Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)

 < Day Day Up > 


Many types of criminal and civil proceedings can and do make use of evidence revealed by computer forensics specialists:

But there are concerns and problems with computer forensic evidence. So, let’s examine some of those problems.

Problems of Computer Forensic Evidence

Computer evidence is like any other evidence; it must be:

However, there are also special problems:

Forensic Technician

Contrary to what is often thought, in many cases it is possible to produce reliable computer-derived evidence without recourse to specialist tools. The general principles are:

Good results can be obtained by using the standard disk repair, network testing, and other utilities; however, very full records need to be kept. But for some purposes these may not be enough, for example, where it is hoped to recover previously deleted material or where a logic bomb or virus is suspected. In these circumstances, specialist tools are needed. However, special training is also required. The tools themselves don’t address all of the problems of producing evidence that will stand up in court. Thus, the key features of the forensic technician are:

Legal Tests

The actual rules vary from legislation to legislation, but one can give a broad outline of what happens in those countries with a common law tradition—the UK, USA, and the so-called old Commonwealth. The law makes distinctions between real evidence, testimonial evidence, and hearsay. Real evidence is that which comes from an inanimate object that can be examined by the court. Testimonial evidence is that which a live witness has seen and upon which he or she can be cross-examined.

The hearsay rule operates to exclude assertions made other than those made by the witness who is testifying as evidence of the truth of what is being asserted. The pure hearsay rule is extremely restrictive and has been extensively modified by various statutory provisions. Thus, there are rules about the proving of documents and business books. Bankers’ books have separate legislation. Some of the rules apply explicitly to computers, but many do not, although they can be (and have been) interpreted to cover many situations in which computers are involved.

For example, in the UK there have been situations where legal rules presumably designed to help the court may, in fact, hinder it. In practice, these issues may be circumvented. For instance, in a criminal case, evidence may be obtained by inadmissible methods. This evidence, however, then points investigators to admissible sources of evidence for the same sets of circumstances. An example of this could occur during a fraud investigation. In other words, computer search methods are often used to identify allegedly fraudulent transactions, but the evidential items eventually presented in court are paper-based invoices, contract notes, dockets, or whatever. In this manner, the prosecution can demonstrate to the jury the deception or breach of the Companies Act or other specific fraudulent act. Again, in civil litigation the parties may decide to jointly accept computer-based evidence (or not to challenge it) and instead concentrate on the more substantive elements in the dispute. A defendant may prefer to have a substantive defense rather than a technical one based on inadmissibility. Or, again, the legal team may not feel sufficiently competent to embark on a technical challenge.

In the United States, many practical problems exist around the actual seizure of computers containing evidence. Law enforcement officers must comply with the Fourth Amendment to the U.S. Constitution.

Subject Matter of Computer Forensics

The subject matter of computer forensics can, thus, not afford solely to concern itself with procedures and methods of handling computers, the hardware from which they are made up and the files they contain. The ultimate aim of forensic investigation is use in legal proceedings. At the same time, an obsession with common law and judicial rules is likely to inhibit many investigations. It might be a mistake for inquiries not to be commenced simply because of fear of possible inadmissibility. Furthermore, as we have already seen, a number of computer-investigatory methods may turn out not to be directly admissible, but may nevertheless be useful in locating noncomputer evidence that is admissible.

One may have to take a somewhat pragmatic view of the precise bounds of the subject matter, but it should still be possible to define its core activities. It might help to explore the way in which forensic science, in general, has developed and then see what expectations one might reasonably have of computer forensics.

Although forensic science had been established long before then and indeed forms a central feature of many of Conan Doyle’s Sherlock Holmes stories published from 1892 onwards; up until the 1970s, each forensic scientist tended to develop his or her own methods and present them ad hoc to juries. Obviously, reliance was placed on descriptions of methods used by others, but for courts, the tests of whether to believe the forensic evidence were the manner of presentation—the supposed eminence of the forensic scientist and the skill of the opposition lawyer (and/or rival expert) who might be called. During the 1970s, a more formal checklist-based approach was introduced. This was partly to bring about standardization as between different laboratories and partly in response to the criticism (in the UK) that arose over such controversial cases as the Birmingham Six. In the UK Home Office Forensic Service, these checklists would be devised by senior staff. Obviously, such checklists are revised in the light of experience—the publication of new specialist research or adverse experience during a trial. An increasing feature of modern practice is quality control, which involves work being checked by an otherwise uninvolved coworker before being offered to external scrutiny. In any event, the broad tests for evidence include:

Any approach to computer forensics would, thus, need to include the elements of:

Divergences from Conventional Forensic Investigation

There will be divergences from the expectations of more traditional areas of forensic investigation. The main reason is the rate of change of computer technology. The devisor of a test for the presence of a prohibited drug, an explosive, fabric fibers, bodily tissues, and the like, can expect that over a period of time, the test may be improved or shown to be defective. But, the actual need for the test and most of its essential detail will probably not change. But, in computers, newness and obsolesce is the norm.

For example, a key feature of computer forensics is the examination of data media: New forms and techniques of methods of data storage occur at intervals of less than 5 years (the floppy disk of 10 years ago was in 5.25 in format and held 360k). The current equivalent is 3.5 inches and holds 1.44 MB; and much higher densities are expected soon. A typical hard-disk size on a PC of the same date was 20–30 MB, was in 5.25 inch form and used modified frequency modulation (MFM) controller technology. Today most PCs have hard-disks in excess of 350 MB in 3.5 inch or even 2.5 inch form using integrated development environment (IDE) or run length limited (RLL) technology. On minis and mainframes, data may be held on Redundant Array of Independent (or Inexpensive) Disks (RAID), where individual files may be split and spread over 8 or more separate disk surfaces. Similar changes have taken place in tape technology and the use of erasable programmable read-only memory (EPROMs).

Computer architectures have shown profound change in the same short period. PCs have become much more powerful, the large central mainframe is now a rarity and large companies are now served by a multiplicity of smaller computers that all interact via a complex network.

Computer peripherals keep changing as well. Modems and network routers have become intelligent, and digitizing scanners are fairly common devices. They can be subverted, for example, for forgery.

Wide-area telecoms methods are being used more and more. There are opportunities for both high-tech criminals and forensic investigators. The protocols they use also keep changing.

The foregoing simply lists technological changes. Similar changes that have taken place in computer applications; these, in turn, have affected the type of information one might expect to find held on a computer. For example, over the same 10 years, the following technological changes have taken place:

As a result, computer forensic methods may not have the time in which to establish themselves, nor the longevity, that more traditional chemistry and physics-based forensics enjoys. Nevertheless, the usual way in which specific forensic methods become accepted is via publication in a specialist academic journal. For example, a forensic scientist seeking to justify a methodology in court can do so by stating that it is based on a specific published method, which had not up to the point of the hearing been criticized.

Note 

The rule of best practice refers to the use of best practice available and known at the time of the giving of evidence.

[vi]Peter Sommer, “Computer Forensics: An Introduction,” Virtual City Associates, PO Box 6447, London N4 4RX, United Kingdom, 2001. Academic URL: http//csrc.lse.ac.uk.

[vii]Ibid.

[viii]Ibid.

[ix]Ibid.

[x]Ibid.

[xi]Ibid.

[xii]Ibid.


 < Day Day Up > 

Категории