Digital Evidence Flashcards

(32 cards)

1
Q

How do we get from the crime scene -> court?

A
  • Search/ seizure, Profiling, Attribution
  • Telecoms, Digital forensics, Profiling, Attribution
  • CJS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How should you preserve evidence from a crime scene?

A
  • ideally, no data should be altered when seizing digital evidence (ACPO)
  • document the entire scene/location from which digital evidence is seized
  • collect, label and preserve digital evidence
  • package and securely/safely transport evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should you document a scene?

A

Zoning for organising and documenting a search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should you handle standalone computers when seizing them?

A
  • Is it turned OFF/ON - how can you tell?
  • If OFF - disconnect computer and bag/tag
  • if ON - check and photograph the screen
  • are there any signs of data being destroyed?
  • look out for the words: delete, format, remove, copy, move, cut, wipe
  • are there any signs of active communications - WhatsApp, Chat Rooms
  • remove power directly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How should you handle laptops when seizing them?

A
  • portable, more difficult to attribute?
  • how can you remove the power?
  • it might be ON but sleeping/hibernating
  • encryption more likely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should you handle external drives/disks when seizing them?

A
  • should you seize?
  • could they be powered ON?
  • how to transport safely?
  • how to find them?
  • encrypted disks?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to carry out Attribution?

A
  • timing/location
  • ask questions of suspects
  • ask questions of witnesses
  • note down locations
  • receipts for equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How should you handle mobile phones when seizing them?

A

Isolate it from the mobile network:
- turn it off
- turn on airplane mode
- remove SIM
- place in Faraday bag
- check date/time
- check battery level

Turning it OFF may lock you out for good!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How should you handle wireless routers when seizing them?

A
  • internet operator
  • wifi name
  • turned on/off
  • connected devices -> who’s
  • seize?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is digital profiling?

A

Patterns of usage
- using data to build a picture of who an individual is
- determine whether data activity is outside of what’s normal for an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What digital identifiers can make up a digital profile?

A
  • E-Mail
  • Services/storage
  • Passwords
  • User id
  • Device bank account
  • Device identifiers
  • Phone numbers
  • Physical addresses
  • Account name
  • IP Adress
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does attribution do?

A

Links suspect to device/activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is attribution?

A
  • data becomes meaningless if devices/data/activity can’t be attributed to subjects
  • the process of linking individuals to devices/data/activity
  • we can know a suspect’s mobile phase was in the vicinity of the crime because of cell site analysis work
  • what do you need to attribute in this investigation?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of what can be used for attribution

A
  • witness statements
  • suspect interviews
  • top-up history, shop CCTV
  • cell activity/patterns (calling family/friends)
  • cell site locations
  • digital forensic examinations
  • wet forensics (DNA/prints)
  • CCTV/ANPR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What historical data can be used to ascertain patterns?

A
  • Who are they regularly calling?
  • Where are they regularly going?
  • Wwere the physical movements and calling patterns around the time of the incident unusual?
  • Can be difficult, especially anonymous accounts
  • subscribers/sign up info (IP address used)
  • Account reset telephone number/e-mail - reuse of old account/old data?
  • Using usernames across other platforms?
  • Forensic examination of devices (logged in user, other attributable activity around the time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an email header?

A
  • the part you don’t usually see - embedded within and is a key component that we’re interested in
  • contains info to ensure correct delivery
  • can be accessed easily but method of accessing the info changes
  • examining an extended email header, you work from bottom up looking for the first public IP address after received from
17
Q

What is a base transceiver station (BTS)?

A
  • coverage divided into 3 cell sector
  • each sector has an identifier called Cell Identity (CI)
  1. 31276
  2. 31275
  3. 31274
18
Q

What is the GSM Core Network?

A

Base system substation
- Mobile station (mobile phone) -> MS
- BTS -> cell site
- Base Station controller -> BSC

Network switching substation
- Mobile switching center
split into internet, PSTN, SMSC (SMS Service Center) -> MSC
- Equipment Identity Register -> EIR
- Home location register - > HLR
- authentication -> AUC

19
Q

What is a digital evidence case study?

A

Soham Murders - solved via cell site
- 4th August 2002
- Holly Wells and Jessica Chapman (10)
- 6 pm -> girls went to buy sweets, leaving the family BBQ. Live cell site monitoring consisted as Police knew Jessica had a phone

5:45 pm - Ian Huntley (caretaker of local school and knew the girls) speaks to them as they pass his house.

20
Q

What HLR cell site data was recovered in this case?

A
  • The phone switched OFF at 6:46 pm on Sunday 4th August 2002
  • Switched off in a ‘controlled fashion’
  • Registered at 30 degrees Burrell cell site sector at this time
  • Burrell is 3 miles south of Soham
21
Q

What is computer forensics?

A
  • removable hard disk drive (HDD)
  • forensic copy of data is made/verified to make sure it’s an exact copy
  • analysis performed on the copy, so original data and evidence is preserved
22
Q

What types of data are available from computer forensics?

A
  • Dates/times of when files were created/modified
  • Users of the computer
  • When the computer was first installed
  • How often programs were used
  • Most commonly opened files
    and more …
23
Q

What types of data are available from computer forensics?

A
  • OS (recycle bin, MRU, Prefetch, jump lists)
  • Internet browsing
  • Communication
  • Media (audio, pictures, video)
  • Email
  • Documents
24
Q

What is mobile forensics?

A
  • no removable hard disk drive (HDD) but SIM card and possibly memory card
  • must be switched on to extract data which will change the data
  • different interfaces (USB/Apple Lightening)
25
What are the types of acquisition?
- manual - logical - physical - chip-off
26
What is manual acquisition?
- photographing screen - slow/less data - useful if no forensic support available for the device - no deleted/hidden data
27
What is logical acquisition?
- similar to mobile phone backup - must be switched on to extract data - only current data (not deleted)
28
What is physical acquisition?
- similar to the hard disk image, nearly an exact copy made - deleted/hidden data recovered - can bypass passcodes/PIN codes (not typically encryption)
29
What is chip-off acquisition?
- similar to a hard disk image (exact copy) - deleted/hidden data recovered - can bypass passcodes/PIN codes (not typically encryption) - difficult -> risky, expensive, specialised
30
What is the Criminal Justice system?
Collective body responsible for administrating justice in the UK
31
What is the Crown Prosecution Service (CPS)?
- plays a key role in less serious offenses so the police can make charging decisions - prone, based on evidence that the defendant is guilty - call witnesses - eye, police, expert - magistrates, judge and jury retire to consider the verdict - sentencing - appeals
32
Final thoughts on digital forensics
- rapid advances in technology - large volumes of data - complex data - privacy - encryption