Facebook Pixel
Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
The Basics of Digital Forensics

The Basics of Digital Forensics

The Primer for Getting Started in Digital Forensics
by John Sammons 2011 208 pages
3.92
100+ ratings
Listen
Listen

Key Takeaways

1. Digital Forensics: Science Applied to Law

Simply put, forensics is the application of science to solve a legal problem.

Law and Science. Digital forensics is the application of computer science and investigative procedures for legal purposes. It's not just about the technology; it's about how that technology intersects with the legal system. The best scientific evidence is worthless if it's inadmissible in court.

Uses of Digital Forensics. Digital forensics is used in criminal investigations (child pornography, identity theft, homicide), civil litigation (eDiscovery), intelligence gathering (DOMEX), and administrative matters (policy violations). The BTK killer case demonstrates how metadata from a floppy disk led to the capture of a serial killer after 30 years.

Organizations and Standards. Several organizations contribute to the discipline, including the Scientific Working Group on Digital Evidence (SWGDE), the American Academy of Forensic Sciences (AAFS), the American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB), and the National Institute of Standards and Technology (NIST). These organizations help establish protocols, standards, and procedures.

2. Understanding Technical Concepts is Foundational

Intimate knowledge of the inner workings of a computer is critical for the digital forensics practitioner.

Bits and Bytes. Computers use binary code (1s and 0s) to store data. Eight bits make a byte, which represents a character. Hexadecimal is a base-16 shorthand for binary. ASCII and Unicode are encoding schemes that convert binary into human-readable text.

Storage and Memory. Data are stored magnetically (hard drives), electrically (flash memory), or optically (CDs, DVDs). Memory (RAM) is volatile, meaning data disappear when power is removed. Storage (hard drives, SSDs) is non-volatile. Flash memory is used in thumb drives and SSDs.

File Systems. File systems (FAT, NTFS, HFS+) track the location of files and free space on a drive. Understanding allocated (used) and unallocated (free) space is crucial for data recovery. Slack space contains fragments of previously deleted files.

3. Labs and Tools Ensure Reliable Forensic Results

Quality assurance is a bedrock principle that underpins every discipline in forensic science.

Forensic Labs. Forensic labs are typically run by law enforcement agencies. The FBI's Regional Computer Forensic Laboratory (RCFL) program provides services and training to law enforcement. Virtual labs are also emerging, but security and connectivity are major concerns.

Quality Assurance. Quality assurance (QA) programs ensure the accuracy and reliability of analytical results. This includes technical and administrative reviews, proficiency testing, and tool validation. The Glen Woodall case highlights the need for quality assurance.

Tools and Documentation. Digital forensic tools include hardware (write blockers, cloning devices) and software (FTK, EnCase). Documentation is critical, including submission forms, chain of custody records, examiner's notes, and final reports.

4. Evidence Collection: Preserve, Document, and Chain

How the digital evidence is handled will play a major role in getting that evidence admitted into court.

Crime Scene. Securing the scene is the first priority. This includes isolating computers and wireless devices from networks to prevent remote access or data wiping. Removable media (DVDs, thumb drives, memory cards) should be located and secured.

Documentation. Documenting the scene involves detailed notes, photographs, and video recordings. The order of volatility dictates which evidence to collect first, starting with the most volatile (RAM) and ending with the least (archival media).

Chain of Custody. A well-documented chain of custody is essential for admissibility. Evidence must be marked, sealed, and tracked from collection to court. Forensic cloning creates an exact copy of the hard drive for analysis, preserving the original evidence.

5. Windows Artifacts: Clues Left Behind

Your computer will betray you.

Deleted Data. Deleted files are not truly erased; they remain on the hard drive until overwritten. File carving can recover files from unallocated space. The hibernation file (Hiberfile.sys) stores data from RAM when a computer enters hibernation mode.

Windows Registry. The Windows Registry is a database of system and user settings. It contains valuable information, such as installed programs, recently opened files, and USB device history. The USBStor key in the registry can show when external drives were connected.

Other Artifacts. Other Windows artifacts include print spooling files, Recycle Bin contents, metadata, thumbnail caches, Most Recently Used (MRU) lists, restore points, shadow copies, prefetch files, and link files. Each of these can provide clues about user activity.

6. Antiforensics: Hiding and Destroying Data

Each betrayal begins with trust.

Encryption. Encryption converts data into an unreadable format (cipher text). It's used to protect sensitive information, but can also be used to hide criminal activity. Common encryption tools include BitLocker, FileVault, and TrueCrypt.

Password Attacks. Passwords can be cracked using brute force attacks (trying every possible combination) or dictionary attacks (using common words and phrases). The key space (length of the key) determines the difficulty of breaking encryption.

Data Destruction. Data can be hidden using steganography (embedding messages within other files). Data can be destroyed using drive-wiping utilities, but these tools can leave telltale signs of their use.

7. Legal Authority: The Foundation of Digital Forensics

Although a “forensic” science, the legal aspects of digital forensics can't be divorced from the technical.

Fourth Amendment. The Fourth Amendment protects against unreasonable searches and seizures. A search warrant is required unless an exception applies (consent, exigent circumstances, plain view). The Electronic Communications Privacy Act (ECPA) protects electronic communications.

Electronic Discovery. Electronic discovery (eDiscovery) involves identifying, preserving, collecting, and producing electronically stored information (ESI) in civil cases. The duty to preserve data begins when litigation is reasonably anticipated.

Expert Testimony. Digital forensic examiners often serve as expert witnesses. They must be qualified based on their knowledge, skill, training, or experience. The Daubert standard governs the admissibility of expert testimony.

8. Internet and Email: A Treasure Trove of Evidence

Social networks, e-mail, chat logs, and Internet history represent some of the best evidence we can find on a computer.

Internet Overview. The Internet uses TCP/IP, HTTP, and DNS to deliver web pages. A URL (Uniform Resource Locator) identifies a web address. Web pages can be static or dynamic. Peer-to-peer (P2P) networks facilitate file sharing.

Web Browsers. Web browsers (Internet Explorer, Firefox, Chrome) create artifacts such as cookies, temporary Internet files (cache), and browsing history. The INDEX.DAT file tracks browsing activity in Internet Explorer.

Email. Email uses protocols such as SMTP, POP, and IMAP. Email headers provide a record of the message's path. Email can be spoofed or remailed anonymously.

9. Network Forensics: Tracing the Attack

We can find a network almost anywhere, from small home networks to huge corporate ones.

Network Fundamentals. Networks connect computers and devices using protocols like TCP/IP. Types of networks include LANs, WANs, and intranets. Routers, bridges, and gateways connect different networks.

Network Security Tools. Firewalls protect networks from unauthorized access. Intrusion Detection Systems (IDS) detect attacks. Snort is an open-source NIDS.

Network Attacks. Common network attacks include Distributed Denial of Service (DDoS), identity spoofing, man-in-the-middle attacks, and social engineering. Incident response plans help organizations respond to breaches.

10. Mobile Device Forensics: Pocketfuls of Evidence

Small-scale mobile devices such as cell phones and GPS units are everywhere.

Cellular Networks. Cellular networks comprise cells, base stations, and mobile switching centers (MSC). Cellular networks use transmission schemes such as CDMA, GSM, and iDEN.

Mobile Device Evidence. Mobile devices store call history, text messages, email, pictures, videos, contacts, location information, and more. SIM cards store subscriber information.

Acquisition and Tools. Cell phone data can be acquired physically (bit-for-bit copy) or logically (files and folders). Cell phone forensic tools include Cellebrite UFED, AccessData MPE+, and Paraben Device Seizure.

11. Future Challenges: Cloud, SSDs, and Standards

There are two “game-changing” technologies that are upon us that will have a huge impact on not only the technical aspect of digital forensics but the legal piece as well.

Cloud Forensics. Cloud computing presents technical and legal challenges. Data are stored in complex virtual environments that can be located anywhere in the world. Forensic tools for cloud environments are lacking.

Solid State Drives (SSDs). SSDs make data recovery difficult due to their architecture and data management techniques. Traditional data recovery methods are often ineffective.

Standards and Controls. The digital forensics community needs to develop standards and controls to ensure the integrity and reliability of its work. This includes addressing legal and ethical issues.

Last updated:

Review Summary

3.92 out of 5
Average of 100+ ratings from Goodreads and Amazon.

The Basics of Digital Forensics receives generally positive reviews, with readers praising its clarity and concise overview of the field. Reviewers appreciate its focus on procedures, legal aspects, and technology domains. The book is seen as an excellent primer for beginners, offering a holistic approach to digital forensics. However, some readers note that the content may be outdated due to rapid technological advancements. Despite this, it's recommended for those new to the field, while more experienced readers might prefer more advanced material.

Your rating:

About the Author

John Sammons is the author of "The Basics of Digital Forensics." He appears to be an expert in the field of digital forensics, with a focus on providing educational content for beginners. Sammons has written a book that is widely regarded as a clear and concise introduction to the subject. His work demonstrates an understanding of the importance of covering both technical and legal aspects of digital forensics. The author's approach to explaining complex topics in an accessible manner has been well-received by readers, particularly those new to the field. Sammons' expertise is evident in his ability to present a comprehensive overview of digital forensics in a primer format.

Download PDF

To save this The Basics of Digital Forensics summary for later, download the free PDF. You can print it out, or read offline at your convenience.
Download PDF
File size: 0.23 MB     Pages: 11

Download EPUB

To read this The Basics of Digital Forensics summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 2.96 MB     Pages: 10
0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Create a free account to unlock:
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Ratings: Rate books & see your ratings
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
All summaries are free to read in 40 languages
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 10
📜 Unlimited History
Free users are limited to 10
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Feb 28,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
50,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Settings
Appearance
Black Friday Sale 🎉
$20 off Lifetime Access
$79.99 $59.99
Upgrade Now →