Chapter 5
Chapter 5
Chapter 5
From the analysis standpoint, according to Lin (2018), there are similarities
between the three models even though they are from different governments across
the world or academia based. Every model has emphasis on some specific stage.
Although there are some similarities or differences, but still the main purpose is to
extract the digital evidence that is can introduced into the court. By mentioning the
court, the court only can accept the legal evidence after they agree on the violation
of law.
4. The Philippine National Police Anti-Cybercrime Group used a five-step
model
Identification
Acquisition
Examination/analysis
Reporting
Court presentation
Step 1. Identification
As explained by Marras (2014), identification is the stage of computer
forensics investigation in which an investigators explains and documents the origin of
evidence and its significance. Given that evidence can be interpreted from a number
of different perspectives, this phase determines the context in which the evidence
was found. It looks at both physical environment and the logical context of the
location of electronic evidence. Physically, evidence may reside on specific medium
such as hard drive.
Moreover, data can, therefore, be physically extracted from a hard drive using
methods such as keyword searching. Data can also be extracted in other ways – for
instance, by using file carving. File carving looks for specific files in a hard drive
based on the header, footer, and other identifiers in the file. By searching in this
manner, an investigator can recover files or file fragments of damaged or deleted
files in corrupt directories or damaged media.
Step 2. Data Acquisition
Acquisition is the first step in the forensic process and is critical to ensure the
integrity of the evidence. As acquisition is the first contact with the evidence. It is the
point where evidence is most likely to be damaged or destroyed. Simply turning on a
computer can lead to the modification of hundreds of evidentiary terms including
files, date and time stamps, introduction of new Internet history, and the destruction
of files that could be recovered from areas of the hard drive that are in the area of
unallocated space.
As stated by Holtz (2013), digital evidence needs to be preserved just like
other traditional forms of physical evidence, such as blood or hair. However, what
makes digital forensics unique is the fact that preservation refers specifically to the
ability to make a duplicate copy of the original digital evidence.
There are a variety of software that enables digital forensic analysts that can
create a forensic image of computer data like: (a) Access Data FTK. (b) Encase
Forensics, (c) Autopsy-Sleuth Kit, (d) Magnet Forensic Axiom, (e) X-Way Forensics,
(f) Blacklight forensics. These software makes the job of the digital forensics analyst
easier as it can process and categorized large amount of data in a short period of
time.
Moreover, Holtz (2018) stated that imaging is the initial step in the acquisition
process of digital evidence. Imaging is the process of making an exact copy (bit-by-
bit) of the original drive onto a new digital storage device. This new digital storage
device should be clean, meaning there is no digital data present or left over which
could contaminate the imaging process. The process of cleaning a digital storage
device ensure that there are no remnants of data present is known as wiping. When
imaging a drive, the digital forensic tool must be forensically sound. To be
forensically sound, the digital forensic tool must eliminate possibility of making any
changes to the original data source. To ensure that no changes are made to the
original data source, a write blocker is used. A write blocker is a device that allows
read-only access to all accessible data on a drive, as well as preventing anything
from being written to the original drive, which would alter or modify the original
evidence. Essentially, the imaging system is sending read-only commands to the
drive, and not write or modify commands.
Verification is the final step in the preservation process of digital evidence.
Verification establishes the integrity of the digital evidence by proving that the
duplicate is authentic. Digital forensic investigators verify the duplicate copies by
comparing values. A hash algorithm is a set of calculations that takes any amount
of data (input) and creates a fixed-length value (output), known as a hash, which
acts as a unique reference number for the original data. Hash values are fixed in
length and made up of a unique combination of hexadecimal digits; which can be the
numbers 0-9 or the letters a-f. These hash values act as digital fingerprints since
they are unique to the original data they reference.
Step 3. Examination/Analysis
The analysis phase of the investigation refers to the interpretation and
reconstruction of the digital crime scene. This process is not an easy task due to the
large amounts of data uncovered during a digital forensic investigation.
Moreover, as emphasized by Sachowski (2018), as the investigation starts to
focus on analyzing digital evidence to start making sense of it, the investigation
starts to move away from the scientific foundation and into the realm of art and
perception. On one hand, if practitioners rely too much on subjective points of view
based on experience, they could potentially overlook evidence. On the other hand, if
they rely too much on technology as the catchall way to find all evidence, they could
be led to wrong or incomplete conclusions. It is not that practitioners conjure up
some form of magic when they are determining what constitutes order (evidence)
versus chaos (clutter), it is that phase of the investigative workflow is more an art
than it is a science. Essentially, analytics is a practitioner’s ability to sort through
masses of data, find hidden patterns and correlations, and extract relevance and
meaning to establish facts. One part of this equation lies within the use of technology
that helps to automate the examination and analysis of digital evidence, but
practitioners cannot solely rely on technology to solve problems. The other part of
the equation is building and refining analytical skills through professional education,
training, and past experience.
After recovering the data during the analysis phase, the next step is data
reduction and filtering which occurs during the analysis phase. By reducing the
dataset, the digital forensics examiner only interprets those files relevant to the
investigation. Filtering may involve removing duplicate files, searching for keywords,
or grouping data based on file types. For example, a digital forensic examiner may
search for and group together image file types (e.g. JPEG, GIF, BMP) when
investigating a child pornography case. In addition, file hashes may be used to
eliminate duplicate data (Holtz, 2018).
Step 4. Reporting/Documentation
The next step in the digital forensic investigation is the report/presentation
phase. In the report/presentation stage, the findings determined to be relevant to the
investigation are finalized in a report. Only relevant evidence should be included in
the final report, rather than hypothetical or theoretical evidence. In addition, the
report should reflect complete transparency, meaning each step is described in detail
to leave no mystery in the digital forensics process. Specifically, the digital forensic
technicians should be prepared to testify in court regarding the survey/identification
(e.g. chain of custody), collection/acquisition (preservation, forensic tools), and
examination/analysis (data recovery and reduction) stages of the digital forensic
investigation.
As further stated by Britz (2013), successful prosecution of computer related
offenses often hinges upon formal reporting. Incomplete reports of inconsistent
testimony can negate even the best run investigations. Witnesses who are uncertain
to all aspects of their analysis or hesitant in their findings may be discredited or
impeached during cross-examination. Corollary, most forensic packages are capable
of creating logs and subsequent reports automatically. While many contemporary
investigators eschew the traditional approach, it is recommended that both strategies
are employed to enhance the credibility and veracity of the investigation.
According to Daniel and Daniel (2012), in general, a digital forensics report
should include:
a. Background and experience of the examiner
b. Tools used in the examination
c. Methods used to verify the data
d. Processes used to recover and extract the data
e. Statement of what the examiner found
f. Actual data recovered to support the statement of findings
Step 5. Court Presentation
Court presentation as discussed by Marras (2014), stated that in computer
forensics investigators must be prepared to testify in court. During their testimony,
they are usually required to defend their personal qualifications, methods, affidavit,
etc. Computer forensics experts must also be able to communicate their findings to a
variety of audience (e.g. juries, judges, lawyers, corporate management, and
administrative officials).
RULES ON ELECTRONIC EVIDENCE
Admissibility of Digital Evidence
To ensure the admissibility of digital proof in a court of law, certain legal and
technological criteria have to be met. With regard to the former, the court discusses
the legal permission to scan and seize information and communication technologies
and related data and the relevance, accuracy, integrity, and reliability of digital
evidence. With regard to the above, the court critically discusses the methods and
techniques of digital forensics used to collect, store, and analyze digital evidence;
the digital laboratories in which analyses are carried out; the reports of digital
forensic experts; and the professional and academic qualifications of analysts and
expert witnesses in digital forensics.
Assessment of Digital Evidence
Courts decide if the appropriate legal authorization for the search and seizure
of information and communication technology (ICT) and associated data has been
used. A search warrant, court order, or subpoena are among the forms of legal
authorization. The legal order necessary to obtain data relevant to ICT and ICT
varies according to jurisdiction. However, a search warrant is the legal order
predominantly used by countries to seize ICT. Nevertheless, due to the
circumstances of the situation, the circumstances surrounding the search and
seizure, and the credentials of those performing search, laws vary in legal order
criteria. In this step, the forensic significance of digital evidence is also assessed.
Forensic relevance is determined by whether the digital evidence:
Links or rules out a link between the suspect and the target (victim, digital
computer, website, etc.) and/or the scene of the crime (the location where the
crime or cybercrime took place
Supports or refutes evidence by suspects, victims and/or witnesses
Identifies the cybercrime culprit(s)
Provides details on the perpetrator’s Mode of Action (Modus Operandi or
M.O) (the patterns, strategies, and specific characteristics of the actions of the
perpetrator and
Reveals that a crime has happened (corpus delicti)
Consideration of Digital Evidence
The digital forensics techniques and methods used to collect the proof,
expertise, and qualifications of the digital forensics experts who acquired, stored,
and examined digital evidence are assessed in terms of integrity of digital evidence.
Basically, this assessment aims to evaluate if digital data has been stored, obtained
and examined using scientific criteria and requirements have been met to treat and
examine digital evidence (whether digital forensics tools were validated, up-to-date,
properly maintained, and tested before their use, to ensure their proper functioning).