Digital Forensics Module 1
Digital Forensics Module 1
6 Investigative Reconstruction
7 Modus Operandi
cont...
4 Recently a survey was conducted to determine where the FBI was
focusing their computer forensic efforts. An alarming 74% of their
workload is centered on whitecollar crime.
5 This type of crime includes health care fraud, government fraud
including erroneous IRS and Social Security benefit payments, and
financial institution fraud. These are high-dollar crimes made easy by
technology.
6 The other 26% of the workload is split equally among violent crime
(child pornography, interstate theft), organized crime (drug dealing,
criminal enterprise), and counterterrorism and national security. As
shown by this survey, computer crime is widespread and has infiltrated
areas unimaginable just a few years ago. The FBI caseload has gone
from near zero in 1985 to nearly 10,000 cases in 2003. It is no doubt
considerably higher today.
Laws
E-governance In the IT Act of 2000, discusses electronic governance issues,
procedures and the legal recognition of electronic records dealt with in detail
followed by the description of procedures on electronic records, storage and
maintenance,
There are varius laws enforced in western countries like USA, UK, Australia
etc.
(GITAM School of Technology) Digital forensics July 20, 202212 / 28
Computer forensics Introduction Digital Evidence and Computer Crime History and Terminology of Computer Crime Investigation
1. Identification
The identification phase focuses on identifying potential sources of relevant
evidence, as well as key custodians (suspects) and physical locations of data.
2. Collection
The collection phase involves collecting the relevant evidence at the crime
scene or client site that was identified in the identification phase for forensic
analysis back in the forensics lab.
3. Preservation
The preservation stage involves the process of protecting the evidence while
maintaining the integrity of the source data.
4. Examination
The examination stage involves processing the working copy evidence that
was collected and preserved utilising various tools and techniques, following
a defined, repeatable step by step process.
5. Analysis
In this phase, the processed evidence is analysed to answer the questions
of the investigation of Who, What, When, Why, Where, and How. The
forensics team analyses specific artefacts from the processed data depending
on the type of investigation.
6. Presentation
The presentation phase and final step involve taking the findings from the
analysis stage and presenting the information in a detailed report as the
deliverable to the internal client.
Modus Operandi
• Be aware that introduction of any new technologies may have
unintended consequences.
• Recognize that the technology is not evil – however, its application
may be.
• Recognize that “modus operandi” answers the “How” part of the
investigation.
• Recognize that adopting new technologies into a criminal modus
operandi is not new.
• Recognize that “motive” answers the “Why” part of the investigation.
• Be aware that “offense behaviors” classify criminal acts into discrete
categories:
1 Power reassurance
2 Power assertive
3 Anger retaliatory
4 Sadistic
5 Opportunistic
6 Profit oriented
(GITAM School of Technology) Digital forensics July 20, 202219 / 28
Computer forensics Introduction Digital Evidence and Computer Crime History and Terminology of Computer Crime Investigation
3. Insider Threats
Individuals who have access to critical information or systems can eas-
ily choose to misuse that access—to the detriment of their organization.
These threats can come from internal employees, vendors, a contractor or
a partner—and are viewed as some of the greatest cyber security threats to
organizations.
5.State Actors
State-sponsored actors receive funding and assistance from a nation-state.
They are specifically engaged in cyber crime to further their nation’s own
interests. Typically, they steal information, including “intellectual property,
personally identifying information, and money to fund or further espionage
and exploitation causes.”
6.Corporate Espionage
This is a form of cyber attack used to gain an advantage over a competing
organization. Conducted for commercial or financial purposes, corporate es-
pionage involves: Acquiring property like processes or techniques, locations,
customer data, pricing, sales, research, bids, or strategies Theft of trade
secrets, bribery, blackmail, or surveillance.
Technology
• Behavioral Analytics
• Blockchain
• Cloud Encryption
• Context-Aware Security
• Defensive Artificial Intelligence
• Extended Detection and Response (XDR)
• Manufacturer Usage Description (MUD)
• Zero Trust