Content deleted Content added
Rescuing 2 sources and tagging 0 as dead. #IABot (v1.5.1) |
Fixed some of the grammar problems. |
||
Line 6:
==Personnel==
The stages of the digital forensics process require
;Digital forensic technician
:Technicians
;Digital Evidence Examiners
Line 17:
There have been many attempts to develop a process model but so far none have been universally accepted. Part of the reason for this may be due to the fact that many of the process models were designed for a specific environment, such as law enforcement, and they therefore could not be readily applied in other environments such as incident response.<ref name="adams" /> This is a list of the main models since 2001 in chronological order:<ref name="adams" />
* The
* The
* An Extended Model of Cybercrime Investigations (Ciardhuain, 2004)
* The
* The Digital Crime Scene Analysis Model (Rogers, 2004)▼
* Framework for a Digital Investigation (Kohn, et al., 2006)
* The
* FORZA - Digital forensics investigation framework (Ieong, 2006)▼
* Process Flows for Cyber Forensics Training and Operations (Venter, 2006)▼
▲The Digital Crime Scene Analysis Model (Rogers, 2004)
* The Common Process Model (Freiling & Schwittay, (2007)▼
* The Two-Dimensional Evidence Reliability Amplification Process Model (Khatir, et al., 2008)▼
* The Digital Forensic Investigations Framework (Selamat, et al., 2008)▼
* The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice (Adams, 2012)▼
▲FORZA - Digital forensics investigation framework (Ieong, 2006)
▲Process Flows for Cyber Forensics Training and Operations (Venter, 2006)
▲The Common Process Model (Freiling & Schwittay, (2007)
▲The Two-Dimensional Evidence Reliability Amplification Process Model (Khatir, et al., 2008)
▲The Digital Forensic Investigations Framework (Selamat, et al., 2008)
▲The Systematic Digital Forensic Investigation Model (SRDFIM) (Agarwal, et al., 2011)
▲The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice (Adams, 2012)
==Seizure==
Prior to the actual examination, digital media will be seized. In criminal cases this will often be performed by [[Law enforcement agency|law enforcement]] personnel trained as technicians to ensure the preservation of evidence. In civil matters it will usually be a company officer, often untrained. Various laws cover the [http://www.duhaime.org/LegalDictionary/S/Seizure.aspx seizure] of material. In criminal matters, law related to [[search warrants]] is applicable. In civil proceedings, the assumption is that a company is able to investigate their own equipment without a warrant, so long as the privacy and human rights of employees are observed.
==Acquisition==
[[File:Tableau TD3 Forensic Imager 2014-06-26 07-05.jpg|thumb|Example of a portable disk imaging device]]
Once exhibits have been seized, an exact [[Disk sector|sector]] level duplicate (or "forensic duplicate") of the media is created, usually via a [[Forensic disk controller|write blocking]] device
The acquired image is verified by using the [[SHA-1]] or [[MD5]] [[cryptographic hash function|hash function]]s. At critical points throughout the analysis, the media is verified again, known as "hashing", to ensure that the evidence is still in its original state.
Line 63 ⟶ 48:
After acquisition the contents of (the HDD) image files are analysed to identify evidence that either supports or contradicts a hypothesis or for signs of tampering (to hide data).<ref name="carrier" /> In 2002 the ''International Journal of Digital Evidence'' referred to this stage as "an in-depth systematic search of evidence related to the suspected crime".<ref name="ijde-2002" /> By contrast Brian Carrier, in 2006, describes a more "intuitive procedure" in which obvious evidence is first identified after which "exhaustive searches are conducted to start filling in the holes"<ref name="df-basics"/>
During the analysis an investigator usually recovers evidence material using a number of different methodologies (and tools), often beginning with recovery of deleted material. Examiners use specialist tools (EnCase, ILOOKIX, FTK, etc.) to aid with viewing and recovering data. The type of data recovered varies depending on the investigation
Various types of techniques are used to recover evidence, usually involving some form of keyword searching within the acquired image file
On most media types, including standard magnetic hard disks, once data has been [[Secure file deletion|securely deleted]] it can never be recovered.<ref>{{cite web
| url = http://www.anti-forensics.com/disk-wiping-one-pass-is-enough
| title = Disk Wiping – One Pass is Enough
Line 81 ⟶ 66:
}}</ref>
Once evidence is recovered the information is analysed to reconstruct events or actions and to reach conclusions, work that can often be performed by less
{{quote|(1) the testimony is based upon sufficient facts or data, (2) the testimony is the product of reliable principles and methods, and (3) the witness has applied the principles and methods reliably to the facts of the case.<ref name="rule702" />}}
Line 88 ⟶ 73:
When an investigation is completed the information is often reported in a form suitable for [[layman|non-technical individuals]]. Reports may also include audit information and other meta-documentation.<ref name="casey"/>
When completed, reports are usually passed to those commissioning the investigation, such as law enforcement (for criminal cases) or the employing company (in civil cases), who will then decide whether to use the evidence in court. Generally, for a criminal court, the report package will consist of a written expert conclusion of the evidence as well as the evidence itself (often presented on digital media).<ref name="casey"/>
==References==
|