What is the Forensic Process?

The Computer Forensic Examination Process

Computer forensics involves the preservation, identification, extraction, interpretation, and documentation of computer evidence. The field of computer forensics has different facets, and is not defined by any one particular procedure. At a very basic level, computer forensics is the analysis of information contained within and created with computer systems, typically in the interest of figuring out what happened, when it happened, how it happened, and who was involved.

In many cases, the information gathered during a computer forensics investigation is not readily available or viewable by the average computer user. This might include items like deleted files and fragments of data that can be found in the space allocated for existing files, which is known by computer forensic practitioners as “slack space”. Special skills and tools are necessary to be able to obtain this type of information or evidence.

Typically, confirming or preventing a crime or violation through a computer forensics examination is a reactive measure to a circumstance. However, today, computer forensic examinations are often used pro-actively for the continuous monitoring of electronic media. In some cases, computer forensics is even used in a debriefing process for employees exiting a company.

Active, Archival, and Latent Data

In computer forensics, there are three types of data that we are concerned with – active, archival, and latent.

  • Active Data is the information that we can actually see. This includes data files, programs, and files used by the operating system. This is the easiest type of data to obtain.
  • Archival Data is data that has been backed up and stored. This could mean backup tapes, CDs, floppies, or entire hard drives.
  • Latent Data is the information that one typically needs specialized tools to access. An example of latent data would be information that has been deleted or partially overwritten.

A computer investigation could involve looking at all of these data types, depending on the circumstances. Obtaining latent data is by far the most time consuming and costly.

Computer forensics is all about obtaining the proof of a crime or breech of policy. It focuses on obtaining proof of an illegal misuse of computers in a way that could lead to the prosecution of the culprit.

The primary phases in a computer forensics examination are:

  • Discussion of suspicion and concerns of potential abuse, by telephone
  • Harvesting of all electronic data
  • Identification of violations or concern
  • Protection of the proof
  • Confirming qualified, verifiable evidence
  • Delivery of a written report and comments of the examiner

If you think you may have a problem, it is best to act quickly since computer evidence is volatile and can be readily destroyed. It is also better to know for certain than to risk possible consequences. If you are unfortunate enough to uncover a potential problem, it may be prudent to seek confidential advice from a Certified Forensic Examiner before determining a solution. Handling this situation on your own is a risky strategy which may have far-reaching effects. If you are committed to using in-house staff, remember the basics of evidential integrity – and don’t be tempted to use shortcuts.

When carried out correctly, the forensic analysis of computer systems involved in abuse can provide valuable evidence which might otherwise have been lost or overlooked. Performed incorrectly, and your evidence could give guilty parties the opportunity they need to get a case dismissed.

Steps in the Forensic Examination Process

Computer forensic investigations should always be conducted by a Certified Computer Forensic Examiner. They will use licensed equipment which prevents tainting of the evidence and ensures its validity in court. The steps involved for a computing investigation are briefly summarized below:

Step 1

A chain of custody is established. The examiner makes sure they are aware at all times where any items related to the investigation are located. A safe or cabinet is often used to secure items.

Step 2

All relevant information is cataloged. This includes active, archival, and latent data. Information that has been deleted will be recovered to whatever extent possible. Encrypted information and information that is password-protected is identified, as well as anything that indicates attempts to hide or obfuscate data. The integrity of the original media is maintained to the highest extent possible, which means that the original source of information should not be altered. An exact copy of a hard drive image is made and that image is authenticated against the original to make sure that it is indeed exact.

Step 3

Additional sources of information are obtained as the circumstances dictate. This includes firewall logs, proxy server logs, Kerberos server logs, sign-in sheets, etc.

Step 4

The information is analyzed and interpreted to determine possible evidence. Both exculpatory (they didn’t do it) and inculpatory (they did it) evidence is sought out. If appropriate, encrypted files and password protected files are cracked.

Step 5

A written report will be submitted to the client with the investigator’s findings and comments.

Step 6

If necessary, the investigator will provide expert witness testimony at a deposition, trial, or other legal proceeding.

The information contained in this document covers the basics, and really doesn’t do full justice to all facets of computer forensics. However, you should now have a better understanding of what steps are involved in the process.

When it comes to retrieving critical electronic data, time is of the essence.

Computer Forensics of Boston conducts computer forensics investigations locally as well as nationally and internationally. We offer quick response with competitive rates. Inquire about our special package rates for volume and exit interviews.

We encourage you to contact us today at 1-800-868-8189 or email us to discuss your needs in more detail. All information will be kept strictly confidential.

Computer Forensics of Boston, proudly serving The greater Boston metropolitan area and worldwide.