Investigative Computer Forensics
eBook - ePub

Investigative Computer Forensics

The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

Erik Laykin

Share book
  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Investigative Computer Forensics

The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives

Erik Laykin

Book details
Book preview
Table of contents
Citations

About This Book

Investigative computer forensics is playing an increasingly important role in the resolution of challenges, disputes, and conflicts of every kind and in every corner of the world. Yet, for many, there is still great apprehension when contemplating leveraging these emerging technologies, preventing them from making the most of investigative computer forensics and its extraordinary potential to dissect everything from common crime to sophisticated corporate fraud.

Empowering you to make tough and informed decisions during an internal investigation, electronic discovery exercise, or while engaging the capabilities of a computer forensic professional, Investigative Computer Forensics explains the investigative computer forensic process in layman's terms that users of these services can easily digest. Computer forensic/e-discovery expert and cybercrime investigator Erik Laykin provides readers with a cross section of information gleaned from his broad experience, covering diverse areas of knowledge and proficiency from the basics of preserving and collecting evidence through to an examination of some of the future shaping trends that these technologies are having on society.

Investigative Computer Forensics takes you step by step through:

  • Issues that are present-day drivers behind the converging worlds of business, technology, law, and fraud
  • Computers and networks—a primer on how they work and what they are
  • Computer forensic basics, including chain of custody and evidence handling
  • Investigative issues to know about before hiring a forensic investigator
  • Managing forensics in electronic discovery
  • How cyber-firefighters defend against cybercrime and other malicious online activity
  • Emerging standards of care in the handling of electronic evidence
  • Trends and issues affecting the future of the information revolution and society as a whole

Thoroughly researched and practical, Investigative Computer Forensics helps you—whether attorney, judge, businessperson, or accountant—prepare for the forensic computer investigative process, with a plain-English look at the complex terms, issues, and risks associated with managing electronic data in investigations and discovery.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Investigative Computer Forensics an online PDF/ePUB?
Yes, you can access Investigative Computer Forensics by Erik Laykin in PDF and/or ePUB format, as well as other popular books in Betriebswirtschaft & Wirtschaftsprüfung. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Wiley
Year
2013
ISBN
9781118235225
CHAPTER 1
The Glue
The global fabric that holds together social, political, and business structures is largely dependent on—or, at the very least, highly impacted by—the movement of electronic data at the speed of light. Routed through an endless array of devices, switches, cables, fibers, satellites, and the atmosphere itself, these systems have their own inherent vulnerabilities and strengths.
But aside from the obvious impact that is so widely reported that the global networks have had on society and the world as we know it, this information revolution has taken within its clutch the mechanics of such precious and unique human qualities as trust, privacy, and truth and in very meaningful ways has either enhanced or modified these constructs or in some cases threatens to obliterate them.
The converse, however, may also be true that these same precepts that provide the glue that society thrives on may over the long haul be strengthened and enhanced by these predictable, self-healing, and potentially transparent networks—networks that may allow the population of the planet to police itself in real time.
Is it possible that the global networks are not the instrument of an evil Big Brother but are in fact the technical incarnation of an earth-coating truth serum that will disallow and prevent antisocial behavior on the part of individuals, groups, and institutions? Could it be that the greater good of humankind finally transcends the individual negatives of petty criminals, Ponzi scheme fraudsters, banal corporations, and megalomaniac two-bit dictators? All on Facebook?
Until our descendants learn the answers to these altruistic questions, we will need to be satisfied knowing that we are all doing our part to keep the glue sticky—to use a cool, recent Internet term—by ensuring that we are pursuing the adoption and sanctity of the truth, privacy, and trust within the realm of the global networks.
The role of the computer forensic investigator is front and center in this epic challenge for humanity to find the right equation, structure, and balance in its new relationship with instantaneous and ubiquitous computing power, which theoretically will eventually allow for all of humanity to interact with all of humanity in real time.
Although any one computer forensic investigation may have inconsequential impact on these larger issues, collectively the framework that the field is creating provides part of the roadmap to the future mechanics of how society will function in the actual information age.
I say the actual information age, because I am of the belief that we are still very much in the information revolution and have many challenges ahead before the global information ecosystem has matured to adulthood.
If we allow our journey to adulthood to do away with the vital interests of truth, privacy, and trust, the glue that holds it all together, then the infant will be stillborn and our world may truly find itself in an Orwellian apocalypse.
This chapter, which I call “The Glue,” deals with some of these issues in a practical sense and provides analysis from a number of points of view. These include truth, privacy, and trust as well as a discussion on the foundations of digital evidence and its historical context, an analysis of investigative objectives, and a discussion of the investigative process.
The Relevancy of Truth
The pursuit of truth requires objective observation. The fact-finder needs as much clarity as can be achieved through methodical analysis of the available data points. In some cases this is achieved through real-time observation of events that are unfolding in front of the observer's eyes, or for the benefit of the observer's ears. In other cases the observer must reconstruct the events that took place by using available evidence. This evidence can include a wide variety of things from electronic data to physical artifacts to eyewitness accounts.
The relevancy of truth is central to the human experience. This is because human relationships, from a simple relationship between two friends to the complex relationships of 100 million citizens of a country to its leadership, all seek the power of truth to strengthen the bonds of the relationship. Without the foundation of truth in a relationship, it will soon find itself on rocky ground, the results of which are found in divorce, hatred, and revolution.
Therefore, the relevancy of truth is in itself a universal truth that humans far and wide in ancient times, modern times, and the future have and will understand, value, and protect. Unfortunately, truth can often be easily obscured and as a result other human traits can come into play—lying, cheating, failing to perform. Lying through deception, for example, has as a matter of course been commonplace throughout the human experience. Whether it is for the personal benefit of a child who wants more food or of a global corporation that wants more market share, the act in itself is so pure that it is often difficult to distinguish, on the face of things, the family man from the fraud, the good corporate citizen from the predator. But because it is so vital to the structure and security of human relationships that truth prevail, we have also gone to great lengths to root out untruths and to identify falsehoods as expeditiously as possible. Countless checks and balances exist, from the reaction that you may have to a cheater's body language to the analysis that a U.S. Securities and Exchange Commission examiner may undertake when reviewing corporate filings related to complex derivatives.
The role of the investigator is as old as, if not older than, the earliest and perhaps first human relationship. This is because before a human is willing to enter into a relationship, he or she normally will investigate the other side and render a judgment. Is he a strong enough caveman to protect me and secure food? Is the architect educated enough to build the aqueduct? Is the money lender honest or is he giving me imitation silver or gold? Is the doctor competent? Is the general decisive? Will she be true to me? Can I believe my boss has my back? The list goes on forever, and for every one of these questions there is a truthful answer and quite possibly many untruthful answers of varying degrees. Why is this relevant? Because without the possibility of truth entering the equation in the human relationship trust can never be established. Without trust, human bonds cannot be formed and all relationships fail.
Think of it: Do you trust that FedEx will get the package to the sender tomorrow morning by 8 A.M.? Do you trust that the bailiff will draw his gun if the criminal defendant in the courtroom attacks the witness? Do you trust that your child's teacher will teach math and history as opposed to pornography and bestiality? Do you trust that the single malt whiskey in the bottle is in fact 18 years old? Do you trust that the truck will stop at the red light?
In each of these cases we have grown to expect these truths to exist, and as a result we have endowed the relationship with trust. When one of these relationships is violated, however, we are rocked by the consequences. The letter did not arrive on time to the client and you lost the bid. The witness was attacked and as a result refused to testify and you lost the trial. Your child has been traumatized by an errant teacher shattering his innocence. Your whiskey was a counterfeit and made you ill. The truck did not stop and you are now in the hospital fighting for your life.
Should your life be punctured by one of these terrible incidents, you or someone working on your behalf will undoubtedly be charged with establishing the facts of what happened, looking to preserve, protect, and analyze the evidence to establish the truth and to reassemble retroactively what should have been the trust that secured the relationship you had with the offending party.
Through this investigative process, culpability can be established and some measure of balance restored back into the relationship, often through such measures as apology, refund, judgment, restitution, fines, incarceration, execution, or even unconditional surrender. Ultimately the human relationship seeks balance and stability as well as a fair water level that can accommodate and sustain all.
Foundations of Digital Evidence
I have titled this section as a nod to the seminal work of the same name by George Paul as it rightfully contemplates in a deep and meaningful way the origins and provenance of digital evidence in a manner that had not been done before it. Through the ages, evidence has taken numerous forms, from the direct testimony of witnesses who have observed behavior and facts to circumstantial evidence that casts an inference on a set of assertions and finally to physical evidence, which is presented to support or refute the claim. Digital evidence is somewhat unique insofar as it is both physical evidence, and at the same time, because of its unique properties, can be a recordable and replayable record of the actual activity itself. For example, a murder weapon, such as a knife, that is used in an attack and that has been preserved as evidence is an inanimate object that can be understood to have had a role in the crime but that does not tell the story itself. After all, the knife, the blood that is on the knife, and its placement near the body can imply that this was, in fact, the knife that was used to kill an individual. However, the knife cannot give clues as to intent, methodology, timing, speed, defense culpability, or any of these other important aspects of the investigation.
On the other hand, a digital file that is found at the scene of crime—that scene being a computer—may be preserved at the time and in the fashion in which it was created by the criminal. If the crime that is being investigated is the fraudulent transfer of funds from the accounting department of the company for which the criminal works to an account that he controls, then the digital files that are captured as part of the evidence during the investigation of the crime may in fact provide the investigator with the ability to replay the actual chain of events just as the criminal saw them on his own computer screen.
For instance, the e-mail that was created by the criminal and sent to a colleague for the purpose of authentication can be shown on the screen and the path that that e-mail followed from the moment that it left the computer of the criminal and traversed the network to the computer of the individual to whom it was sent can also be captured and reviewed. The digital files and details may remain precisely as they did at the time of the actual events. Further, the individual who received the e-mail and who subsequently provided the authorization to the criminal to access a particular account can also be captured and reviewed. Continuing down the thread, the activity that occurred online as the criminal accessed the account and authorized the payment to a bogus third party can also be captured and reviewed. Finally, the electronic payment, which is made from account to account, can also be captured and reviewed in precisely the manner in which it took place at the time of the actual event.
Through this process of the analysis of digital data and its timeline, reconstruction of the crime scene and of the crime itself can take place. For this reason, digital evidence is both physical and dynamic and has properties that investigators have not had to contend with at any point in time during humanity's long run of perpetrating fraud and investigating its outcome. Whether we are speaking of clay tablets, cuneiform impressions, papyrus scrolls, or inscribed manuscripts of the Middle Ages, record keeping has essentially remained the same for millennia. As recently as just a few decades ago, most business records were still kept in written form, and at times would also be kept in duplicate or triplicate. The access to and examination of a business record and of communication between individuals during the eighteenth century more than likely rested on handwritten letters with a seal or signature of authenticity coupled with journal entries in ledgers that were kept under lock and key by the clerical manager charged with that task.
Other than this most basic physical evidence, investigators would have had to rely on the statements of individuals, which, as we know, are subject to interpretation, misinterpretation, and certainly biases. I hate to think of the grave number of individuals who have served time as a result of crimes or activities of which they were falsely accused but had little chance of disproving due to the dearth of physical evidence that could be reliably accessed to disprove the claim. However, in today's world, digital evidence is profligate and promiscuous and surrounds our every activity. It is nearly impossible to escape the intertwining vines of digital evidence that permeate our lives in every respect, and the positive aspect of this information age is the ability of both the afflicted and the wrongly accused to more effectively put forth their argument by trusting in physical evidence that can be relied on, and in many cases, can actually re-create the events that are the subject of the investigation.
Investigative Objectives
The purpose of an investigation is to gather factual information. Without gathering factual information, investigators would not have the ability to solve disputes, questions, or matters involving everything from missing persons to the recovery of stolen property to a dispute over a contract to a regulatory investigation. All of these types of investigations require fact-finding. Examples of the types of investigations that are likely to be managed by an investigative computer forensic professional would include employment investigations, trademark and patent infringement investigations, homicides, missing persons, and suicide investigations, slip-and-fall investigations, financial fraud, malpractice investigations, and undercover or internal investigations for private and public parties, to name a few.
Ultimately, regardless of the type of information one is seeking or the systems and applications that are to be queried using information technology as a tool, the goal is to establish facts and evidence. Once the facts and evidence have been firmly established by using proper process and protocol, a summary or report of those facts can be generated and provided to relevant parties. The investigative objectives in the traditional sense of investigations are no different from that of a computer forensic investigator, in terms of the pursuit of dispassionate observation of data and information, as well as related evidence. This is required to properly, reliably, and ethically encapsulate the observer's findings so that they can be provided to third parties for the purpose of disposing of a particular claim.
The Investigative Process
The investigative process, when applied to information technology, requires the same basic building blocks of traditional investigation, which include understanding the objective, compiling and preserving the available evidence, analyzing the evidence within the context of the original mandate, preserving the findings in a manner that they may be replicated and validated, developing a set of findings from the analysis of the evidence, and finally, providing those findings to third parties. The provision of the findings that the investigator may have developed could be in a variety of formats, including ad hoc conversational meetings; in person or over-the-telephone contact; formal investigative reports, as part of an analytical process that is feeding data into a third-party data analysis or document review platform; or even expert testimony before a judicial body. However, in all cases the goal of the investigator is the same—to provide honest, objective, and thorough analysis of the available evidence as it relates to the mandate provided to the investigator concerning the dispute or issue that must be assessed.
There are ethical and moral obligations to which an investigator must adhere in order to meet his or her mission, and it is vital for clear communication to take place between those parties who are managing the investigation and those parties with whom the investigator must interact so as to ensure that the investigation has met its mandate and that the investigator is provided with adequate information to form conclusions or report on his or her findings. Throughout this volume, I comment on the roles and responsibilities of investigators in the forensic space, from the perspective of interacting with managers, counsel, clients, victims, and others who are likely to come into contact with the investigative computer forensic examiner.
There are numerous treatises on the technology and mechanical processes that forensic examiners may undertake in the pursuit of fact-finding in the digital age. This volume touches on these lightly and instead focuses on the softer issues of technology investigations and how to most effectively balance the relationships between the numerous competing entities within a typical investigation. Whether the investigation is structured around the electronic discovery reference model and is part of an e-discovery exercise or whether the investigation is an internal matter operating in a clandestine form to quickly ferret out fraudulent behavior of executives, there are countless aspects of the process that should be considered and thought through when building an investigative plan, when exercising the investigative process, and when preparing findings to present to third parties.
Computer abuse is rampant and can impact companies large and small, from payroll issues, where fictitious employees are created for the purpose of defrauding the company, to inventory abuse, where falsified records can be leveraged to extract monies from vendors or companies. However, these are not all the areas of computer abuse, which can also include ac...

Table of contents