CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak



Similar documents
Chapter 3: The Investigator s Office and Laboratory

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Guide to Computer Forensics and Investigations, Second Edition

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Course Forensic Science. Unit II History

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Computer Forensics Preparation

EC-Council Ethical Hacking and Countermeasures

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Services. Computer Forensic Investigations

JAMES R. SWAUGER Digital Forensic Examiner

CAREER: FORENSIC SCIENCE TECHNICIAN 1

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

Short courses presented by the NWU Programme in Forensic Accountancy

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Conviction Integrity Unit Best Practices October 15, 2015

GUIDELINES FOR FORENSIC LABORATORY MANAGEMENT PRACTICES INTRODUCTION

JOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015

Forensic Certifications

STATE OF COLORADO July 2015

How To Get A Computer Hacking Program

Digital Forensics & e-discovery Services

Computer Hacking Forensic Investigator v8

Crimes (Computer Hacking)

Digital Forensics. Larry Daniel

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Digital Forensics for Attorneys Overview of Digital Forensics

PLEASE NOTE: THIS POLICY WILL END EFFECTIVE NOVEMBER 10, 2013 AND WILL BE REPLACED BY THE INTERACTIVE RESOLUTION POLICY ON NOVEMBER 11, 2013.

CYBER FORENSICS (W/LAB) Course Syllabus

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy

U.S. MILITARY INVESTIGATIONS: TYPES & PROCEDURES

Cyber Crime and Digital Forensics in Japan

C R I M E S C E N E. Forensic Science CC Spring 2007 Prof. Nehru

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

ATTORNEY GENERAL INVESTIGATOR

Roy D. Rector CFCE EnCE

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS

How To Become A Forensic Technician

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

INTRODUCTION AREAS OF SPECIALIZATION

Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Lance Eliot Sloves. Computer Forensic Services, Inc Allen St. #743

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) e dhains@vincents.com.au w

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:

FIRE MARSHAL I, DEPUTY

Computer Forensics: an approach to evidence in cyberspace

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW HOUSE BILL 27

Background Check Laws: District of Columbia Scott J. Wenner and Joleen Okun, Schnader Harrison Segal & Lewis LLP

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner

Name: State Bar number: Telephone: Fax: Full time SF office address: Mailing address (if different):

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

WHISTLEBLOWER POLICY. a) Code means the TALIC's code of conduct as in force from time to time;

How To Become A State Pol Forensic Tech Leader

Modalities for Forensic Review of Computer Related Frauds

PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120

How to Use the California Identity Theft Registry

LAW ENFORCEMENT OFFICER

COS/PSA 412 Computer Forensics and Investigations

Forensic Science: Crime Scene Basics. T. Trimpe

Prosecuting Attorneys Council of Georgia Transition Into Prosecution Program

PROFESSIONAL COUNSELSM

Forensic Accounting: Relevance In Corporate Governance

Section 17: Offenses against the Administration of Justice

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC Chapter 5.5. False Claims and Whistleblower Protection

Practice Aid Serving as an. Expert Witness. or Consultant

INTRODUCTION TO CRIME SCENES:

THE CRIME SCENE. Chapter , 2008 Pearson Education, Inc. Upper Saddle River, NJ 07458

Labor and Employment 2015 Conference

TERMS & CONDITIONS OF BUSINESS

ANTI-FRAUD POLICY Adopted August 13, 2015

PART II - CODE OF ORDINANCES GENERAL ORDINANCES Chapter 2 - ADMINISTRATION ARTICLE XVI. - BOARDS, COUNCILS, COMMISSIONS AND AUTHORITIES

Transcription:

CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic Law Issues

Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites

Investigation Process According to many professionals, Computer Forensics is a four (4) step process: Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws

Digital Investigation Process Model Brian Carrier An Event-Based Digital Forensic Investigation Framework

Readiness Phases Computer forensics lab Where you conduct your investigation Store evidence House your equipment, hardware, and software American Society of Crime Laboratory Directors (ASCLD) offers guidelines for: Managing a lab Acquiring an official certification Auditing lab functions and procedures

Staff Readiness Lab manager duties : Estimate when to expect preliminary and final results Create and monitor lab policies for staff Provide a safe and secure workplace for staff and evidence Staff member duties: Knowledge and training: Hardware and software OS and file types Deductive reasoning

Acquiring Certification and Training Update your skills through appropriate training International Association of Computer Investigative Specialists (IACIS) Created by police officers who wanted to formalize credentials in computing investigations Certified Electronic Evidence Collection Specialist (CEECS) Certified Forensic Computer Examiners (CFCEs)

Acquiring Certification and Training (continued) High-Tech Crime Network (HTCN) Certified Computer Crime Investigator, Basic and Advanced Level Certified Computer Forensic Technician, Basic and Advanced Level EnCase Certified Examiner (EnCE) Certification AccessData Certified Examiner (ACE) Certification Other Training and Certifications High Technology Crime Investigation Association (HTCIA)

Acquiring Certification and Training (continued) Other training and certifications SysAdmin, Audit, Network, Security (SANS) Institute Computer Technology Investigators Network (CTIN) NewTechnologies, Inc. (NTI) Southeast Cybercrime Institute at Kennesaw State University Federal Law Enforcement Training Center (FLETC) National White Collar Crime Center (NW3C)

Physical Requirements for a Computer Forensics Lab Most of your investigation is conducted in a lab Lab should be secure so evidence is not lost, corrupted, or destroyed Provide a safe and secure physical environment Keep inventory control of your assets Know when to order more supplies

Digital Crime Scene Investigation Phases Brian Carrier An Event-Based Digital Forensic Investigation Framework

Digital Evidence Searching Phase

Event Reconstruction Phase Brian Carrier An Event-Based Digital Forensic Investigation Framework

Ethics and Codes Ethics Rules you internalize and use to measure your performance Codes of professional conduct or responsibility Standards that others apply to you or that you are compelled to adhere to by external forces Such as licensing bodies People need ethics to help maintain their balance And self-respect and the respect of their profession

Applying Ethics and Codes Laws governing codes of professional conduct or responsibility Define the lowest level of action or performance required to avoid liability Expert witnesses should present unbiased, specialized, and technical evidence to a jury Expert witnesses testify in more than 80% of trials And in many trials, multiple expert witnesses testify

Applying Ethics and Codes to Expert Witnesses The most important laws applying to attorneys and witnesses are the rules of evidence Experts are bound by their own personal ethics and the ethics of their professional organizations In the United States, there s no state or national licensing body for computer forensics examiners

Computer Forensics Examiners Roles in Testifying Computer forensics examiners have two roles: Scientific/technical witness and expert witness Scientific/technical witness Person involved in a case, investigator that found and presented the evidence As expert witness You can testify even if you weren t present when the event occurred Or didn t handle the data storage device personally Criticism: it s possible to find and hire an expert to testify to almost any opinion on any topic

Organizations with Codes of Ethics No single source offers a definitive code of ethics for forensic investigator You must draw on standards from other organizations to form your own ethical standards

International Society of Forensic Computer Examiners Includes guidelines such as the following: Maintain the utmost objectivity in all forensic examinations and present findings accurately Conduct examinations based on established, validated principles Testify truthfully in all matters before any board, court, or proceeding Avoid any action that would appear to be a conflict of interest

International Society of Forensic Computer Examiners (continued) Includes guidelines such as the following: (continued) Never misrepresent training, credentials, or association membership Never reveal any confidential matters or knowledge learned in an examination without an order from a court of competent jurisdiction or the client s express permission

International High Technology Crime Investigation Association HTCIA core values include the following requirements related to testifying: The HTCIA values the Truth uncovered within digital information and the effective techniques used to uncover that Truth, so that no one is wrongfully convicted The HTCIA values the Integrity of its members and the evidence they expose through common investigative and computer forensic best practices, including specialized techniques used to gather digital evidence

International Association of Computer Investigative Specialists Standards for IACIS members include: Maintain the highest level of objectivity in all forensic examinations and accurately present the facts involved Thoroughly examine and analyze the evidence Conduct examinations based upon established, validated principles Render opinions having a basis that is demonstratively reasonable Not withhold any findings that would cause the facts of a case to be misrepresented or distorted

BCS CODE OF CONDUCT Public Interest Legitimate rights of third parties include protecting personal identifiable data to prevent unlawful disclosure and identity theft, and also respect for copyright, patents and other intellectual property. Professional Competence and Integrity You should only claim current competence where you can demonstrate you have the required expertise e.g. through recognised competencies, qualifications or experience. Duty to Relevant Authority If any conflict is likely to occur or be seen by a third party as likely to occur you will make full and immediate disclosure to your Relevant Authority. Duty to the Profession Share knowledge and understanding of IT and support inclusion of every sector of society.

Legal Issues In criminal investigation you ALWAYS have to have warrant!!! Warrant can be issued for: Entire company, floor, room, a device, car, house, any company/person owned property Mobile phone cases issues with interception rules laid down in RIPSA [Regulations of Investigative Powers (Scotland) Act]

Ethics and Warrants A lot of the ethical issues are covered by the warrants system. Before a warrant can be issues a judge is presented with the evidence that suggests a search will find something relating to the crime under investigation. He will then way this against the person's freedoms and decide whether the warrant should be granted.

Corporate Investigation Issues Non-criminal internal investigation can be restricted by the individual s right of privacy Data Protection Act Company Polices

Best Practice ACPO Principle 1 - No action taken by law enforcement or their agents should change data held on an electronic device or media which may subsequently be relied upon in Court. Principle 2 - In exceptional circumstances where a person finds it necessary to access original data held on an electronic device or media, that person must be competent to do so, and be able to give evidence explaining the relevance and the implications of their actions.

Best Practice ACPO Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result.

Best Practice ACPO Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to.

ANY QUESTIONS?

Assessment: Short-Answer Examples Question: What are the requirements for the computer forensic lab? Answer:

Assessment: Short-Answer Examples Question: What is a difference between Ethics and Code of Practice? Answer:

Assessment: Short-Answer Examples Question: How Data Protection Act can create problems in a corporate investigation? Answer: