DIGITAL EVIDENCE María del Pilar Jácome August 2012.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Data Quality Considerations
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
COEN 252 Computer Forensics
Discussion on SA-500 – AUDIT EVIDENCE
Evidence Collection & Admissibility Computer Forensics BACS 371.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Developing a Records & Information Retention & Disposition Program:
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
Internal Auditing and Outsourcing
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
Chapter 10: Authentication Guide to Computer Network Security.
HIPAA PRIVACY AND SECURITY AWARENESS.
What is FORENSICS? Why do we need Network Forensics?
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 11A.1 Audit Documentation.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Discussion Peggy Beeley, MD 2/11/14 Mitigating Medical Malpractice Risks Through Documentation.
The Rat Pack Dino Tsibouris (614)
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Massella Ducci Teri Italian approach to long-term digital preservation Policies for Digital Preservation ERPANET Training Seminar.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
E-records and the law John D. Gregory Policy Division Ministry of the Attorney General May 14, 2007.
每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.
Evidence Handling If the evidence is there the case is yours to lose.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Paperless Government and the Law John D. Gregory Ministry of the Attorney General June 5, 2009.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
DIGITAL SIGNATURE.
Digital Government Summit
Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
ARMA VI - NANAIMO 2016 David Young Records Management Archivist University of Victoria Electronic Records as Documentary Evidence CGSB‐72.34‐2015 (To supersede.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
PhD Oral Exam Presentation
Digital evidence Stephen Mason, Barrister Visiting Research Fellow
Electronic Transactions & Authentication
Guide to Computer Forensics and Investigations Fifth Edition
Digital Signature.
Red Flags Rule An Introduction County College of Morris
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

DIGITAL EVIDENCE María del Pilar Jácome August 2012

¿What is Computer Forensics or Digital Forensics? “Computer Forensics” is the process of identification, preservation, analysis and presentation of digital evidence in a way that will be legally acceptable in any judicial or administrative process”. To recover and analyze information showing that it was not manipulated. (algorithms use from HASH – MD5, SHA-1). 2

Digital Evidence Characteristics Intangible Can be duplicated in an accurate way and the copy can be examined as if it was the original It is possible to determine if it has been altered Specialized forensic procedures are required to examine the evidence with warranties It is more volatile than paper information It can be easily altered or destroyed It requires proper care 3

Why the distinction between digital and traditional evidence? Electronic document: It has the same validity as traditional evidence. Creation of Electronic documents – By people – By computers – By people and computers Electronic data storage.

Digital Evidence Storage Digital Evidence Repository Personal computers , file and proxy servers Control or access systems -Firewalls, router Personal digital assistants - Blackberry, Palm Mobile phones, music players Digital cameras Backup Tapes Hard disks Portable storage media –USB memories, CD’s, DVD’s 5 Types of Stored Documents s Financial files Office Documents Internet navigation history Chat records Address books (e.g. Outlook) Calendars (e.g. Outlook)

Digital Evidence Admissibility In addition to the basic principals of admission of evidence, digital evidence should comply with – Authenticity – Reliability – Adequacy – Attachment and respect of the law and the judicial system.

Authenticity Authenticity makes reference on how evidence is generated and storage in order to be admitted in court. Evidence is authentic when it demonstrates that the data came from the source that is supposed to be from and it has been stored without manipulation.

Presumption of authenticity: Private documents are considered authentic while they are not challenged for the opposing party. For this reason, even though digital data has security mechanisms like digital or biometric signatures, this mechanism would not need to be proven while the authenticity of the document is not challenged. Authenticity

You must determine the security level being offered to the message creator and keeper. Who should: – Certify that the data message retains its initial characteristics by proving the identity of the digital certificate used to generate the digital signature, and – Establish that the HASH (small summary of digital data content) corresponds to the digital data after it has been decrypted. Authenticity

The creators of the message are viable and plausible. This characteristic is connected with the message creator and data keeper, who should present warranties and be prepared to be audited. Reliability

It is the ability to convince, that the digital evidence provided is relevant to some specific facts. It is no only required for the exhibition of the digital data, but it is advisable at the moment of presenting the evidence, to explain what technology was used, which processes were implemented for the creation and storage of the data, and exhibit the digital certificates if available. The intent is to provide sufficient support to the electronic documents submitted to the process. Adequacy

By the same token, authenticity and reliability should reflect the adequacy of the digital evidence to be considered as legal issue in the process. Adequacy

Attachment and respect of the law It is necessary to bring out this element which establishes the need that the digital evidence has the same procedural treatment contained in the procedural code without failing to recognize that this class of evidence is contained in a special media that requires special care on its recollection, analysis and reporting to ensure authenticity, reliability and adequacy.

Attachment and respect of the law : Digital evidence administration Evidence Production Gathering Evidence Evidence Design Evidence Analysis Report and presentation of the evidence Determine evidence relevance

Evidence Design Determine the importance of electronic records. Electronic records have been identified, are available and usable. Clear identification of the author of the electronic records.

Date and hour of creation or modification of the electronic records. Possible validation of the authenticity of the electronic records. There is confidence in the electronic record production and storage of the information system; system reliability. Evidence Design

Evidence Production That the system or the information technology produce the electronic records. Indentify the author of the electronic records stored. Identify the date and hour of creation Verify that the application is working correctly while generating the records – creation or modification Verify the completion of the generated records.

Gathering Evidence Establish good practices and standards to gather digital evidence. Prepare evidence to be used now and in the future. Keep and verify the chain of custody. Respect and validate the regulations and norms related to gathering digital evidence. Develop criteria to establish how to determine the relevance of the evidence.

Evidence Analysis Following the collection of the evidence, it is necessary to establish the facts to be proven in order to define if the evidence is sufficient or if more documents are need to convince the judge.

Report and Presentation Document the procedures followed by the experts in charge. Keep a journal of the technical processes used. Fulfillment of the comprehensive processes established in relation to the chain of custody.

1.CNUDMI: This type of evidence should be submitted under documentary evidence. This circumstance makes more flexible the procedural rules. Nevertheless, given the specialty and technical nature of this type of evidence, it is need it to perform additional tests, like expert evidence or court inspection. 2.What is the ideal mechanism to gather digital evidence? Should be gather in the same environment where it is now. If it is materialized throughout printing, does the evidence lose its value. 3.In many countries, the opportunity to submit evidence is when presenting the lawsuit, when replying to the lawsuit or when the judge order it sua sponte. Report and Presentation

Today in many countries there is not abundant legislation about this matter and no specific law about how to value electronic evidence. This could be done in two ways Through an expert evidence order decreed by the judge, and As with simple evidence, known facts that allow inference of unknown facts, in case it does not comply with the minimum requirements that give legal security and certainty to the judge. Report and Presentation

Determination of Relevant Evidence Probative value : any electronic document that has an emblem of authorship, authenticity, and is the result of a proper and reliable operation of the system. Evidence rules: Establish that the appropriate procedures and rules to gather and manage evidence have been followed.

International Regulatory Framework International Organization on Computer Evidence (IOCE) European Community: Conventions against cybercrime United States Regulation: “Forensic Examination of Digital Evidence: a Guide for Law Enforcement” “Electronic Crime Scene Investigation: a Guide for First Responders” “Computer forensics” is process of the identification, preservation, analysis and presentation of digital evidences in a way that will be legally acceptable in any judicial and administrative process. Recover and analyze information showing that there was not manipulated (algorithms use from Hash-MD5, SHA-1). Actions taken to gather digital evidence should not affect the integrity of the evidence. People in charge of handling and gathering digital evidence will be trained for it. Activities directed to examine, maintain or transfer digital evidence should be documented and reserved for future analysis.

International Protocols SCENE Document in detail every procedure perform on the evidences. Insure scene Identify evidence Capture evidence Proper handing and documentation of the evidences in order to ensure the “chain of custody”. Analyze evidences following a specialized forensic methodology using tools appropriates for each case. Use forensic tools and indexing of information to analyze large amount of data. Present the Results through a detailed report of the analyzed information and the conclusions obtained. Writing reports that illustrate the facts clearly and concisely. Experience ratifying experts reports. protect the scene to avoid the modification or destruction of digital evidence. Define the protocols to be follow in case fraud investigation. Identify among the company information systems which ones could contain relevant information. Experience in investigations and information systems in order to identify the appropriate data sources. Make exact copies of the identify evidences minimizing the impact on the original evidence. Use of the fastest and most reliable tools of the market to ensure non- intrusion and minimal alteration of the original evidence. FORENSIC LAB Preserve evidence Analyze evidence Present results

CONCLUSIONS Lawyers and judges should stop fearing using digital evidence to prove facts.

The starting point should be that all “documents” submitted to a process are presume valid until they are challenge as false by the other party. This is why when gathering the evidence must be determine if digital signature certifications, expert reports or technical reports are needed or not. CONCLUSIONS

The correct use of digital evidence should follow strict practices CONCLUSIONS

All parts involved (companies, consumers, lawyers, public entities) should create policies for storing data contained on data messages with the purpose of classifying what information require heavier or lighter controls. CONCLUSIONS

Training must be done to give lawyers and judges the tools for presenting and accepting digital evidence on processes; breaking also the fear on its use; having always in consideration its different forms of presentation and its probative value. CONCLUSIONS