What is the process of copying data th and task of collecting digital evidence from electronic media?

Chain of Custody refers to the logical sequence that records the sequence of custody, control, transfer, analysis and disposition of physical or electronic evidence in legal cases. Each step in the chain is essential as if broke, the evidence may be rendered inadmissible. Thus we can say that preserving the chain of custody is about following the correct and consistent procedure and hence ensuring the quality of evidence.

In this article, we will be discussing-

  1. What Chain of Custody entails in Digital Forensics.
  2. Importance of maintaining Chain of Custody.
  3. Chain of Custody Process.
  4. The Chain of Custody Form.
  5. Procedure to establish the Chain of Custody
  6. How Chain of Custody can be assured?

Let’s get started with each section in detail.

If you are in the field of Cyber Security, you will be at one point in your career will be involved in Digital Forensics. One of the concepts that is most essential in Digital Forensics is the Chain of Custody.
The chain of custody in digital cyber forensics is also known as the paper trail or forensic link, or chronological documentation of the evidence.

  • Chain of custody indicates the collection, sequence of control, transfer and analysis.
  • It also documents details of each person who handled the evidence, date and time it was collected or transferred, and the purpose of the transfer.
  • It demonstrates trust to the courts and to the client that the evidence has not tampered.

Digital evidence is acquired from the myriad of devices like a vast number of IoT devices, audio evidence, video recordings, images, and other data stored on hard drives, flash drives, and other physical media.

Importance of maintaining Chain of Custody?

Importance to Examiner:

  • To preserve the integrity of the evidence.
  • To prevent the evidence from contamination, which can alter the state of the evidence.
  • In case you obtained metadata for a piece of evidence but unable to extract any meaningful information from the metadata. In such a case, the chain of custody helps to show where possible evidence might lie, where it came from, who created it, and the type of equipment used. This will help you to generate an exemplar and compare it to the evidence to confirm the evidence properties.

Importance to the Court: If not preserved, the evidence submitted in the court might be challenged and ruled inadmissible.

Chain of Custody Process

In order to preserve digital evidence, the chain of custody should span from the first step of data collection to examination, analysis, reporting, and the time of presentation to the Courts. This is very important to avoid the possibility of any suggestion that the evidence has been compromised in any way.

What is the process of copying data th and task of collecting digital evidence from electronic media?

Let’s discuss each stage of the chain of custody in detail:

  1. Data Collection: This is where chain of custody process is initiated. It involves identification, labeling, recording, and the acquisition of data from all the possible relevant sources that preserve the integrity of the data and evidence collected.
  2. Examination: During this process, the chain of custody information is documented outlining the forensic process undertaken. It is important to capture screenshots throughout the process to show the tasks that are completed and the evidence uncovered.
  3. Analysis: This stage is the result of the examination stage. In the Analysis stage, legally justifiable methods and techniques are used to derive useful information to address questions posed in the particular case.
  4. Reporting: This is the documentation phase of the Examination and Analysis stage. Reporting includes the following:
    • Statement regarding Chain of Custody.
    • Explanation of the various tools used.
    • A description of the analysis of various data sources.
    • Issues identified.
    • Vulnerabilities identified.
    • Recommendation for additional forensics measures that can be taken.

The Chain of Custody Form

In order to prove a chain of custody, you’ll need a form that lists out the details of how the evidence was handled every step of the way. The form should answer the following questions:

  • What is the evidence?: For example- digital information includes the filename, md5 hash, and Hardware information includes serial number, asset ID, hostname, photos, description.
  • How did you get it?: For example- Bagged, tagged or pulled from the desktop.
  • When it was collected?: Date, Time
  • Who has handle it?
  • Why did that person handled it?
  • Where was it stored?: This includes the information about the physical location in which proof is stored or information of the storage used to store the forensic image.
  • How you transported it?: For example- in a sealed static-free bag, or in a secure storage container.
  • How it was tracked?
  • How it was stored?: For example- in a secure storage container.
  • Who has access to the evidence?: This involves developing a check-in/ check-out process.

The CoC form must be kept up-to-date. This means every time the best evidence is handled off, the chain of custody form needs to be updated.

Procedure to establish the Chain of Custody

In order to assure the authenticity of the chain of custody, a series of steps must be followed. It is important to note that the more information Forensic expert obtains concerning the evidence, the more authentic is the created chain of custody. You should ensure that the following procedure is followed according to the chain of custody for electronic devices:

  • Save the original material
  • Take photos of the physical evidence
  • Take screenshots of the digital evidence.
  • Document date, time, and any other information on the receipt of the evidence.
  • Inject a bit-for-bit clone of digital evidence content into forensic computers.
  • Perform a hash test analysis to authenticate the working clone.

How can the Chain of Custody be assured?

A couple of considerations are involved when dealing with digital evidence and Chain of Custody. We shall discuss the most common and globally accepted and practiced best practices.

  1. Never ever work with the Original Evidence: The biggest consideration that needs to be taken care of while dealing with digital evidence is that the forensic expert has to make a full copy of the evidence for forensic analysis. This cannot be overlooked as when errors are made to working copies or comparisons need to be done, then, in that case, we need an original copy.
  2. Ensuring storage media is sterilized: It is important to ensure that the examiner’s storage device is forensically clean when acquiring the evidence. Suppose if the examiner’s storage media is infected with malware, in that case, malware can escape into the machine being examined and all of the evidence will eventually get compromised.
  3. Document any extra scope: During the process of examination, it is important to document all such information that is beyond the scope of current legal authority and later brought to the attention of the case agent. A comprehensive report must contain following sections:
    • Identity of the reporting agency.
    • Case identifier.
    • Case investigator.
    • Identity of the submitter.
    • Date of receipt.
    • Date of report.
    • Descriptive list of items submitted for examination: This includes the serial number, make, and model.
    • Identity and signature of the examiner
    • Brief description of steps taken during the examination: For example- string searches, graphics image searches, and recovering erased files.
    • Results.
  4. Consider the safety of the personnel at the scene: It is very important to ensure that the crime scene is fully secure before and during the search. In some cases, the examiner may only be able to do the following while onsite:
    • Identify the number and type of computers.
    • Interview the system administrator and users.
    • Identify and document the types and volume of media: This includes removable media also.
    • Determine if a network is present.
    • Document the information about the location from which the media was removed.
    • Identify offsite storage areas and/or remote computing locations.
    • Identify proprietary software.
    • Determine the operating system in question.

The Digital evidence and Digital Chain of Custody are the backbones of any action taken by digital forensic specialists. In this article, we have examined the seriousness of the digital evidence and what it entails and how slight tampering with the digital evidence can change the course of the forensic expert’s investigation.

References: – https://en.wikipedia.org/wiki/Chain_of_custody

The term “mobile devices” encompasses a wide array of gadgets ranging from mobile phones, smartphones, tablets, and GPS units to wearables and PDAs. What they all have in common is the fact that they can contain a lot of user information.

Mobile devices are right in the middle of three booming technological trends: Internet of Things, Cloud Computing, and Big Data. The proliferation of mobile technology is perhaps the main reason, or at least one of the main reasons, for these trends to occur in the first place. In 2015, 377.9 million wireless subscriber connections of smartphones, tablets, and feature phones occurred in the United States.

Nowadays, mobile device use is as pervasive as it is helpful, especially in the context of digital forensics, because these small-sized machines amass huge quantities of data on a daily basis, which can be extracted to facilitate the investigation. Being something like a digital extension of ourselves, these machines allow digital forensic investigators to glean a lot of information.

Information that resides on mobile devices (a non-exhaustive list):

  • Incoming, outgoing, missed call history
  • Phonebook or contact lists
  • SMS text, application based, and multimedia messaging content
  • Pictures, videos, and audio files and sometimes voicemail messages
  • Internet browsing history, content, cookies, search history, analytics information
  • To-do lists, notes, calendar entries, ringtones
  • Documents, spreadsheets, presentation files and other user-created data
  • Passwords, passcodes, swipe codes, user account credentials
  • Historical geolocation data, cell phone tower related location data, Wi-Fi connection information
  • User dictionary content
  • Data from various installed apps
  • System files, usage logs, error messages
  • Deleted data from all of the above

Source:

One good display of the real-life effectiveness of mobile forensics is the mobile device call logs, and GPS data that facilitated solving the 2010 attempted bombing case in Times Square, NY.

I. What is the mobile forensics process?

Crimes do not happen in isolation from technological tendencies; therefore, mobile device forensics has become a significant part of digital forensics.

Most people do not realize how complicated the mobile forensics process can be in reality. As the mobile devices increasingly continue to gravitate between professional and personal use, the streams of data pouring into them will continue to grow exponentially as well. Did you know that 33,500 reams of paper are the equivalent of 64 gigabytes if printed? Storage capacity of 64 GB is common for today’s smartphones.

The mobile forensics process aims to recover digital evidence or relevant data from a mobile device in a way that will preserve the evidence in a forensically sound condition. To achieve that, the mobile forensic process needs to set out precise rules that will seize, isolate, transport, store for analysis and proof digital evidence safely originating from mobile devices.

Usually, the mobile forensics process is similar to the ones in other branches of digital forensics. Nevertheless, one should know that the mobile forensics process has its own particularities that need to be considered. Following correct methodology and guidelines is a vital precondition for the examination of mobile devices to yield good results.

Among the figures most likely to be entrusted with the performance of the following tasks are Forensic Examiners, Incident Responders, and Corporate Investigators. During the inquiry into a given crime involving mobile technology, the individuals in charge of the mobile forensic process need to acquire every piece of information that may help them later – for instance, device’s passwords, pattern locks or PIN codes.

II. What are the steps in the mobile forensics process?

2.1 Seizure

Mobile phone evidence box

What is the process of copying data th and task of collecting digital evidence from electronic media?

Credit: mobile phone evidence box by jon crel / (CC BY-ND 2.0)

Digital forensics operates on the principle that evidence should always be adequately preserved, processed, and admissible in a court of law. Some legal considerations go hand in hand with the confiscation of mobile devices.

There are two major risks concerning this phase of the mobile forensic process: Lock activation (by user/suspect/inadvertent third party) and Network / Cellular connection.

Network isolation is always advisable, and it could be achieved either through 1) Airplane Mode + Disabling Wi-Fi and Hotspots, or 2) Cloning the device SIM card.

Airplane mode

What is the process of copying data th and task of collecting digital evidence from electronic media?

Mobile devices are often seized switched on; and since the purpose of their confiscation is to preserve evidence, the best way to transport them is to attempt to keep them turned on to avoid a shutdown, which would inevitably alter files.

Phone jammer

What is the process of copying data th and task of collecting digital evidence from electronic media?
Credit: Got myself a Cell Phone Jammer by Baishampayan Ghose / (CC BY-ND 2.0)

A Faraday box/bag and external power supply are common types of equipment for conducting mobile forensics. While the former is a container specifically designed to isolate mobile devices from network communications and, at the same time, help with the safe transportation of evidence to the laboratory, the latter, is a power source embedded inside the Faraday box/bag. Before putting the phone in the Faraday bag, disconnect it from the network, disable all network connections (Wi-Fi, GPS, Hotspots, etc.), and activate the flight mode to protect the integrity of the evidence.

Faraday bag

What is the process of copying data th and task of collecting digital evidence from electronic media?

Last but not least, investigators should beware of mobile devices being connected to unknown incendiary devices, as well as any other booby trap set up to cause bodily harm or death to anyone at the crime scene.

2.2 Acquisition

/Identification + extraction/

The goal of this phase is to retrieve data from the mobile device. A locked screen can be unlocked with the right PIN, password, pattern, or biometrics (Note that biometric approaches while convenient are not always protected by the fifth amendment of the U.S. Constitution). According to a ruling by the Virginia Circuit Court, passcodes are protected, fingerprints not. Also, similar lock measures may exist on apps, images, SMSs, or messengers. Encryption, on the other hand, provides security on a software and/or hardware level that is often impossible to circumvent.

It is hard to be in control of data on mobile devices because the data is mobile as well. Once communications or files are sent from a smartphone, control is lost. Although there are different devices having the capability to store considerable amounts of data, the data in itself may physically be in another location. To give an example, data synchronization among devices and applications can take place directly but also via the cloud. Services such as Apple’s iCloud and Microsoft’s One Drive are prevalent among mobile device users, which leave open the possibility for data acquisition from there. For that reason, investigators should be attentive to any indications that data may transcend the mobile device as a physical object, because such an occurrence may affect the collection and even preservation process.

Since data is constantly being synchronized, hardware and software may be able to bridge the data gap. Consider Uber – it has both an app and a fully functional website. All the information that can be accessed through the Uber app on a phone may be pulled off the Uber website instead, or even the Uber software program installed on a computer.

Regardless of the type of the device, identifying the location of the data can be further impeded due to the fragmentation of operating systems and item specifications. The open-source Android operating system alone comes in several different versions, and even Apple’s iOS may vary from version to version.

Another challenge that forensic experts need to overcome is the abundant and ever-changing landscape of mobile apps. Create a full list of all installed apps. Some apps archive and backup data.

After one identifies the data sources, the next step is to collect the information properly. There are certain unique challenges concerning gathering information in the context of mobile technology. Many mobile devices cannot be collected by creating an image and instead they may have to undergo a process called acquisition of data. Thera are various protocols for collecting data from mobile devices as certain design specifications may only allow one type of acquisition.

The forensic examiner should make a use of SIM Card imagining – a procedure that recreates a replica image of the SIM Card content. As with other replicas, the original evidence will remain intact while the replica image is being used for analysis. All image files should be hashed to ensure data remains accurate and unchanged.

2.3 Examination and analysis

Flasher box forensics. Using a UFS box to access mobile phone

As the first step of every digital investigation involving a mobile device(s), the forensic expert needs to identify:

  • Type of the mobile device(s) – e.g., GPS, smartphone, tablet, etc.
  • Type of network – GSM, CDMA, and TDMA
  • Carrier
  • Service provider (Reverse Lookup)

The examiner may need to use numerous forensic tools to acquire and analyze data residing in the machine. Due to the sheer diversity of mobile devices, there is no one-size-fits-all solution regarding mobile forensic tools. Consequently, it is advisable to use more than one tool for examination. AccessData, Sleuthkit, and EnCase are some popular forensic software products that have analytic capabilities. The most appropriate tool(s) is being chosen depending on the type and model of mobile device.

Timeline and link analysis available in many mobile forensic tools could tie each of the most significant events, from a forensic analyst’s point of view.

Intel Computer Stick imaged and analyzed

All of the information, evidence, and other findings extracted, analyzed, and documented throughout the investigation should be presented to any other forensic examiner or a court in a clear, concise, and complete manner.

The New digital reality of mobile forensics            

On May 17, 2015, a biker gang shootout erupted at the Twin Peaks Restaurant near Waco, Texas, killing nine and injuring dozens. More than a hundred mobile phones were recovered from the incident, setting the wheels in motion for one of the state’s largest and most challenging investigations to date.

The events that unfolded at the Twin Peaks restaurant thrust McLennan County law enforcement into a new urgent reality.

Within days of the decision to deploy, [the Cellebrite’s New UFED Analytics Platform] allowed both investigators and prosecutors to import and decode all extracted mobile digital forensics data from one centralized location for fast and efficient analysis. Call records, text messages, photos, videos and social media posts could be filtered by keywords and tagged for other members of the investigative team to view instantly.

“… [the solution] allowed us to go back and more quickly comb through the data to find the bigger picture details we needed to confirm the motives, plans and goals of these motorcycle organizations [,]” said the McLennan County prosecutor.

Source: Removing the Burden of Finding Digital “Proof”

Quick Question: What procedure could the McLennan County law enforcement have used immediately at the crime scene to reduce the large backlogs of digital forensics casework at the outset (provided that they had the experts to carry out that procedure)?

Find the answer below the Reference List.

III. What other models are available?

What is the process of copying data th and task of collecting digital evidence from electronic media?

What is the process of copying data th and task of collecting digital evidence from electronic media?

IV. Non-invasive vs. invasive forensics

No matter what your actual mobile forensic method is, it is imperative to create a policy or plan for its execution and follow all its steps meticulously and in the proper sequence. Not following the protocol may entail grave consequences. One should start with non-invasive forensic techniques first as they tend to endanger a device’s integrity to a lesser degree. Be careful with built-in security features – “[f]or example, collecting a physical image before a logical image on certain devices can completely wipe a phone of all data, as can attempting to access a locked device and making too many password attempts.” /Source: Mobile Device Forensics by Scott Polus/

From the legal point of view, the level of the interaction between the user and the device is critical.

Mobile forensics – tool classification pyramid

What is the process of copying data th and task of collecting digital evidence from electronic media?

4.1 Non-invasive methods

Non-invasive methods can deal with other tasks, such as unlocking the SIM lock or/and the operator lock, the operating system update, IMEI number modification, etc. These techniques are virtually inapplicable in cases where the device has sustained severe physical damage. Types of non-invasive mobile forensic methods:

The forensic examiner merely browses through the data using the mobile device’s touchscreen or keypad. Information of interest discovered on the phone is photographically documented. This process of manual extraction is simple and applicable to almost every phone. While there are some tools designed to make this process easier, it is not possible, however, to restore deleted data this way.

This approach involves instituting a connection between the mobile device and the forensic workstation using a USB cable, Bluetooth, Infrared or RJ-45 cable. Following the connecting part, the computer sends command requests to the device, and the device sends back data from its memory. The majority of forensic tools support logical extraction, and the process itself requires short-term training. On the downside, however, this technique may add data to the mobile device and may alter the integrity of the evidence. Also, deleted data is rarely accessible.

JTAG is a non-invasive form of physical acquisition that could extract data from a mobile device even when data was difficult to access through software avenues because the device is damaged, locked or encrypted. The device, however, must be at least partially functional (minor damages would not hinder this method).

The process involves connecting to the Test Access Ports (TAPs) on a device and instructing the processor to transfer raw data stored on connected memory chips. This is a standard feature that one could come across in many mobile phone models, which provides mobile phone manufactures a low-level interface outside the operating system. Digital forensic investigators take an interest in JTAG, as it can, in theory, allow direct access to the mobile device’s memory without jeopardizing it. Despite that fact, it is a labor-intensive, time-consuming procedure, and it requires advance knowledge (not only of JTAG for the model of the phone under investigation but also of how to arrange anew the resulting binary composed of the phone’s memory structures).

Similar to JTAG, Hex dump is another method for physical extraction of raw information stored in flash memory. It is performed by connecting the forensic workstation to the device and then tunneling an unsigned code or a bootloader into the device, each of them will carry instructions to dump memory from the phone to the computer. Resulting image is fairly technical—in binary format—and it requires a person having the technical education to analyze it. Furthermore, the examiner comes into possession of an abundant amount of data, since deleted data can be recovered, and, on top of that, the entire process is inexpensive.

4.2 Invasive methods

Typically, they are longer and more complex. In cases where the device is entirely non-functional due to some severe damage, it is very likely the only way to retrieve data from the device might be to manually remove and image the flash memory chips of the device. Even if the device or item is in good condition, circumstances may require the forensic expert to acquire the chip’s contents physically.

A process that refers to obtaining data straight from the mobile device’s memory chip. According to the preparations pertinent to this level, the chip is detached from the device and a chip reader or a second phone is used to extract data stored on the device under investigation. It should be noted that this method is technically challenging because of the wide variety of chip types existing on the mobile market. Also, the chip-off process is expensive, training is required, and the examiner should procure specific hardware to conduct de-soldering and heating of the memory chip. Bits and bytes of raw information that is retrieved from the memory are yet to be parsed, decoded, and interpreted. Even the smallest mistake may lead to damages to the memory chip, which, in effect, would render the data irrevocably lost. Consequently, experts advise having recourse to chip-off when: a) other methods of extraction are already attempted, b) it is important to preserve the current state of device’s memory, c) the memory chip is the only element in a mobile device that is not broken.

The whole process consists of five stages:

  1. Detect the memory chip typology of the device
  2. Physical extraction of the chip (for example, by unwelding it)
  3. Interfacing of the chip using reading/programming software
  4. Reading and transferring data from the chip to a PC
  5. Interpretation of the acquired data (using reverse engineering)

The last two phases coincide with those of the non-invasive methods. However, the phases of physical extraction and interfacing are critical to the outcome of the invasive analysis.

This method refers to manually taking an all-around view through the lenses of an electron microscope and analyzing data seen on the memory chip, more specifically the physical gates on the chip. In a nutshell, micro read is a method that demands utmost level of expertise, it is costly and time-consuming, and is reserved for serious national security crises.

Common Mobile Forensics Tools And Techniques

Mobile Forensic Process: Steps and Types

Computer Forensics Jobs Outlook: Become An Expert In The Field

The Value of Mobile Device (cell phone) Forensic Examination During an Investigation

Introduction to Mobile Forensics

A Review on Mobile Device’s Digital Forensic Process Models.

Computer forensics follows the bread crumbs left by perpetrators.

Mobile Phone Forensics

Chip-Off Forensics Services

JTAG Forensics Services

Mobile Forensics

 Introduction to Mobile Forensics.

Mobile Forensics – How do they do it – Series Part one

Mobile Forensics – How do they do it – Series Part two

Mobile Device Forensics

Mastering Mobile Forensics.

Digital Forensic Computers Forensic Forensic Models Information Technology Essay.

Wikipedia Mobile device forensics.

Mobile Forensics

Guidelines on Mobile Device Forensics,