Site icon Tutorial

Digital Evidence Collection

Go back to Tutorial

Evidence handling is clearly one of the most important aspects in the expanding field of computer forensics. The never-ending innovation in technologies tends to keep best practices in constant flux in effort to meet industry needs. One of the more recent shifts in evidence handling has been the shift away from simply “pulling the plug” as a first step in evidence collection to the adoption of methodologies to acquire evidence “Live” from a suspect computer.

The need for changes in digital evidence collection are being driven by the rapidly changing computing environment:

Live Digital Evidence Collection

Effectively Live forensics provides for the collection of digital evidence in an order of collection that is actually based on the life expectancy of the evidence in question. Simply put in all likelihood perhaps the most important evidence to be gathered in digital evidence collection today and for the foreseeable future exists only in the form of the volatile data contained within the computers RAM.

Order of volatility of digital evidence

An accepted best practice in digital evidence collection – modified to incorporate live volatile data collection.

Stand Alone Computer

For proper evidence preservation, follow these procedures in order (Do not use the computer or search for evidence)

Hashing

A reliable hash proves that the media contents have not been altered. Hashing program produces a fixed length large integer value (ranging from 80 – 240 bits) representing the digital data on the seized media. Any changes made to the original evidence will result in the change of the hash value.

Hashing is applying a mathematical algorithm to a file/disk/storage media to produce a value that is unique like fingerprint to that file/disk/dataset and any changes that will be made in the file/dataset will  in  turn  change/alter  the  hash  value.  Hash  value  is  one  of  the  widely  accepted  methods  of  authenticating any given data set (files/folders/storage media) in the courts of law across the world. The hash value is usually alphanumeric (containing alphabets and numbers). Different types of hash algorithms are available like MD5 (Message Digest 5), SHA256 (secure hash algorithm) for use.

The 128-bit (16-byte) MD5 hashes (also termed message digests) are typically represented as a sequence of 32 hexadecimal digits. The following demonstrates a 43-byte ASCII input and the corresponding MD5 hash

Digital  Evidence  Collection  form  is  one  of  the  most  important  elements  of  the  forensic  process.  It  is  necessary  that  the steps taken for collection should be accurate and repeatable with the same results every time it is done. For this to happen, a proper documentation of the process used for collection needs to be maintained for every device that is collected. This documentation should contain all the information about the evidence that is visible to the naked eye. It should contain information about the kind of software and version used and the time when the collection process started and ended. This documentation called as the Digital Evidence Collection (DEC) form thus consists of the information on the evidence and the media on which the evidence is being copied to.

The standard details captured in a DEC form are given below

Go back to Tutorial

Exit mobile version