SlideShare a Scribd company logo
1 of 15
M24CDE
         Computer Law



         Digital Investigation


M24CDE                           1
Nature of computer-based electronic
              evidence
• Computer-based electronic evidence is information and data
  of investigative value that is stored on or transmitted by a
  computer. As such, this evidence is latent evidence in the
  same sense that fingerprints or DNA evidence is latent.

• In its natural state, we cannot see what is contained in the
  physical object that holds our evidence. Equipment and
  software are required to make the evidence available.
  Testimony may be required to explain the examination and
  any process limitations.
Nature of computer-based electronic
              evidence
• Computer-based electronic evidence is, by its
  very nature, fragile. It can be altered,
  damaged, or destroyed by improper handling
  or improper examination. For this reason,
  special precautions should be taken to
  document, collect, preserve and examine this
  type of evidence. Failure to do so may render
  it unusable or lead to an inaccurate
  conclusion.
Devices subjected to Digital
              Investigation
• Desktop and Laptop Computers
• Personal Organisers (PDAs)
• Main unit: usually the box to which the monitor
  and keyboard are attached
• Monitor, keyboard and mouse
• Leads
• Power supply units and batteries
• Hard disks not fitted inside the computer
• Dongles
• Modems (some contain phone numbers)
Devices subjected to Digital
                Investigation
•   External drives and other external devices
•   Wireless network cards, Modems, Routers
•   Digital cameras
•   Floppy disks
•   Back up tapes
•   Jaz/Zip cartridges
•   CDs,DVDs
•   PCMCIA cards
•   Memory sticks, memory cards
•   USB/firewire connected devices
Home networks & wireless technology
• Switches, hubs, routers, firewalls (or devices which combine
  all three).
• Embedded network cards (e.g. Intel Centrino).
• Access Points.
• Printers and digital cameras.
• Bluetooth devices – PDAs, mobile phones, dongles etc.
• Hard drives both wired and wireless.
• Wireless networks
   – cannot be controlled in the same way as a traditionally cabled solution
     and are potentially accessible by anyone within radio range.
Other Digital Devices
•   Mobile telephones.      • Telephone e-mailers.
•   Pagers.                 • Internet-capable digital
•   Land line telephones.     TVs
•   Answering machines.     • Media PC
•   Facsimile machines.     • Satellite receivers
•   Dictating machines.     • HD recorders
•   Digital cameras         • Next generation games
                              consoles
Considerations
• To assist in the examination of the equipment,
  seize:
  – Manuals of computer and software.
  – Anything that may contain a password.
  – Encryption keys.
  – Security keys – required to physically open
    computer equipment and media storage boxes.
Association of Chief Police Officers (ACPO) Guidelines


• Principle 1:
   – No action taken by law enforcement agencies or their
     agents should change data held on a computer or
     storage media which may subsequently be relied upon
     in court.

• Principle 2:
   – In exceptional circumstances, where a person finds it
      necessary to access original data held on a computer
      or on storage media, that person must be competent
      to do so and be able to give evidence explaining the
      relevance and the implications of their actions.
APCO Guidelines
• Principle 3:
  – An audit trail or other record of all processes
    applied to computer based electronic evidence
    should be created and preserved. An independent
    third party should be able to examine those
    processes and achieve the same result.
• Principle 4:
  – The person in charge of the investigation (the case
    officer) has overall responsibility for ensuring that
    the law and these principles are adhered to
Computer Misuse Act 1990 (UK Wide)
• S1 Unauthorised Access To Computer Material
• S2 Unauthorised Access With Intent to Commit
  Other Offence
• S3 Unauthorised Acts with Intent to Impair
  Operation
• S3A Making, Supplying or Obtaining Article for Use
  in S1 or S3 offences
• S10 Saving For Certain Law Enforcement Powers
• S14 Search Warrants
• S17 Interpretation

 M24CDE                                            11
The Police & Criminal Evidence Act
                    1984
• S8 Search Warrant
• S19 General Power of Seizure
• S20 Extension of Powers of Seizure to
  Computerised Information
• S21 Access and Copying
• S22 Retention
• S78 Exclusion of Unfair Evidence

M24CDE                                    12
Criminal Justice & Police Act 2001
                 (England, Wales & NI.)

• S50 (re search and seizure – bulk items)
• S50 (1)
     – Where a person is lawfully on premises carrying
       out a search and it is not practicable to determine
       at the time if an item found is something that he is
       entitled to seize, or if the contents of an item are
       things that he is entitled to seize, the item can be
       taken away for this to be determined. There must
       be reasonable grounds for believing the item may
       be something for which there was authorisation
M24CDE to search.                                           13
Criminal Justice & Police Act 2001
                 (England, Wales & NI.)

• S50 (2)
  – Where a person is lawfully on premises and an
    item for which there is a power to seize is found,
    but it is contained within an item for which there
    would ordinarily be no power to seize and it is not
    practicable to separate them at the time, both
    items can be seized.
Investigation Process
•   Identification
•   Acquisition
•   Preservation
•   Search
•   Analysis
•   Reconstruction
•   Presentation

M24CDE                             15

More Related Content

What's hot

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 

What's hot (20)

Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
DATA RECOVERY TECHNIQUES
DATA RECOVERY TECHNIQUESDATA RECOVERY TECHNIQUES
DATA RECOVERY TECHNIQUES
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 

Similar to Digital investigation

Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
satyabwati
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 

Similar to Digital investigation (20)

Digital&computforensic
Digital&computforensicDigital&computforensic
Digital&computforensic
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
CS426_forensics.ppt
CS426_forensics.pptCS426_forensics.ppt
CS426_forensics.ppt
 
Ch 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.pptCh 3C Processing Crime and Incident Scenes.ppt
Ch 3C Processing Crime and Incident Scenes.ppt
 
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime scene
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Investigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationInvestigating Cooridinated Data Exfiltration
Investigating Cooridinated Data Exfiltration
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Digital investigation

  • 1. M24CDE Computer Law Digital Investigation M24CDE 1
  • 2. Nature of computer-based electronic evidence • Computer-based electronic evidence is information and data of investigative value that is stored on or transmitted by a computer. As such, this evidence is latent evidence in the same sense that fingerprints or DNA evidence is latent. • In its natural state, we cannot see what is contained in the physical object that holds our evidence. Equipment and software are required to make the evidence available. Testimony may be required to explain the examination and any process limitations.
  • 3. Nature of computer-based electronic evidence • Computer-based electronic evidence is, by its very nature, fragile. It can be altered, damaged, or destroyed by improper handling or improper examination. For this reason, special precautions should be taken to document, collect, preserve and examine this type of evidence. Failure to do so may render it unusable or lead to an inaccurate conclusion.
  • 4. Devices subjected to Digital Investigation • Desktop and Laptop Computers • Personal Organisers (PDAs) • Main unit: usually the box to which the monitor and keyboard are attached • Monitor, keyboard and mouse • Leads • Power supply units and batteries • Hard disks not fitted inside the computer • Dongles • Modems (some contain phone numbers)
  • 5. Devices subjected to Digital Investigation • External drives and other external devices • Wireless network cards, Modems, Routers • Digital cameras • Floppy disks • Back up tapes • Jaz/Zip cartridges • CDs,DVDs • PCMCIA cards • Memory sticks, memory cards • USB/firewire connected devices
  • 6. Home networks & wireless technology • Switches, hubs, routers, firewalls (or devices which combine all three). • Embedded network cards (e.g. Intel Centrino). • Access Points. • Printers and digital cameras. • Bluetooth devices – PDAs, mobile phones, dongles etc. • Hard drives both wired and wireless. • Wireless networks – cannot be controlled in the same way as a traditionally cabled solution and are potentially accessible by anyone within radio range.
  • 7. Other Digital Devices • Mobile telephones. • Telephone e-mailers. • Pagers. • Internet-capable digital • Land line telephones. TVs • Answering machines. • Media PC • Facsimile machines. • Satellite receivers • Dictating machines. • HD recorders • Digital cameras • Next generation games consoles
  • 8. Considerations • To assist in the examination of the equipment, seize: – Manuals of computer and software. – Anything that may contain a password. – Encryption keys. – Security keys – required to physically open computer equipment and media storage boxes.
  • 9. Association of Chief Police Officers (ACPO) Guidelines • Principle 1: – No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. • Principle 2: – In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
  • 10. APCO Guidelines • Principle 3: – An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. • Principle 4: – The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to
  • 11. Computer Misuse Act 1990 (UK Wide) • S1 Unauthorised Access To Computer Material • S2 Unauthorised Access With Intent to Commit Other Offence • S3 Unauthorised Acts with Intent to Impair Operation • S3A Making, Supplying or Obtaining Article for Use in S1 or S3 offences • S10 Saving For Certain Law Enforcement Powers • S14 Search Warrants • S17 Interpretation M24CDE 11
  • 12. The Police & Criminal Evidence Act 1984 • S8 Search Warrant • S19 General Power of Seizure • S20 Extension of Powers of Seizure to Computerised Information • S21 Access and Copying • S22 Retention • S78 Exclusion of Unfair Evidence M24CDE 12
  • 13. Criminal Justice & Police Act 2001 (England, Wales & NI.) • S50 (re search and seizure – bulk items) • S50 (1) – Where a person is lawfully on premises carrying out a search and it is not practicable to determine at the time if an item found is something that he is entitled to seize, or if the contents of an item are things that he is entitled to seize, the item can be taken away for this to be determined. There must be reasonable grounds for believing the item may be something for which there was authorisation M24CDE to search. 13
  • 14. Criminal Justice & Police Act 2001 (England, Wales & NI.) • S50 (2) – Where a person is lawfully on premises and an item for which there is a power to seize is found, but it is contained within an item for which there would ordinarily be no power to seize and it is not practicable to separate them at the time, both items can be seized.
  • 15. Investigation Process • Identification • Acquisition • Preservation • Search • Analysis • Reconstruction • Presentation M24CDE 15