specialist who is knowledgeable about the suspected compromised technical data.
• The network specialist who can perform log analysis and set up network monitors to trap network
communication of possible suspects.
• The threat assessment specialist (typically an attorney) who is familiar with federal and state laws
and regulations related to ITAR or EAR and industrial espionage. In addition, consider the following
guidelines when initiating an international espionage investigation:
• Determine whether this investigation involves a possible industrial espionage incident, and then
determine whether it falls under ITAR or EAR.
• Consult with corporate attorneys and upper management if the investigations must be conducted
discreetly.
• Determine what information is needed to substantiate the allegation of industrial espionage.
102
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
• Generate a list of keywords for disk forensics and network monitoring.
• List and collect resources needed for the investigation. Determine the goal and scope of the
investigation; consult with management and the company’s attorneys on how much work you should
do.
• Initiate the investigation after approval from management, and make regular reports of your
activities and findings.
The following are planning considerations for industrial espionage investigations:
• Examine all e-mail of suspected employees, both company-provided e-mail and free Web-based
services.
• Search Internet newsgroups or message boards for any postings related to the incident.
• Initiate physical surveillance with cameras on people or things of interest to the investigation.
• If available, examine all facility physical access logs for sensitive areas, which might include
secure areas where smart badges or video surveillance recordings are used.
• If there’s a suspect, determine his or her location in relation to the vulnerable asset that was
compromised.
• Study the suspect’s work habits.
• Collect all incoming and outgoing phone logs to see whether any unique or unusual places were
called.
When conducting an industrial espionage case, follow these basic steps:
1. Gather all personnel assigned to the investigation and brief them on the plan and any concerns.
2. Gather the resources needed to conduct the investigation.
3. Start the investigation by placing surveillance systems, such as cameras and network monitors, at
key locations.
4. Discreetly gather any additional evidence, such as the suspect’s computer drive, and make a bit-
stream image for follow-up examination.
5. Collect all log data from networks and e-mail servers, and examine them for unique items that
might relate to the investigation.
6. Report regularly to management and corporate attorneys on your investigation’s status andcurrent
103
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
findings.
7. Review the investigation’s scope with management and corporate attorneys to determine whether
it needs to be expanded and more resources added.
• What questions do I need to ask the suspect to get the vital information about the case?
• Do I know what I’m talking about, or will I have to research the topic or technology
related to the investigation?
• Do I need additional questions to cover other indirect issues related to the
investigation?
104
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Common interview and interrogation errors include being unprepared for the interview or
interrogation and not having the right questions or enough questions to increase your depth of
knowledge. Make sure you don’t run out of conversation topics; you need to keep the conversation
friendly to gain the suspect’s confidence. Avoid doubting your own skills, which might show the
suspect you lack confidence in your ability. Ingredients for a successful interview or interrogation
require the following:
• Being patient throughout the session.
• Repeating or rephrasing questions to zero in on specific facts from a reluctant witness or suspect
being tenacious.
Unveiling the Digital Trail: A Deep Dive into Digital Forensic Investigations
Digital forensics has become an indispensable tool in today's world, where almost every aspect of our
lives leaves a digital footprint. From criminal investigations to corporate disputes, the ability to extract
and analyze data from electronic devices can be the key to unlocking the truth. But how exactly does a
digital forensic investigation unfold? Let's delve into the meticulous process and explore the essential
tools that aid in this digital detective work. The Stages of a Digital Forensic Investigation:
1. Identification and Preservation: The first step is to pinpoint the relevant devices and secure
them to prevent any data alteration. This could involve seizing computers, smartphones, external
drives, or even cloud storage accounts.
2. Acquisition and Imaging: Forensic copies of the digital evidence are acquired using
specialized tools to create an exact replica of the storage media's contents. This ensures the
integrity of the original data for potential legal proceedings.
3. Analysis and Examination: The acquired data is meticulously examined using various
software tools. This may involve keyword searches, file recovery, timeline reconstruction, and
examination of internet browsing history, emails, and chat logs.
105
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
4. Documentation and Reporting: A comprehensive report is generated, detailing the
methodology used, the findings of the analysis, and any conclusions drawn from the evidence.
This report serves as a crucial piece of evidence in court or for internal investigations.
N.B:
Critiquing the Case:
After you close the case and make your final report, you need to meet with your department or a group
of fellow investigators and critique the case in an effort to improve your work. Ask yourself assessment
questions such as the following:
• How could you improve your performance in the case?
• Did you expect the results you found? Did the case develop in ways you did not expect?
• Was the documentation as thorough as it could have been?
• What feedback has been received from the requesting source?
• Did you discover any new problems? If so, what are they?
• Did you use new techniques during the case or during research?
Make notes to yourself in your journal about techniques or processes that might need to be changed
or addressed in future investigations. Then store your journal in a secure place.
Study Material
• Timeline Reconstruction Tools: These tools create a chronological timeline of events based
on extracted timestamps from various data sources. Examples include Timeline Explorer,
Autopsy, and X-Ways Forensics.
• Network Traffic Analysis Tools: These tools capture and analyze network traffic to identify
malicious activity or communication patterns. Examples include Wireshark and tcpdump.
The Importance of Following a Chain of Custody:
Throughout the investigation, maintaining a strict chain of custody is crucial. This innebär documenting
every step taken with the evidence, from its seizure to its analysis and presentation in court. This ensures
the admissibility of the evidence and its credibility in legal proceedings.
Beyond the Tools: The Human Element
While powerful tools are indispensable, successful digital forensic investigations rely heavily on the
expertise and skills of the investigators. They must possess a deep understanding of digital technologies,
analytical thinking, and meticulous attention to detail. The ability to interpret complex data, draw
accurate conclusions, and present findings in a clear and concise manner is paramount.
In Conclusion:
Digital forensic investigations are intricate procedures that demand precision, meticulousness, and the
right tools. By understanding the stages involved and the essential tools employed, we gain a deeper
appreciation for the complex world of digital evidence and the critical role it plays in unraveling the
truth in the digital age.
Remember, this is just a glimpse into the fascinating world of digital forensics. As technology continues
to evolve, so too will the tools and techniques used in these investigations. The one constant remains the
unwavering pursuit of truth, extracted from the ever-expanding realm of digital footprints we leave
behind.
107
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
2. In computer forensics, what does the term "volatile data" refer to?
a) Data that is easily deleted
b) Data that is difficult to recover
c) Data that changes frequently
d) Encrypted data
3. Which of the following is NOT a potential source of digital evidence in a computer forensics
investigation?
a) Hard drives
b) Printers
c) CD-ROMs
d) Radio waves
5. Which of the following is a popular open-source computer forensics tool used for disk imaging?
a) Norton Ghost
b) FTK Imager
c) EnCase
d) Autopsy
108
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
9. What does the acronym "ACPO" stand for in the context of computer forensic methodology?
a) Advanced Computer Processing Organization
b) Association of Certified Professional Observers
c) Association of Chief Police Officers
d) Advanced Cybersecurity Protocol Organization
10. What is the purpose of the "Preservation" phase in computer forensic methodology?
a) Analyzing evidence
b) Documenting findings
c) Ensuring the integrity of evidence
d) Reporting the investigation
12. Who is responsible for maintaining the Chain of Custody in a computer forensics investigation?
a) Only the forensic analyst
b) Only the law enforcement agency
c) Both the forensic analyst and law enforcement agency
d) The suspect
Study Material
d) To compromise the integrity of evidence
14. What can compromise the Chain of Custody in a computer forensics investigation?
a) Secure storage procedures
b) Detailed documentation
c) Mishandling or tampering with evidence
d) Regular backups
15. Which legal concept is closely associated with the Chain of Custody in computer forensics?
a) Habeas corpus
b) Exclusionary rule
c) Statute of limitations
d) Admissibility
Answers:
1. A. Evidence preservation and analysis
2. C. Data that changes frequently
3. D. Radio waves
4. B. Hiding data within other data
5. B. FTK Imager
6. B. Network traffic analysis
7. B. Volatility
8. D. Identification
9. C. Association of Chief Police Officers
10. C. Ensuring the integrity of evidence
11. B. A secure log of evidence handling
12. C. Both the forensic analyst and law enforcement agency
13. B. To ensure the admissibility of evidence in court
14. C. Mishandling or tampering with evidence
15. D. Admissibility
110
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
3. What challenges may arise when dealing with volatile data in a computer forensics investigation?
7. What role does the "Analysis" phase play in computer forensic methodology?
10. What potential consequences could a break in the Chain of Custody have on a computer forensic
investigation?
11. How does maintaining the Chain of Custody contribute to the credibility of digital evidence?
12. What steps can be taken to prevent mishandling or tampering with evidence in the Chain of
Custody?
111
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Explain the process of evidence identification in a computer forensics investigation and why it is a
critical initial step.
2. Describe the challenges associated with acquiring volatile data during a computer forensics
investigation. How can investigators overcome these challenges?
3. Compare and contrast the functionalities of FTK Imager and EnCase in computer forensics
investigations.
4. Examine the role of password cracking tools in computer forensics investigations. What ethical
considerations should investigators keep in mind when using such tools?
5. Discuss the significance of the Analysis phase in computer forensic methodology. What techniques
and tools are commonly employed during this phase?
6. Explain the purpose of the Reporting phase in computer forensic methodology. What elements
should be included in a comprehensive forensic report?
7. Define Chain of Custody in the context of computer forensics. Why is maintaining an unbroken
Chain of Custody crucial for the admissibility of evidence in court?
8. Identify potential vulnerabilities in the Chain of Custody process and discuss measures that can be
implemented to mitigate these vulnerabilities.
9. Examine the role of the forensic analyst and law enforcement agency in maintaining the Chain of
Custody. How can collaboration between these entities enhance the integrity of the investigative
process?
10. Discuss the potential consequences of a break in the Chain of Custody for a computer forensics
investigation. How might it impact the admissibility of evidence in court?
112
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
113
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
114
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
5. Ensuring Trust and Accountability: In a world where data breaches erode trust and create
uncertainty, network forensics provides a beacon of transparency. By providing verifiable evidence and
revealing the truth behind cyberattacks, network forensics strengthens public confidence in digital
systems and helps rebuild trust between businesses and their customers, and governments and their
citizens.
In conclusion, network forensics is not just a technical tool, but a crucial element in building a safer and
more secure digital future. By providing the means to investigate, understand, and respond to cyber
threats, network forensics empowers us to navigate the complex digital landscape with confidence,
knowing that the invisible threats lurking within can be brought to light and dealt with accordingly.
• The biggest challenge is to manage the data generated during the process.
• Intrinsic anonymity of the IP.
• Address Spoofing.
Social engineering: Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological manipulation to trick users into making
security mistakes or giving away sensitive information. Social engineering attacks happen in one or
more steps. A perpetrator first investigates the intended victim to gather necessary background
information, such as potential points of entry and weak security protocols, needed to proceed with the
attack. Then, the attacker moves to gain the victim’s trust and provide stimuli for subsequent actions
that break security practices, such as revealing sensitive information or granting access to critical
resources.
115
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
What makes social engineering especially dangerous is that it relies on human error, rather than
vulnerabilities in software and operating systems. Mistakes made by legitimate users are much less
predictable, making them harder to identify and thwart than a malware-based intrusion.
Phishing: Emails or text messages disguised as legitimate entities, tricking you into clicking malicious
links or revealing personal information.
Pretexting: Fabricating a scenario to gain your trust and extract sensitive information. For example, an
attacker pretending to be from your bank calling to "verify your account."
Baiting: Offering something tempting, like free software or exclusive deals, to lure you into
downloading malware or exposing personal data.
Quid pro quo: Promising something in return for information or actions, like offering technical support
in exchange for remote access to your computer.
116
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Tailgating: Following someone into a restricted area by piggybacking on their access or claiming to be
forgotten colleagues.
Network Fundamentals:
Networking computers offers advantages such as resource sharing and collaboration. Essential
components of a network include a connection (physical or wireless) and a common language, or
protocol, like TCP/IP. Client/server networks are prevalent in commercial settings, with clients (end-
user machines) making requests, and servers storing and providing files and services. Servers, like file
or email servers, have more control. Another network type is peer-to-peer (P2P), where all machines
can function as both clients and servers. P2P is mainly used for file sharing but is associated with issues
like piracy and child pornography. Understanding these network configurations lays the foundation for
classifying and organizing networks.
Classful IP addressing:
Classful IP addressing was an addressing scheme used in the early days of the internet, where IP
addresses were divided into three main classes: Class A, Class B, and Class C. Each class had a specific
range of IP addresses and was designed to accommodate different sizes of networks. The classful system
has been largely replaced by classless addressing (CIDR), which allows for more flexibility in address
allocation. However, understanding classful addressing is still valuable for historical context.
117
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Note: The reserved addresses (network and broadcast) are subtracted from the total number of hosts per
network.
Classful addressing was inflexible because it did not allow for efficient utilization of IP addresses,
leading to the adoption of classless addressing (CIDR), which allows for variable-length subnet masks
and more efficient address allocation.
Network security tools play a crucial role in protecting computer networks from cyber threats,
monitoring activities, and responding to security incidents. There are various categories of network
security tools, each serving specific purposes. Here are some common types of network security tools:
118
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Firewalls:
Purpose: Firewalls control and monitor incoming and outgoing network traffic based on predetermined
security rules.
Purpose: IDS monitors network or system activities for malicious activities, while IPS takes action to
prevent or block those activities.
Purpose: Detect and remove malicious software, viruses, and other types of malware.
Purpose: Securely connect remote users or branch offices to a private network over the internet.
Purpose: Control and manage access to the network by enforcing security policies.
Study Material
Purpose: Protect web applications from various security threats, including SQL injection and cross-site
scripting (XSS).
Purpose: Monitor network performance, traffic, and detect anomalies or suspicious activities.
Purpose: Collect, analyze, and correlate log data from various sources to provide a comprehensive view
of network security events.
Purpose: Identify and assess vulnerabilities in network devices, systems, and applications.
Purpose: Filter and analyze individual packets of data based on predefined criteria.
Study Material
11. Security Gateway Appliances:
Purpose: Combine multiple security functions, such as firewall, antivirus, and intrusion prevention, into
a single integrated device.
Purpose: Deceptive tools designed to attract and detect attackers by simulating vulnerable systems or
networks.
Purpose: Monitor and secure Domain Name System (DNS) infrastructure against threats like DNS
spoofing and cache poisoning.
121
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
These tools, when used together in a layered approach, help organizations build a robust network
security posture and mitigate the risks associated with cyber threats. The selection of tools depends on
the specific needs, size, and complexity of the network environment.
A network forensic investigation involves a systematic and methodical process to collect, analyze, and
interpret evidence related to network security incidents. Here's a step-by-step guide on how a network
forensic investigation is typically conducted:
Actions:
Security Monitoring:
• Employ intrusion detection systems (IDS) and security information and event management
(SIEM) tools to monitor network activities.
• Set up alerts for suspicious behavior or known attack patterns.
122
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
• Assemble a dedicated incident response team comprising IT professionals, security experts, and
legal representatives.
• Define roles and responsibilities within the incident response team.
Preparation:
2. Evidence Identification:
Actions:
Log Analysis:
• Examine system logs, firewall logs, and other relevant logs for indicators of compromise (IoCs).
• Look for anomalies, unauthorized access, or patterns indicative of a security incident.
Affected Systems:
• Identify the systems and devices that may have been compromised.
• Document the state of the systems, including configurations and software versions.
123
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
3. Evidence Collection:
Objective: Preserve and collect digital evidence without altering the original data.
Actions:
Device Logs:
• Collect logs from routers, switches, firewalls, and other relevant network devices.
• Preserve timestamps and log entries to establish a timeline.
Disk Imaging:
• Create forensic images of affected systems using tools like dd or Forensic Imager.
• Use write-blocking tools to prevent alterations to the original data.
4. Chain of Custody:
Objective: Document the handling and transfer of evidence to maintain its integrity.
Actions:
Record Keeping:
• Document details of evidence collection, including the date, time, and individuals involved.
• Use standardized forms for recording chain of custody information.
124
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Secure Storage:
5. Timeline Analysis:
Actions:
Log Review:
Artifact Analysis:
• Identify artifacts such as file creation times, system logs, and user activities.
• Establish cause-and-effect relationships between different events.
6. Traffic Analysis:
Actions:
Packet Inspection:
125
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Anomaly Detection:
• Employ anomaly detection techniques to identify deviations from normal network behavior.
• Look for signs of network scanning, unauthorized access, or data exfiltration.
Objective: Use known attack patterns and signatures to identify malicious activities.
Actions:
• Incorporate threat intelligence feeds to identify patterns associated with known threats.
• Enhance analysis by cross-referencing observed patterns with external threat databases.
Objective: Preserve the state of affected systems for detailed offline analysis.
Actions:
Forensic Imaging:
• Create forensic images of storage devices using tools like FTK Imager or dd.
• Ensure the integrity of the forensic images by calculating and verifying hash values.
126
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Documentation:
9. Vulnerability Assessment:
Objective: Identify and assess vulnerabilities that may have been exploited.
Actions:
Vulnerability Scanning:
• Conduct vulnerability scans on affected systems using tools like Nessus or OpenVAS.
• Identify weaknesses in system configurations, software versions, or patch levels.
Configuration Analysis:
Actions:
Forensic Reports:
• Prepare detailed forensic reports that include evidence, analysis, and recommendations.
• Clearly articulate the timeline of events and the methods used in the investigation.
127
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Legal Documentation:
Objective: Ensure the investigation complies with legal and regulatory requirements.
Actions:
Legal Consultation:
• Collaborate with legal experts to ensure that the investigation follows proper legal procedures.
• Seek advice on handling sensitive information and privacy considerations.
Regulatory Reporting:
Objective: Review the investigation process and identify areas for improvement.
Actions:
Incident Debriefing:
128
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
Documentation Update:
• Update incident response plans and procedures based on insights from the review.
• Incorporate improvements to enhance future incident response capabilities.
3. In network forensics, what does the term "packet sniffing" refer to?
- A. Capturing and analyzing network traffic
- B. Installing antivirus software
- C. Creating a virtual private network (VPN)
- D. Configuring firewalls
Study Material
Study Material
Study Material
132
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester VI)
Digital Forensics (BNCSC602)
Sec A
Academic Session 2023-24
Study Material
1. Explain the concept of network forensics and why it is essential in cybersecurity investigations.
2. Define social engineering and provide examples of social engineering attacks. How can
organizations defend against such attacks?
3. Explain the purpose of IP addresses in networking. Differentiate between IPv4 and IPv6,
highlighting the advantages of IPv6.
4. Discuss the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in
network security. Provide examples of each.
5. Describe the steps involved in a network forensics investigation. How does it differ from traditional
computer forensics?
6. Explain the significance of packet sniffing in network forensics investigations. How does it aid in
the analysis of network traffic?
7. Discuss the role of timestamps in network forensics investigation. Why are accurate timestamps
crucial for reconstructing events?
8. Examine the challenges associated with encrypted network traffic in network forensics
investigations. How can investigators overcome these challenges?
9. Describe the role of network logs in network forensics investigations. How can logs be used to
reconstruct events and identify security incidents?
10. Explain the concept of network traffic analysis and its importance in network forensics. Provide
examples of tools used for network traffic analysis.
133
Pratik Banerjee
Faculty of CST Dept.
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
MODULE VI: MOBILE FORENSICS
Introduction to Mobile Forensics:
Mobile forensics is a specialized branch of digital forensics that focuses on the investigation and
analysis of electronic evidence stored on mobile devices. As an integral part of the broader field
of digital forensics, mobile forensics is concerned with extracting, preserving, and analyzing data
from smartphones, tablets, and other mobile devices to uncover and understand digital evidence
related to cybercrimes, security incidents, or legal investigations. The unique challenges posed by
the diversity of mobile devices, operating systems, and applications necessitate specialized
techniques and tools for the effective examination of mobile data. Mobile forensics plays a crucial
role in uncovering insights from call logs, text messages, application data, geolocation
information, and other artifacts, contributing significantly to criminal investigations,
cybersecurity, and ensuring the integrity of digital evidence in legal proceedings.
Cellular Networks:
Cellular networks, also known as mobile networks, are telecommunications systems that enable
wireless communication between mobile devices (such as smartphones, tablets, and IoT devices)
by dividing geographical areas into cells. Each cell is served by a base station or cell tower,
facilitating voice and data transmission. Cellular networks operate on various standards (e.g.,
GSM, CDMA, LTE) and provide widespread connectivity, allowing users to make calls, send
messages, and access the internet while moving within the network's coverage area. These
networks support seamless handovers between cells as users travel, ensuring continuous and
reliable communication services. The evolution of cellular technology, from 2G to 5G, has brought
improvements in data speeds, latency, and network capacity, shaping the landscape of modern
mobile communications.
Cellular network components: Cellular networks are complex systems that consist of various
components working together to provide wireless communication services. Here are the key
components of a typical cellular network:
134
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
1. Mobile Devices:
Mobile devices, such as smartphones, tablets, and IoT devices, are the endpoints used by
individuals to access cellular network services.
Mobile devices communicate with the cellular network infrastructure to make calls, send
messages, and access data services.
The base station, often referred to as a cell tower, is a fixed radio transmitter/receiver located within
a cell. It serves as a central point for communication with mobile devices in its coverage area.
The base station manages the wireless connection with mobile devices, handling tasks such as
signal transmission, reception, and handovers as devices move between cells.
3. Cell:
A cell is the basic geographic unit in a cellular network. It represents the coverage area served by
a single base station or cell tower.
Cells are designed to avoid interference and efficiently allocate resources. They are the building
blocks of cellular networks, providing coverage to specific geographical areas.
The MSC is a central component in the network that connects calls and manages communications
between mobile devices within the network and with external networks.
The MSC handles call routing, call setup, and call termination, ensuring seamless communication
within the cellular network and facilitating connections to other networks.
135
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
The HLR is a database that stores subscriber information, including user profiles, subscription
details, and current locations.
The HLR plays a crucial role in call routing and authenticating mobile devices within the network.
It is used to track the location of mobile subscribers.
The VLR is a temporary database that stores information about subscribers currently within the
coverage area of a particular MSC.
The VLR allows the MSC to quickly access subscriber information for devices currently present
in its coverage area, reducing the need to query the HLR for every call.
136
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
The AuC is responsible for authenticating the identity of mobile devices connecting to the network,
ensuring secure access.
It generates and stores security parameters, such as encryption keys, to protect communication
between the mobile device and the network.
The EIR is a database that stores information about mobile devices, including their unique
identifiers (IMEI numbers).
The EIR helps track stolen or unauthorized devices, allowing the network to take preventive
measures, such as blocking access or alerting authorities.
These components work together to establish and maintain cellular connections, ensuring the
efficient and secure operation of mobile communication services. The architecture and specific
components may vary based on the cellular network standard (e.g., GSM, CDMA, LTE) and the
generation of technology (2G, 3G, 4G, 5G).
Cellular network types: Cellular networks use different technologies to transmit data, and each
technology is associated with specific standards and protocols. Here are discussions on some of
the key cellular network types in terms of how they transmit data:
CDMA is a digital cellular technology that allows multiple users to share the same frequency band
simultaneously through the use of unique codes. CDMA transmits data by assigning a unique code
to each conversation, allowing multiple users to communicate on the same frequency without
interference. CDMA is associated with technologies such as CDMA2000 and WCDMA
(Wideband CDMA).
137
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
4. 5G (Fifth Generation):
5G is the latest generation of wireless communication technology designed to provide faster data
speeds, lower latency, and support for a massive number of connected devices. 5G utilizes
technologies such as millimeter-wave frequencies, beamforming, and advanced modulation
schemes to enable high-capacity and low-latency data transmission. 5G represents the next
evolution in cellular networks, supporting applications like augmented reality, virtual reality, and
the Internet of Things (IoT).
138
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
transmission, allowing multiple services to coexist on the same network. While iDEN networks
have been largely phased out, they were historically used by Nextel in the United States.
UMTS is a 3G mobile communication technology that builds upon GSM, offering higher data rates
and improved multimedia support. UMTS uses wideband CDMA (W-CDMA) for data
transmission, providing increased capacity and data speed compared to 2G GSM networks. UMTS
is a stepping stone between 2G and 4G technologies.
These cellular network types employ various access techniques and transmission technologies to
enable wireless communication, and their evolution reflects advancements in data speed, capacity,
and latency across different generations of mobile communication.
Operating Systems:
The forensic examination of a phone is significantly influenced by its operating system (OS),
dictating the creation and storage methods of digital artifacts. Modern mobile operating systems
encompass Symbian, Apple iOS, Windows CE, Windows Mobile, Google’s Android, and
Blackberry OS.
Originally, the Symbian OS emerged from a collaboration among Nokia, Ericsson, Motorola, and
Psion. Sony Ericsson introduced the first Symbian-powered phone in 2000, and in 2008, Nokia
acquired the OS rights, subsequently making it open source. Currently, Symbian is utilized in
Nokia and Sony Ericsson handsets (Barbara, 2010b).
Introduced in 1999 by Research In Motion (RIM), Blackberry phones are prevalent among
businesses and government entities. Known for synchronization capabilities with Novel’s
GroupWise and Microsoft’s Exchange, Blackberry OS supports multitasking and various
139
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
applications. This proprietary OS has carrier-specific versions, differing between providers such
as Verizon and AT&T (Barbara, 2010b).
Android, an open-source OS, is developed by the Open Handset Alliance. Acquired by Google in
2005, Android has been continuously developed by the alliance since 2007. Comprising 84
technology and mobile companies, the Open Handset Alliance aims to enhance mobile innovation.
Android is featured on handsets produced by Motorola, Sony Ericsson, and HTC, with a multitude
of third-party apps available (Barbara, 2010b).
Apple's iOS, prominent on the iPhone, extends to other mobile devices like the iPad and iPod
touch. Derived from Apple's Mac OS X, iOS heavily relies on third-party apps obtainable from the
Apple App Store.
Microsoft’s Windows Mobile serves the smartphone and mobile device market. Similar to its
counterparts, Windows Mobile supports an extensive array of applications (Barbara, 2010b).
Now that we’ve looked at how cell phones and networks function, we can look at some of the
information they hold that may qualify as evidence. It’s important not to focus on one source, as
relevant evidence can be found in multiple locations within the handset and the network.
The Personal Identification Number (PIN) is used to secure the handset. Three consecutive,
unsuccessful attempts to enter the correct PIN will result in the user being locked out.
140
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
The Personal Unlock Key (PUK) will be needed to unlock the SIM after this lockout has occurred.
Typically, a PUK can only be supplied by the provider of the SIM card.
Call detail records (CDR) are normally used by the provider to troubleshoot and improve the
networks performance. The CDR is also valuable to examiners.
Although the CDRs can tell you a lot, what they cannot tell you is who actually made the call. It
is important to understand the difference between the CDR and the subscriber information.
Subscriber information and the call detail records are not the same. Typical subscriber information
would include things such as the name, address, and telephone. Other items included with
subscriber information are account numbers, e-mail addresses, services, payment mechanisms, and
so on. Every service provider keeps all of these records for a predetermined period of time. The
time period is spelled out in their data retention policies.
- Identify the device, document make and model, and note its condition.
141
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
- Document physical damage or signs of tampering.
5. Chain of Custody:
142
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
7. Documentation of Accessories:
8. Data Preservation:
143
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
15. Reporting:
Effective collection and handling of cell phone evidence demand technical expertise, adherence to
standardized procedures, and a deep understanding of legal and ethical considerations. Thorough
documentation at every step is essential for maintaining evidence integrity throughout the forensic
process.
As you might suspect, there are many, many different tools available to forensically examine a
phone. These tools can come in the form of hardware or software. One of the realties is that not all
of these tools support all cell phones. To further complicate matters, two tools that actually support
a given phone may not read and recover the same information.
144
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
What follows is a sampling of the available tools for cell phone forensics. A close examination of
the function and features shows that no single tool does it all. One glaring difference is the number
of phones that are supported. Budget permitting, most labs will have multiple tools available to
increase their capabilities.
BitPim is a robust open-source application that was not built for forensic purposes. It is designed
to work with CDMA phones that are produced by several vendors, including LG and Samsung
among others. BitPim can recover data such as the phonebook, calendar, wallpapers, ring tones,
and file system.
Oxygen Forensic Suite is a forensic program specifically designed for cell phones. It’s a tool that
supports more than twenty-three hundred devices. It extracts data such as phonebook, SIM card
data, contact lists, caller groups, call logs, standard and custom SMS/MMS/e-mail folders, deleted
SMS messages, calendars, photos, videos, JAVA applications, and GPS locations.
Paraben Corporation offers several hardware and software products targeted to mobile device
forensics. In addition to cell phones, their tools also support GPS devices such as those from
Garmin.
AccessData’s MPE+ supports over thirty-five hundred phones. It’s an on-scene, mobile forensic
recovery tool that can collect call history, messages, photos, voicemail, videos, calendars, and
events. It can analyze and correlate multiple phones and computers using the same interface.
145
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
EnCase Smartphone Examiner is an EnCase tool designed to review and collect data from
smartphones and tablet devices. It collects data from Blackberries, iTune backups, and SD cards.
Once the information is collected, it is easily imported into the EnCase Forensic suite for continued
investigation.
5. What role does the Mobile Switching Center (MSC) play in a cellular network?
A. Manages mobile applications
B. Routes calls and manages connections
C. Controls mobile devices
146
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
D. Provides internet connectivity
6. What is the function of the Home Location Register (HLR) in a cellular network?
A. Stores subscriber information and location
B. Manages mobile apps
C. Controls network security
D. Provides internet services
11. What type of evidence can be obtained from mobile location data?
A. Browser history
B. Call logs
C. Geographical movements of the device
D. App permissions
147
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
12. What does SMS stand for in the context of mobile forensics?
A. Short Message Service
B. Subscriber Management System
C. Secure Mobile Storage
D. System Maintenance and Support
14. What is the primary function of a mobile forensic tool like Cellebrite UFED?
A. Video editing
B. Data extraction and analysis from mobile devices
C. Network monitoring
D. Cloud storage management
15. What is ADB (Android Debug Bridge) used for in mobile forensics?
A. Mobile app development
B. Connecting to and communicating with Android devices
C. Satellite communication
D. Network optimization
17. In a cellular network, what is the purpose of the Visitor Location Register (VLR)?
A. Provides internet services
B. Stores subscriber information and location temporarily
C. Manages mobile apps
D. Controls network security
148
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
19. What is the significance of IMSI (International Mobile Subscriber Identity) in mobile
forensics?
A. Device serial number
B. Subscriber's unique identification number
C. Mobile network encryption key
D. Mobile app permissions
20. Which mobile forensic tool is often used for logical analysis and extraction of data from iOS
devices?
A. Oxygen Forensic Detective
B. Magnet AXIOM
C. XRY
D. Elcomsoft Phone Breaker
23. What is the function of the Serving GPRS Support Node (SGSN) in a GPRS/EDGE
network?
A. Manages mobile apps
B. Routes calls and manages connections
C. Controls network security
149
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
D. Handles packetswitched data services
25. What type of evidence can be extracted from mobile device call logs in forensic
investigations?
A. Deleted text messages
B. Browser history
C. Time and date of calls
D. App source code
Answers:
1. B. Investigating digital evidence on mobile devices
2. C. To capture and preserve the data on a mobile device
3. A. SIM card
4. C. Cell tower
5. B. Routes calls and manages connections
6. A. Stores subscriber information and location
7. C. A high-speed mobile data standard
8. A. Faster data transfer rates
9. C. 2G
10. B. Information about phone calls and text messages
11. C. Geographical movements of the device
12. A. Short Message Service
13. B. FTK Imager
14. B. Data extraction and analysis from mobile devices
15. B. Connecting to and communicating with Android devices
16. B. Unlocking a device to remove restrictions
17. B. Stores subscriber information and location temporarily
18. D. Video calling support
19. B. Subscriber's unique identification number
20. A. Oxygen Forensic Detective
150
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata
B.Sc.-ANCS (Semester IV)
Digital Forensics (BNCSC401)
Sec A
Academic Session 2023-24
Study Material
1. Explain the concept of mobile forensics and why it is crucial in the field of digital
investigations.
2. Describe the key components of a cellular network and their roles in enabling mobile
communication.
Study Material
4. Explain the types of evidence that can be extracted from a cell phone in a forensic
investigation.
5. Discuss the techniques and tools commonly used in mobile forensics to retrieve and analyze
data from mobile devices.
6. Outline the challenges associated with mobile forensics, including those related to device
diversity and encryption.
7. Discuss the role of the Home Location Register (HLR) in a cellular network and its
significance in mobile forensics.
8. Compare and contrast GSM (Global System for Mobile Communications) and CDMA (Code
Division Multiple Access) cellular network technologies.
9. Elaborate on the importance of preserving the integrity of cell phone evidence during a
forensic investigation.
10. Explain the role and significance of mobile forensic tools in the field of digital forensics.
Provide examples of specific mobile forensic tools and describe the types of data they can extract
from mobile devices.
11. Discuss some of the challenges and limitations associated with using mobile forensic tools.
How do these challenges impact the effectiveness of mobile forensic investigations, and what
strategies can be employed to overcome them?
12. Examine the legal and ethical considerations associated with mobile forensic investigations.
Discuss the importance of adhering to legal standards and ethical guidelines when conducting
examinations of mobile devices. Provide examples of cases where failure to uphold these
standards led to legal consequences.
152
Sasmit De
Assistant Prof. (CST)
Brainware University, Kolkata