Skip to main content

Collecting Evidence

Updated Jan 30, 2024 ·

Principles of Evidence Collection

Forensic investigators must adhere to strict principles to preserve the integrity of evidence.

  • Actions must not alter the evidence, preventing misinterpretation.
  • Physical evidence should only be worked on when absolutely necessary, using copies or images for analysis.

Creating Evidence Images

When creating an image of a hard drive or other media, analysts must use specialized techniques.

  • Analysts connect devices to copy data while preventing any alterations.
  • Write blockers are utilized to intercept requests and protect the original data from being modified.

Write blockers are also known as forensic disk controllers. They prevent accidental modification of disks during imaging. For more information, please see Data Collection Procedures.

Ensuring Evidence Integrity

To demonstrate that evidence has not been tampered with, forensic investigators employ various methods.

  • Physical evidence is stored in sealed containers.
  • The digital equivalent involves generating hashes, which serve as unique signatures for files.

For more information, please see Preserving the Evidence.

Hashing

A hash is produced using a mathematical algorithm to create a unique representation of a file.

  • Hashes remain consistent over time if the file is unchanged.
  • Even minor alterations to a file will result in a completely different hash value.

Hash values computed at the time of evidence collection can be recomputed during analysis to confirm consistency. This allows analysts to verify the integrity of evidence.

For more information, please see Hashing

Order of Volatility

The order of volatility indicates the priority for collecting digital evidence, focusing on preserving the most transient data first.

  1. CPU Registers and Cache

    • The most volatile, quickly lost upon system shutdown.
  2. RAM (Memory)

    • Contains active programs and system state, disappears when the system is turned off.
    • This may include network-related information and system processes:
      • Routing Tables
      • ARP Cache
      • Process Tables
  3. Swap Space/Temporary File Systems

    • Includes operating system swap files, temporary directories, and other virtual memory spaces.
    • Data in these areas is less volatile than RAM but still susceptible to being overwritten.
  4. Persistent Mass Storage

    • Hard drives and SSDs.
    • More stable but can be altered or deleted.
    • Information is retained even after shutting down the device.
  5. Remote Logging and Monitoring Data

    • Not on the system being analyzed, stored on SIEM and monitoring data.
    • Important, because the data is still being continuously read and being written to.
  6. Physical Configuration and network topology

    • Useful for mapping out and collecting the information.
  7. Archival Media

    • External drives, cloud storage; less volatile, more durable.
    • Backup Media, could be stored onsite or remotely.
    • Typically the least volatile but may require additional access.

Data Collection Procedures

These collection techniques allow investigators to recover and analyze data while preserving the integrity of the original evidence.

Disk Imaging

Disk imaging is the process of creating an exact, sector-by-sector copy of a storage device, such as a hard drive or SSD. This copy, or "image," preserves the original data, allowing for forensic analysis without altering the original evidence.

  • Forensic Integrity - Ensures the original disk remains unaltered during analysis.
  • Complete Copy - Captures all data, including deleted files and system information.
  • Forensic Tools - Uses specialized software to create a bit-for-bit image.
  • Chain of Custody - Maintains documentation to ensure evidence integrity.

Tools used:

  • Capture and hash the system image:

    • FTK Imager
    • Forensic Toolkit (FTK)
    • Encase
  • Capture screenshots of the machine:

    • network traffic logs
    • videos (for CCTV)
  • Analyze disk images, recover data:

    • Autopsy
    • WinHex
  • RAM Memory dumps:

    • Memdump
    • HELIX

File Carving

File carving is a technique used to extract files from a disk image without relying on file system structures. It is often used to recover deleted or fragmented files.

  • Data Recovery - Recovers files that may have been deleted or corrupted.
  • File Type Identification - Uses known patterns or "magic numbers" to identify file types.
  • File Fragmentation - Can reassemble files that are broken into multiple fragments.
  • Forensic Tools - Requires specialized software designed for file carving.
  • Application - Useful when the file system is damaged or unavailable.

Evidence Collection Techniques

Investigators may also gather supplementary details from the target system.

  • Techniques include taking screenshots or photographs of displays.
  • Memory contents, process tables, and system configurations can be collected if the system is running.