Digital Forensics

53455351 – investigator pushing digital forensics on a touch screen. cyber security technology and science concept for the electronic discovery process and investigation of an unauthorized network intrusion.

The process of preserving, identifying, extracting, and documenting computer evidence that can be utilized in a court of law is known as digital forensics. It is the science of extracting information from digital media such as a computer, smartphone, server, or network. It equips the forensic team with the most up-to-date techniques and tools for resolving complex digital cases. Digital forensics assists the forensic team in analyzing, inspecting, identifying, and preserving digital evidence stored on a variety of electronic devices. 

Some imp Historic points

  • Hans Gross (1847-1915) was the first person to utilise a scientific research as the basis for a criminal inquiry.
  • Set up a lab to provide forensics services to all field agents and other law enforcement agencies across the United States in 1932.
  • The Florida Computer Crime Act acknowledged the first computer crime in 1978.
  • Francis Galton (1982 – 1911): Conducted the first known fingerprint research.
  • The phrase “computer forensics” first appeared in academic literature in 1992.
  • It was founded in 1995 by the International Organization on Computer Evidence (IOCE).
  • The First FBI Regional Computer Forensic Laboratory was created in the year 2000.
  • The first book about digital forensics, “Best practises for Computer Forensics,” was released in 2002 by the Scientific Working Group on Digital Evidence (SWGDE).
  • Simson Garfinkel highlighted problems with digital investigations in 2010.

Goals of Digital Forensics

It assists the investigative agency in recovering, analysing, and preserving computer and associated documents in such a way that they may be presented as evidence in a court of law. It aids in determining the crime’s purpose and the identification of the principal perpetrator. Creating protocols at a suspected crime scene to guarantee that the digital evidence collected is not tampered with. Data duplication and acquisition: recovering lost files and partitions from digital media in order to extract and evaluate evidence. Allows you to rapidly discover evidence as well as evaluate the possible impact of harmful conduct on the victim. Producing a comprehensive computer forensic report detailing the investigative procedure. Following the chain of possession to preserve the evidence.

Process of Digital forensics

  • Identification

In the forensic procedure, it is the initial stage. What evidence is present, where it is held, and how it is stored are all part of the identification process (in which format).

Personal computers, mobile phones, and personal digital assistants (PDAs) are examples of electronic storage medium.

  • Preservation

This includes preventing tampering with digital evidence by stopping others from accessing the device. It also entails isolating, protecting, and archiving the device’s data.

  • Analysis

In this stage, investigators piece together data pieces and form conclusions based on the evidence uncovered. It may, however, take several iterations of investigation to substantiate a certain criminal hypothesis.

  • Documentation

A crime scene map is a record of all visible data that aids in recreating and evaluating the crime scene. It includes photographing, drawing, and mapping the crime scene. The procedure include accurate recording of the crime scene, as well as pictures, sketches, and maps. Police will be able to observe what transpired at the site and have a better understanding of what they are seeking to solve in this manner.

  • Presentation

The process of summary and explanation of findings is completed in this final phase.

It should, however, be expressed in layman’s words with abstracted terminology. The exact information should be referenced in all abstracted terminology.

Types of Forensics

There are several branches of digital forensics. Disk Forensics deals with extracting data from storage media by searching active, modified, or deleted files. Network Forensics is related to monitoring and analysis of computer network traffic to collect important information and legal evidence. Malware Forensics: This branch deals with the identification of malicious code, viruses, worms, etc. Email Forensics : Deals with recovery and analysis  of emails, including deleted emails, calendars, and contacts. The main aim of wireless forensics is to offer the tools needed to collect and analyze the data from wireless network traffic. Database Forensics is a branch of digital forensics relating to the study and examination of databases and their related metadata. Memory Forensics deals with collecting data from system memory (system registers, cache, RAM) in raw form and then carving the data. Mobile Phone Forensics mainly deals with the examination and analysis of mobile devices.

Benefits of digital forensics

Digital forensics helps companies to capture important information if their computer systems or networks are compromised. Efficiently tracks down cybercriminals from anywhere in the world. Helps to protect the organization’s money and valuable time. Allows to extract, process, and interpret the factual evidence, so it proves the cybercriminal action’s in the court. To maintain the computer system’s integrity. To present evidence in court that might result in the perpetrator’s punishment.

Drawbacks of digital forensics

 Digital evidence accepted into court must be proved that there is no tampering. If the tool used for digital forensic is not according to specified standards, then in the court of law, the evidence can be disapproved by justice. Legal practitioners must have extensive computer knowledge and need to produce authentic and convincing evidence. The expense of creating and keeping electronic documents is quite high.

Evidence that is both authentic and compelling is required.

Due to a lack of technical expertise on the part of the investigating officer, the desired outcome may not be achieved.