Keywords: Digital evidence, forensically sound evidence
|
|
|
- Tamsyn Barber
- 9 years ago
- Views:
Transcription
1 Chapter 1 WHEN IS DIGITAL EVIDENCE FORENSICALLY SOUND? Rodney McKemmish Abstract Forensically sound is a term used extensively in the digital forensics community to qualify and, in some cases, to justify the use of aparticular forensic technology or methodology. Indeed, many practitioners use the term when describing the capabilities of a particular piece of software or when describing a particular forensic analysis approach. Such a wide application of the term can only lead to confusion. This paper examines the various definitions of forensic computing (also called digital forensics) and identifies the common role that admissibility and evidentiary weight play. Using this common theme, the paper explores how the term forensically sound has been used and examines the drivers for using such a term. Finally, a definition of forensically sound is proposed and four criteria are provided for determining whether or not a digital forensic process may be considered to be forensically sound. Keywords: Digital evidence, forensically sound evidence 1. Introduction Emerging from the needs of law enforcement in the 1980s, forensic computing (also referred to as digital forensics) has evolved to become an integral part of most criminal investigations. The digital forensic specialist plays a fundamental role in the investigative process whether it is the forensic analysis of personal computers, cell phones and PDAs belonging to suspects and witnesses, or the acquisition and analysis of network traffic in response to computer security incidents. Forensic computing also plays an increasingly important role in civil litigation, especially in electronic discovery, intellectual property disputes, employment law disputes and IT security incidents.
2 4 ADVANCES IN DIGITAL FORENSICS IV In the context of law enforcement, it has been argued that the emergence of forensic computing as a discipline was due to the needtoprovide technical solutions to legal problems [6]. The technical solution involves the extraction of electronic data by processes that ensure that the resulting product is legally acceptable as evidence. Some scholars argue that legal drivers are the principal force behind shaping the growthand evolution of forensic computing [19]. As in the case of criminal investigations, the need to meet evidentiary requirements also provides a strong stimulus for forensic computing in civil litigation. Not surprisingly, a common element that emerges from forensic computing in criminal and civil matters is the need to produce electronic evidence in a manner that does not detract from its admissibility. The growing emphasis on admissibility in recent years has caused the focus of the forensic computing discipline to shift to the domainof forensic science. With this shift comes the need to formalize manyof the forensic processes and procedures that have been developed in an unstructured or ad hoc manner. Evidence of the shift is apparent in NIST s Computer Forensic Tools Testing Program [15] as well as in the work of the Scientific Working Group on Digital Evidence (SWGDE) [20] and the Electronic Evidence Technical Advisory Group of the Australian National Institute of Forensic Science, which is helping integrate the forensic computing function into the forensic science domain [14]. The need to ensure that electronic evidence produced by a forensic process is admissible has given rise to the term forensically sound when seeking to describe the reliability of the forensic process. Before exploring what forensically sound means, we briefly examine current thinking about the discipline of forensic computing. 2. What is Forensic Computing? Numerous digital forensics experts have attempted to define the term forensic computing. As expected, their definitions are influenced by their perspectives and experience. In 1999, based on an examination of digital forensic activities by law enforcement agencies from eight countries, McKemmish [12] defined forensic computing as a process encompassing the identification, preservation, analysis and presentation of digital evidence in a legally acceptable manner. Anderson, et al. [1] emphasize the scientific nature of forensic computing by defining it as the science of using and analyzing information in order to reason post hoc about the validity of hypotheses which attempt to explain the circumstances or cause of an activity under investigation. On the other hand, Hannan, et al. [9] adopt an
3 McKemmish 5 investigative focus and define forensic computing as a set of processes or procedures focusing on the investigation of computer misuse. Some definitions of forensic computing focus solely on the underlying legal scope. For example, Casey [5], a computer security and computer crime consultant, postulates a criminal basis for forensic computing by emphasizing that it focuses on establishing how an offense has occurred. On the other hand, Carrier [3], a research scientist and author of several forensic tools, provides a more detailed definition of forensic computing that encompasses the investigative and scientific elements: The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations. Despite the comprehensive nature of his definition of forensic computing, Carrier still restricts its scope to criminal-related activity. Defining forensic computing is a difficult proposition. After examining various definitions of forensic computing, Hannan [8] concludes that no single definition can adequately define the current meaning of forensic computing. McCombie and Warren [11] emphasize that digitalforensics is fundamentally different from other types of investigations and that major differences exist in the basic definition of forensic computing. Despite their differences, all the definitions share one common element theneedtomaintaintheevidentiaryweightoftheforensiccomputing product. McKemmish [12] uses the term legally acceptable, Anderson, et al. [1] stipulate the need to meet evidentiary requirements, and Casey [5] and Carrier [3] refer to digital evidence in the context of legal weight. All these authors highlight the need for a forensic process to maximize the evidentiary weight of the resulting electronic evidence. Indeed, when the evidentiary weight is maximized, the digital forensics community would generally concur that the evidence is forensically sound. 3. Forensically Sound Evidence To better understand what the term forensically sound might actually mean, we first examine the usage of the term. An Internet search quickly shows that the term is used to characterize everything from disk imaging software to a particular approach for extracting computer data. In the context of disk imaging, digital forensics professionals qualify the term by stating that, to be forensically sound, the disk image must be a bit-for-bit copy of the original (i.e., an exact copy). Some go further by
4 6 ADVANCES IN DIGITAL FORENSICS IV adding that the disk imaging process must not only produce an exact copy, but must also include a means for verifying the authenticity of the copy and the reliability of the copying process. Authenticity is typically ensured by using some form of mathematical fingerprinting or hashing that provides a signature for a given block of data. To ensure reliability, it is often advocated that the disk imaging process include an audittrail that clearly records the success or failure of all or part of the copying process. Therefore, one might argue that, in order to be forensically sound, a disk imaging process must satisfy the following requirements: The disk imaging process must produce an exact representation (copy) of the original. The duplicated data must be independently authenticated as being atruecopy. The disk imaging process must produce an audit trail. Amoreauthoritativeoverviewofthediskimagingprocessisfound in NIST s Disk Imaging Tool Specification (Version 3.1.6) [16]. The document specifies a number of mandatory and optional requirements for disk imaging tools. The principal requirements are: The tool shall make a bit-stream duplicate or an image of an original disk or partition. The tool shall not alter the original disk. The tool shall be able to verify the integrity of a disk image file. The tool shall log I/O errors. The documentation of the tool shall be correct. When the term forensically sound is used to describe the forensic process as a whole, it is done so with two clear objectives: 1. The acquisition and subsequent analysis of electronic data has been undertaken with all due regard to preserving the data in the state in which it was first discovered. 2. The forensic process does not in any way diminish the evidentiary value of the electronic data through technical, procedural or interpretive errors. It is often the case that to meet these objectives, the conceptof forensically sound is expressed in terms of a series of steps or procedures to
5 McKemmish 7 be followed. While this approach is logical and is certainly the most measurable, in reality, it is the lack of uniformity that diminishes its value. Specifically, the steps or procedures often vary from one author to the next and may contain more or less detail. Additionally, the forensic perspective and experience of an author can have a significant bearing on the construction of the forensic process. For example, consider the difference in the acquisition of data in computer forensics and intrusion forensics cases. In computer forensics, the focus is on obtaining a snapshot of the system at a given point in time (typically using a disk imaging process). In the case of intrusion forensics, the focus is more likely to be on monitoring and collecting data from a network over time. It is, therefore, difficult to advocate taking adiskimageofalivesystemwhosestatechangesovertimeandwhere the evidence (network traffic and log files) is in a dynamic state. Compounding the uncertainty surrounding the meaning and use of the term forensically sound is the lack of a clear definition orconcise discussion in the digital forensics literature. For example, Guidelines for the Management of IT Evidence [7] published by Standards Australia uses the term forensically sound in the context of evidence collection, but does not clarify its meaning. An alternate approach used to qualify forensic processes centers on the adoption of several principles rather than the application of clearly defined steps or processes. The Good Practice Guide for Computer Based Electronic Evidence published by the Association of Chief Police Officers (United Kingdom) [13] lists four important principles related to the recovery of digital evidence: 1. No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. 2. In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. 3. An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. 4. The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.
6 8 ADVANCES IN DIGITAL FORENSICS IV Similarly, the International Organization on Computer Evidence [10] has specified the following six principles: 1. When dealing with digital evidence, all of the general forensic and procedural principles must be applied. 2. Upon seizing digital evidence, actions taken should not change that evidence. 3. When it is necessary for a person to access original digital evidence, that person should be trained for the purpose. 4. All activity relating to the seizure, access, storage or transfer of digital evidence must be fully documented, preserved and available for review. 5. An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in his/her possession. 6. Any agency, which is responsible for seizing, accessing, storing or transferring digital evidence, is responsible for compliance with these principles. The well-known U.S. Department of Justice publication, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations [22], does not list any principles per se. However, the publication does address many of the points discussed above and provides a comprehensive explanation of the forensic process and the related U.S. legal issues. In a 1999 paper titled What is Forensic Computing? McKemmish [12] specified four rules aimed at maximizing the admissibility of digital forensic processes. These rules, which are similar to the principles described above, are: 1. Minimal handling of the original: The application of digital forensic processes during the examination of original data shall be kept to an absolute minimum. 2. Account for any change: Where changes occur during a forensic examination, the nature, extent and reason for such changes should be properly documented. 3. Comply with the rules of evidence: The application or development of forensic tools and techniques should be undertaken with regard to the relevant rules of evidence.
7 McKemmish 9 4. Do not exceed your knowledge: A digital forensics specialist should not undertake an examination that is beyond his/her current level of knowledge and skill. 4. Why Define Forensically Sound? Despite the variations in the use of forensically sound, there remains one universally consistent objective for a digital forensic process the need to ensure that the end product does not lose its evidentiary weight and, therefore, its admissibility as evidence. Given this overriding consideration, it is not surprising to see an ever increasing number of digital forensics professionals referring to their work product as being derived from a forensically sound methodology and/or technology. Indeed, this term is commonly used in affidavits and expert reports, especially when justifying the use of a specific methodology or technology. The greatest driver to defining the term forensically sound may,in fact, come from the legal community. In 2005, the Australian Law Reform Commission (ALRC) released a review of the various Australian uniform evidence acts [2]. The section titled Reliability and Accuracy of Computer-Produced Evidence examines the Australian legislative framework that facilitates the proof of electronic evidence. The ALRC analysis identifies several viewpoints. One viewpoint, which relies heavily on the work of Spenceley [21], emphasizes that a higher threshold for the admission of computer-produced output into evidence [shouldbe] established. Citing Spenceley s research, the ALRC review notesthat aquestioncouldberaisedaboutthereliabilityofcomputer-generated output because it is impossible to test for either the inaccuracy or accuracy of computer operations, and impossible to give a statistical rate of failure, and that there is therefore no rational basis for assuming a high rate of reliability. To negate the impact of questions about reliability, the ALRCreview notes that Spenceley builds a case for adopting an approach that relies on implementing a redundant mechanism in the environment in which the computer is used to address the problem of reliability of computer output. The purpose of the redundant mechanism is to prevent or mitigate unreliability by helping provide some level of verification that afailureinthecomputerhasnotoccurred. Toachievethisgoal, the ALRC review cites Spenceley s test of admissibility: It should be demonstrated that: (a) Some mechanism(s) of redundancy (however formulated and implemented) was or were utilized in connection with the production of particular material in the setting in which it was produced; and that (b) It is reasonably likely that any error(s) in the operation of that computer that affected the accuracy of infor-
8 10 ADVANCES IN DIGITAL FORENSICS IV mation contained in that material would have been detected by such mechanism(s). Not surprisingly, when government entities such as ALRC begin to probe the evidentiary value of computer-generated output and, in particular, raise questions about the current reliance on computer-generated output, greater attention is automatically placed on the digital forensic process. Given the variation in the usage of the term forensically sound and the focus on the reliability of computer-generated output from an evidentiary perspective, two key questions arise: What does forensically sound mean? How does one know if something is forensically sound? The answer to these questions is important when one considers that the term forensically sound is used to not only substantiate a particular forensic technology or methodology, but also to substantiate it in the context of proving the admissibility of the digital forensic output in legal proceedings. This last point makes it all the more critical that there be aclearunderstandingofwhatmakessomethingforensicallysound. 5. What Does Forensically Sound Mean? The Compact Oxford English Dictionary [17] defines the word forensic as meaning: (1) relating to or denoting the application of scientific methods to the investigation of crime. (2) of or relating to courts of law. The same dictionary defines the word sound in the context of something is said to be sound as meaning: (1) in good condition. (2) based on reason or judgement. (3) financially secure. (4) competent or reliable. (5) (of sleep) deep and unbroken. (6) severe or thorough. Utilizing these individual definitions it may be argued that the term forensically sound means the production of reliable electronic evidence before a court of law. In the context of digital evidence, however, the question of reliability is perhaps the key element. Consequently (and given the variations in the use of the term as detailed above), amore concise definition of forensically sound is: The application of a transparent digital forensic process that preserves the original meaning of the data for production in a court of law. The word transparent in this definition implies that the reliability and accuracy of the forensic process is capable of being tested and/or verified. The phrase preserves the original meaning intimates that the
9 McKemmish 11 data derived from the forensic process must be capable of being correctly interpreted. In addition to these points, it is worth noting that the term digital forensic process covers not only the methodology employed, but also the underlying technology. 5.1 Evaluation Criteria Reliability and completeness are the two most critical properties of evidence with respect to digital forensic processes. If the reliability and/or completeness of any potential evidence are questionable, its evidentiary value is greatly diminished. Obviously, the question of evidentiary weight and, in particular, admissibility is a legal question that is ultimately determined by the court. Therefore, it is imperative that a digital forensic process be undertaken in manner that does not diminish the authenticity and/or veracity of the evidence. So what makes a process forensically sound? More specifically, how can a court or lawyer determine if a claim of forensic soundness is legitimate? Given that digital forensic processes comprise many variables, it is difficult to adopt a prescriptive approach that would apply in every circumstance. The solution is to subject the forensic process to several criteria that determine if forensic soundness is an inherent propertyor merely an unfounded claim. Once a claim of forensic soundness isshown to be appropriate, it becomes a matter of ascertaining the reliability of the electronic evidence. We propose four criteria for ascertaining the forensic soundness of adigitalforensicprocess. Ifallfourcriteriaaresatisfied, the forensic process possesses the key properties associated with the concept of being forensically sound. Criterion 1: Meaning Has the meaning and, therefore, the interpretation of the electronic evidence been unaffected by the digital forensic process? When potential electronic evidence is acquired and analyzed, it is important that it be preserved in the state in which it was found and that it not be changed by a digital forensic process unless absolutely unavoidable. While the preservation of the data and its associated properties are critical aspects of this concept, they tend to be used in the context of the acquisition of data as opposed to its analysis. Indeed, some digital forensic technologies may result in subtle changes in the way data is presented (e.g., dates and times may be shown in different formats). However, in this case, the raw binary data has not been directly altered; rather, it differs from the original only in the way it is presented. The
10 12 ADVANCES IN DIGITAL FORENSICS IV meaning of the data is unchanged, although its representation may be modified. Thus, the value of the data is not of itself diminished. Criterion 2: Errors Have all errors been reasonably identified and satisfactorily explained so as to remove any doubt over the reliability of the evidence? It is imperative that all software and hardware errors encountered during a digital forensic process be identified and that their impactbe clearly identified and explained. Merely saying that there was an error in copying a file is insufficient. The nature of the error, its impact on the accuracy and reliability of the evidence, and any potential interference on the forensic process are all issues that must be discussed. Therefore, a digital forensic process should be designed to avoid undetectable errors wherever possible. Undetectable errors usually arise when anewpieceof software is being used during the evidence acquisition or analysis phases. In such circumstances, it is imperative that all the software toolsused in the forensic process be properly tested and assessed prior to their use. When an error is identified, it is in the interest of the digital forensic process to ensure that the nature of the error and its impact if any are clearly identified. Failure to do so can affect the reliability of the evidence. Indeed, Casey [4] notes that forensic examiners who do not account for error, uncertainty and loss during their analysis may reach incorrect conclusions in the investigative stage and may find it harder to justify their assertions when cross-examined. Criterion 3: Transparency Is the digital forensic process capable of being independently examined and verified in its entirety? Given that the results of a digital forensic process are used to substantiate a particular event or activity, it is critical in the interests of natural justice that the entire forensic process be accurate and reliable. To enable such an assessment, it is of paramount importance that the forensic process be transparent and capable of being independently verified. A key element of verification is the ability to reproduce the forensic process under the same conditions with a consistent level of quality being observed each time the process is run [18]. Transparency can be achieved by documenting all the steps, identifying the forensic software and hardware used, detailing the analysis environment and noting any problems, errors and inconsistencies. A key exception occurs when a part of the forensic process is not disclosed for legitimate legal reasons (e.g., public interest immunity); obviously, determining the validity of any exception is at the discretion of the court.
11 McKemmish 13 The level of detail required to ensure transparency will, of course, reside in the overall scope and objectives of the forensic process. Criterion 4: Experience Has the digital forensic analysis been undertaken by an individual with sufficient and relevant experience? Fundamental differences exist between how a digital forensics professional undertakes the examination of computer data and how a person unfamiliar with the forensic process performs the same task. For a forensic process to possess the property of forensic soundness, it must have been designed and implemented with due regard to forensic issues. In digital forensics, such a quality is directly derived from the knowledge and skill of the individual performing the forensic analysis. Consequently, if the individual has inadequate experience, itisquestionable how he/she could satisfy the court that the meaning of the resulting data has not been affected, or that any errors encountered do not impact the reliability of the resulting evidence. 6. Conclusions Electronic data is very susceptible to alteration or deletion. Whether it is an intentional change resulting from the application of some computer process or an unintentional change arising from system failure or human error, the meaning of electronic data can be altered rapidly and easily. Indeed, just as electronic data is created, changed and/or deleted through the normal operations of a computer system, there is the possibility of change arising from the application of an incorrect or inappropriate digital forensic process. Given that the results of such a process may be tendered as evidence, it is critical that every measure be taken to ensure their reliability and accuracy. To this end, a digital forensic process must be designed and applied with due regard toevidentiary issues. Furthermore, it is important that the forensic process be capable of being examined to determine its reasonableness andreliability. It is only when the forensic process is judged to be reliable and appropriate, that a claim of forensic soundness can truly be made. References [1] A. Anderson, G. Mohay, L. Smith, A. Tickle and I. Wilson, Computer Forensics: Past, Present and Future, Technical Report, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia, 1999.
12 14 ADVANCES IN DIGITAL FORENSICS IV [2] Australian Law Reform Commission, Review of the Uniform Evidence Acts, ALRC Discussion Paper 69, Sydney, Australia ( stlii.edu.au/au/other/alrc/publications/dp/69/index.html), [3] B. Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, vol. 1(4), [4] E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol.1(2),2002. [5] E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, AcademicPress,SanDiego,California, [6] P. Craiger, M. Pollitt and J. Swauger, Law enforcement and digital evidence, in Handbook of Information Security, Volume 2,H.Bidgoli (Ed.), John Wiley, New York, pp , [7] A. Ghosh, Handbook : Guidelines for the Management of IT Evidence, StandardsAustralia,Sydney,Australia,2003. [8] M. Hannan, To revisit: What is forensic computing? Proceedings of the Second Australian Computer, Network and Information Forensics Conference, pp ,2004. [9] M. Hannan, S. Frings, V. Broucek and P. Turner, Forensic computing theory and practice: Towards developing a methodology for a standardized approach to computer misuse, Proceedings of the First Australian Computer, Network and Information Forensics Conference, [10] International Organization on Computer Evidence, Guidelines for Best Practice in the Forensic Examination of Digital Technology, Digital Evidence Standards Working Group, [11] S. McCombie and M. Warren, Computer forensic: An issue of definition, Proceedings of the First Australian Computer, Network and Information Forensics Conference, [12] R. McKemmish, What is forensic computing? Trends and Issues in Crime and Criminal Justice, no.118( /tandi/ti118.pdf), [13] National High Tech Crime Unit, Good Practice Guide for Computer Based Electronic Evidence, Association of Chief Police Officers, London, United Kingdom ( /gpg computer based evidence v3.pdf), [14] National Institute of Forensic Science, Melbourne, Australia (
13 McKemmish 15 [15] National Institute of Standards and Technology, Gaithersburg, Maryland ( [16] National Institute of Standards and Technology, Disk Imaging Tool Specification (Version 3.1.6), Gaithersburg, Maryland ( imaging.htm), [17] Oxford University Press, Compact Oxford English Dictionary (Third Edition), Oxford,UnitedKingdom,2005. [18] L. Pan and L. Batten, Reproducibility of digital evidence in forensic investigations, Proceedings of the 2005 Digital Forensic Research Workshop, [19] D. Ryan and G. Shpantzer, Legal aspects of digital forensics ( [20] Scientific Working Group on Digital Evidence ( [21] C. Spenceley, Evidentiary Treatment of Computer-Produced Material: A Reliability Based Evaluation, Ph.D. Thesis, University of Sydney, Sydney, Australia, [22] U.S. Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Washington, DC (
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008
Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
MSPB HEARING GUIDE TABLE OF CONTENTS. Introduction... 1. Pre-Hearing Preparation... 2. Preparation of Witness... 4. Preparation of Documents...
MSPB HEARING GUIDE TABLE OF CONTENTS Introduction........................................................ 1 Pre-Hearing Preparation............................................... 2 Preparation of Witness................................................
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
When E-Discovery Becomes Evidence
Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Authentication of Documents/Use of Professional Stamps
Authentication of Documents/Use of Professional Stamps 1 Introduction The intention of this guideline is to amplify and clarify requirements for authentication of documents and use of the stamp, based
http://www.xmission.com/~sgolding/publications/sgfp.htm
Page 1 of 12 SPECIALTY GUIDELINES FOR FORENSIC PSYCHOLOGISTS Committee on Ethical Guidelines for Forensic Psychologists Division 41 American Psychological Association March 9, 1991 Introduction The Specialty
Understanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
Legal view of digital evidence
Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate
Forensic accounting and the law: The forensic accountant in the capacity of an expert witness
MPRA Munich Personal RePEc Archive Forensic accounting and the law: The forensic accountant in the capacity of an expert witness Marianne Ojo Covenant University 18. April 2012 Online at https://mpra.ub.uni-muenchen.de/38180/
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Computer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
ediscovery and Information Governance Practice Overview
ediscovery and Information Governance Practice Overview ediscovery and Information Governance Electronic discovery, or ediscovery, is increasingly changing from the exception to the norm in modern litigation.
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Academic Writing: a language-based approach
Law The following first year law essay was written in response to this question: The National Legal Aid Advisory Council defined access to justice as meaning: Access to the Australian legal and administrative
Computer Forensics Today
L A W, I N V E S T I G A T I O N S, A N D E T H I C S Computer Forensics Today Kelly J. (KJ) Kuchta When people hear the word forensics, it often generates a mental image of the movie series with Jack
Immigration and Customs Enforcement Forensic Analysis of Electronic Media
for the Immigration and Customs Enforcement Forensic Analysis of Electronic Media DHS/ICE/PIA-042 May 11, 2015 Contact Point Peter T. Edge Executive Assistant Director Homeland Security Investigations
INTRODUCTION AREAS OF SPECIALIZATION
Eoghan-Intro.qxd 1/6/04 3:01 PM Page 1 INTRODUCTION INTRODUCTION In the years since the first edition of this book, there has been an explosion of interest in digital evidence. This growth has sparked
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
Proposed Auditing Standard: Inquiry Regarding Litigation and Claims (Re-issuance of AUS 508)
EXPOSURE DRAFT ED 27/05 (December 2005) Proposed Auditing Standard: Inquiry Regarding Litigation and Claims Prepared and Issued by the Auditing and Assurance Standards Board Commenting on this Exposure
The legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014
CLIENT MEMORANDUM Hong Kong High Court Procedure E-Discovery: Practice Direction Effective September 1, 2014 August 28, 2014 Mandatory application of e-discovery Mandatory application of e-discovery to
The Business Case for ECA
! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean
Framework for a Digital Forensic Investigation
Framework for a Digital Forensic Investigation Michael Kohn 1, JHP Eloff 2 and MS Olivier 3 1 [email protected], 2 [email protected], 3 [email protected] Information and Computer Security Architectures
Electronic Signature Law, 5761-2001
Unofficial translation: Electronic Signature Law, 5761-2001 Chapter 1 : General 1. Definitions In this Act Signature Verification Device unique software, object or information required for verifying that
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
COURT PRACTICE AND PROCEDURE FOR EXPERTS
COURT PRACTICE AND PROCEDURE FOR EXPERTS Justice Peter Biscoe 1. It is a pleasure to present this paper to the Environmental Institute of Australia and New Zealand s Professional Environmental Practice
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
Online Detainee Locator System
for the Online Detainee Locator System April 9, 2010 Contact Point James Chaparro Director, Office of Detention and Removal Operations U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
LogRhythm and HIPAA Compliance
LogRhythm and HIPAA Compliance The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to ensure that personal information stored,
WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance
WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance Complying With HIPAA The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of
*Rule 1.4(a) *Rule 1.16(a) *Rule 1.16(a)(2) *Rule 1.16(b) *Rule 3.3 *DR7-102(A)(4) *DR7-102(A)(6)
NEW HAMPSHIRE BAR ASSOCIATION Ethics Committee Formal Opinion 1993-94/7 Candor to Tribunal: Use of Questionable Evidence In Criminal Defense January 27, 1994 RULE REFERENCES: *Rule 1.2 *Rule 1.2(a) *Rule
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
Capstone Project - Software Development Project Assessment Guidelines
Capstone Project - Software Development Project Assessment Guidelines March 2, 2015 1 Scope These guidelines are intended to apply to 25 point software development projects, as available in the MIT and
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Inquiry Regarding Litigation and Claims
Auditing Standard AUS 508 (July 2002) Inquiry Regarding Litigation and Claims Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation Issued by the Australian
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.
The Effect of Product Safety Regulatory Compliance
PRODUCT LIABILITY Product Liability Litigation The Effect of Product Safety Regulatory Compliance By Kenneth Ross Product liability litigation and product safety regulatory activities in the U.S. and elsewhere
Mapping Process of Digital Forensic Investigation Framework
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 163 Mapping Process of Digital Forensic Investigation Framework Siti Rahayu Selamat 1, Robiah Yusof 2, Shahrin
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Privacy Impact Assessment for the. E-Verify Self Check. March 4, 2011
for the E-Verify Self Check March 4, 2011 Contact Point Janice M. Jackson Privacy Branch, Verification Division United States Citizenship and Immigration Services 202-443-0109 Reviewing Official Mary Ellen
UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs)
UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs) Michael Köhn 1, J.H.P. Eloff 2, MS Olivier 3 1,2,3 Information and Computer Security Architectures (ICSA) Research Group Department of Computer
TOWARDS A FORMALIZATION OF DIGITAL FORENSICS
Chapter 3 TOWARDS A FORMALIZATION OF DIGITAL FORENSICS Jill Slay, Yi-Chi Lin, Benjamin Turnbull, Jason Beckett and Paul Lin Abstract While some individuals have referred to digital forensics as an art,
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
QUALITY STANDARDS FOR DIGITAL FORENSICS
QUALITY STANDARDS FOR DIGITAL FORENSICS November 20, 2012 TABLE OF CONTENTS PREFACE... ii MANAGEMENT STANDARDS... 1 A. DIGITAL FORENSIC CAPABILITY... 1 B. QUALITY MANAGEMENT... 2 PERSONNEL STANDARDS...
A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION
A BEST PRACTICE APPROACH TO LIVE FORENSIC ACQUISITION MM Grobler 1, SH von Solms 2 1 Council for Scientific and Industrial Research, Pretoria, South Africa 2 Academy for Information Technology, University
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
Information Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
Guidance Statement GS 011 Third Party Access to Audit Working Papers
GS 011 (April 2009) Guidance Statement GS 011 Third Party Access to Audit Working Papers Issued by the Auditing and Assurance Standards Board GS 011-1 - GUIDANCE STATEMENT Obtaining a Copy of this Guidance
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers
Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4
E-Discovery: New to California 1
E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
Prize Indemnity Policy Wording
Prize Indemnity Policy Wording v12.15 Pen Underwriting Pty Ltd ABN 89 113 929 516 AFSL 290518 Our name comes from the expression to pass the pen. It reflects what we do and what we bring to the insurance
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Effective from 1 January 2009. Code of Ethics for insolvency practitioners.
INSOLVENCY PRACTITIONERS (PART D) Effective from 1 January 2009. Code of Ethics for insolvency practitioners. On 1 January 2014 a minor change was made to paragraph 400.3 of the code. The change clarifies
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Insurance Commission of Western Australia
Compulsory Third Party - Claims Management Review Summarised Version November 2014 1. Executive summary 1.1 Background As part of the routine internal audit program, ICWA has requested Ernst & Young (EY)
DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions
DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.
1.0 INTRODUCTION 1.1 Overview
Guidance document for the writing of standard operating procedures (Taken from United States Environmental Protection Agency Guidance for Preparing Standard Operating Procedures (SOPs) EPA QA/G- 6 [EPA/600/B-
Professional Ethics in Liquidation and Insolvency
COE Section 500 Issued February 2012Revised July 2015 Effective on 1 April 2012 Code of Ethics for Professional Accountants Part E Section 500 Professional Ethics in Liquidation and Insolvency SECTION
The Role of the Expert Engineer in Construction Disputes
Presentation to Engineers Ireland South East Region The Role of the Expert Engineer in Construction Disputes 12 January 2012 David Buckley BEng (Hons), LLM (Const. Law & Arb.), CEng MIEI MICE Chartered
Protocol for the Instruction of Experts to give Evidence in Civil Claims
Protocol for the Instruction of Experts to give Evidence in Civil Claims June 2005 amended October 2009 CONTENTS Page No. 1. Introduction... 3 2. Aims of Protocol... 3 3. Application 4 Limitation. 4 4.
Reforming criminal laws in any state is a time-consuming, intensive, and laborious
23 Chapter 4 Guiding Principles for the Criminal Law Reform Process Reforming criminal laws in any state is a time-consuming, intensive, and laborious process, requiring institutions and individuals with
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Tasmanian Government Identity and Access Management Toolkit
Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: [email protected]
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix
