Theme 2: Scenes and Acquisition Flashcards

(21 cards)

1
Q

Preparation for Entering a Scene

A
  1. Understand Operational Constraints: Resources and intelligence
  2. Consider Legal, Ethical and Media Considerations: Warrants, consider other routes of investigation that you may interfere with e.g. fingerprinting
  3. Check Permissions: Check validity of warrants
  4. Wear Appropriate Outfits: Health and safety
  5. Prepare Equipment: Avoid contaminating equipment e.g. personal phones that can be detected by IoT or magnets. Bring storage. And ensure devices are functional and you are competent with them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Entering a Scene

A
  1. Decide on Entry Time: Enter when suspect is likely to be actively using a device to avoid anti forensics
  2. Arrival: Dress appropriately, check equipment, ensure documentation is on-hand to prove warrant
  3. Map the Scene: Take photographs, identify hazards, identify what data is volatile and understand what is important
  4. Communicate: Define roles and follow them to avoid repeating actions and contamination
  5. Fill in Documentation: Search log form
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Searching a Scene

A
  • se a Methodical Approach: Clockwise, top-to-bottom
  • Search Suspects: Portable storage and smart wearables
  • Cyber Dogs: Can locate hidden devices through chemicals used on electronics
  • Understand Potential Devices: May not be the newest devices e.g. floppy disks
  • Follow ACPO Guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-forensics

A

used by technically competent people to interfere with digital forensics including

  • Complete destruction of data: Chemical or slow-wipe
  • Harming investigations: Needles, sharp objects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What to Collect

A

Data collected must be proportional, relevant, and justified due to legal guidelines and resource limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to Collect Devices

A

Signal Emitting Devices: Use a faraday bag or aeroplane mode.

Search for Anti-forensics: To avoid harm

Turned on Devices: Follow ACPO 2

Turned off Devices: Follow ACPO 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to Turn off Devices

A

To turn off a device, directly cut power to avoid software-based processes cleaning up volatile data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transporting Evidence

A

Transport carefully to avoid damage and quickly to ensure the battery does not deplete and cause ACPO 2 to be violated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Evidence Bags

A

They must be labelled, sealed and stored securely. If opened, the old bag must be placed in a new evidence bag and labelled accordingly to preserve provenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Storage Evidence

A

Store securely.
Should be stored in faraday cages if signal emitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

External Review

A

performed to understand device capabilities

  • Type of Device
  • Model Numbers
  • Contextual Function: What the user used the device for
  • Ports
  • Customisations: Additions and labels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internal Review

A

Furthers understanding of the device

  1. Identify Hazards
  2. Take Apart Devices
  3. Search for Hidden Objects
  4. Understand Cables
  5. Identify Storage Media by Following Cables
  6. Extract Storage: Not always possible due to encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Four Components of Mobile Devices

A
  • Main Handset: Operating system
  • Battery: Can hide small objects
  • Sim Card: Can store data such as contacts and recent calls
  • Expansion Card: Non-apple products, treat as secondary storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Provided by Network Providers

A
  • Registered Name and Address
  • Associated Numbers
  • Payment Details
  • Call Information
    • Originating and Receiving Number
    • Call Duration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prerequisites to Performing Acquisition

A

Check Permissions: Device provenance and how it was obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Generalised Acquisition Framework

A
  1. Determine Investigation Parameters: Define the legal, ethical, organisational, and resource constraints that will guide the acquisition process.
  2. Identify Acquisition Target and Output Location: Specify the data to acquire, where it’s located, and where and how it will be securely stored.
  3. Identify Acquisition Approaches: Map all possible methods for accessing the data, prioritising those closest to the original source.
  4. Validate Acquisition Approaches: Test each method on a similar device to ensure it is reliable, legal, and does not compromise data integrity.
  5. Establish the Order of Modification: Rank validated methods based on their likelihood of modifying data and overall suitability.
  6. Attempt Data Acquisition: Use validated methods in order of least intrusiveness to acquire the data from the evidential device.
  7. Validate Data Acquisition: Confirm the acquired data is correct, intact, and usable; if not, retry using the next validated method.
17
Q

Acquisition Approaches

A
  • Write-blocker with Removed Storage Media: Physically remove the storage media and image with a write blocker to prevent alteration
  • Wireless: Capture wirelessly transmitted data in real-time or from network logs
  • JTAG: A hardware interface standard used to access and extract memory content at the hardware level
  • Chip Off: De-solder memory chips and read directly. High risk of damage
  • Man-in-the-Middle: Intercept in-transit data between two devices
  • Tool Driven: Use commercial forensic tools to automate acquisition
  • Industry Closed: Proprietary methods or tools used by specific vendors
18
Q

Live Acquisition

A

The process of capturing volatile data, such as RAM, active processes, encryption keys, passwords etc from a system that is running

It is used when powering down the device risks losing volatile data

Follow ACPO principle 2

19
Q

Disk Image Formats

A
  • EnCase .E01: Proprietary, compressed and includes metadata
  • Raw Binary .DD: Bit-for-bit copy of storage device
20
Q

Hashing

A
  • Hashing confirms integrity but does not verify authenticity, context, or provenance.
  • Proper documentation and secure handling helps ensure the validity of evidence
21
Q

Why disable auto-mounting

A

Inhibit the risk of the data being modified