Module 4-1 - Collecting-Evidence
Module 4-1 - Collecting-Evidence
Evidence
Topics
• Crime scenes
• Documenting
• Chain of Custody
• Forensic cloning
• Live and Dead Systems
• Hashing
• Final Report
Crime Scenes and
Collecting Evidence
Securing the Scene
• Valuable evidence
– Text messages, email, call logs, contacts
• Interacting with the phone can change
data
– Apple's "Find My iPhone" app can be used to remotely wipe the
phone
[reference: DFIR-Smartphone-Forensics-Poster]
Removable Media
[reference: DFIR-Smartphone-Forensics-Poster]
Isolating Cell Phones
[reference: DFIR-Smartphone-Forensics-Poster]
Questions at the Scene
• Photographs
• Written notes
• Video
• Record precise details
– Type, make, model, serial number
– Whether a device is on or off
– Network connections
– Peripheral connections like printers
– Document and label cables
Photography
• No set standard
• Chronological is common
• Those notes will guide you in court
later
• Notes can be discoverable and may
be seen by other side
– Don't draw conclusions or speculate
Chain of Custody
Marking Evidence
• Proprietary
– EnCase (.E01) – Actually "Expert Witness"
– AccessData Custom Content Image (.AD1)
• Open
– Advanced Forensics Format (AFF)
• Open format, see link Ch 4a
– Raw (.dd or .001)
• Direct uncompressed disk image
Risks and Challenges
http://fpt.edu.vn 06/04/24 25