Tuesday, 18 August 2015

5 STEPS TO CONDUCT A COMPUTER FORENSIC INVESTIGATION

The increase in criminal activities involving the use of electronics warrants a structured investigation of criminal and civil litigations by employing computer forensic analysis. Digital forensic analysis is a meticulous process of uncovering data/ evidence that is relevant to the successful resolution of a case. However, deploying digital forensics to aid investigation demands a team of experienced computer forensic analysts, high end digital forensic tools and equipment and an organized lab where evidence recovered can be converted to structured reports thus helping the effective representation of defendants during trials.
Here is a detailed view of the process that can help you understand its role, limitations and the activities involved if you are willing to pursue a career in the stream.
 https://www.einvestigator.com/wp-content/uploads/2013/12/computer-forensic-software.png
Selecting a Process of Investigation
Digital Forensic has been a part of investigation procedures since 1984 when officials started employing computer programs to uncover evidence hidden in electronics and digital formats. The process has evolved to become more organized, sophisticated and well equipped with latest tools and technologies. However, choosing a particular method of investigation is the duty of the digital forensic analyst. A messy process of analysis can lead to the accumulation of random data and inconclusive evidence thus directly affecting the outcome of a trial. It is important to construct a design plan and to choose appropriate tools and software to conduct the investigation and ensure that not a single step has been bypassed or ignored. 

Acquisition
Once the case study is completed and a strategy decided upon, the first basic step involves the acquisition of data/ evidence in the form of digital documents, videos, images, files, financial records, accounts, recent computer activity, browsing history, emails and social media messages. Computer forensic analysts are experts in finding evidence by recovering deleted files, emails, social media activities, tracking and monitoring transactions, tapping into servers and finding relevant data to support an investigation. 

 http://www.pennfoster.edu/~/media/Images/Tabs/Programs/ForensicComputerExaminerCert.ashx
Also a dedicated part of computer forensics involves retrieving information from cell phones in the form of call records, location information, phonebook details, text messages and other personal details like schedules, appointment details, videos and image files. In this phase the analysts ensure that the evidence has been retrieved using methodologies that abide by the law and are done with proper approval of authorizing personnel. 

Identification
This phase requires analysts to separate the relevant discovery in digital format and converting them into a form understood easily by laymen, judges and juries alike. All the retrieved data can be preserved in the form of raw digital data.  The raw data may then be culled and processed. The resulting data can then be organized producing well systematized reports using forensic tools.  Organization of the retrieved data is accomplished by using sophisticated forensic tools like Forensic Toolkit (FTK), Mobile Phone Examiner (MPE+) and dtSearch as efficient document search tools.   
 http://www.criminaljusticeprogramsonline.com/cjo/assets/iStock_000005044123Small.jpg
The relevant data may be hosted on an evidence review platform, accessible via internet.
Evaluation
This is the most important phase of digital forensic investigation which decides whether authentic and conclusive evidence has been discovered and subsequently determines the outcome of the litigation. The forensic analysts strive to find whether the information obtained is legitimate evidence and whether it can be presented during a trial. The components identified and preserved during the previous phases are correlated, a timeline of events is established and an inference is drawn that is relevant to the case and provides sufficient support in favor of the defendant. The Evaluation phase is an important element of effective representation of the client since it directly affects the successful resolution of a case. 

Admission
The carefully constructed reports and material evidence are of no use if they are discarded in a court of law as "inadmissible evidence". Therefore it is imperative that the proofs have been obtained using legal means, with permission from the authorizing entity, and the evidence is relevant. This factor will lend reliability to the evidence especially if it has been retrieved by a Certified Computer Forensic Examiner and ensure that the evidence is admissible at trial. 

Computer Forensic Investigation is a process which requires expertise and years of experience and desired results can be achieved only by following a well defined strategy.