Having been focused on Data Analytics in the previous
posts, it’s time for Computer Forensic. As
what I said earlier, Computer Forensic is mainly about story telling by
presenting the fact to facilitate the investigating works. As such, in-depth IT technical knowledge on hardware
and software as well as proper presentation skill would always be essentials.
Back to 2006 when I first jumped into this industry
as a law enforcement officer, almost all the cases are about analyzing hard
disk. However, it is no doubt that today
Computer Forensic is becoming more and more complicated and people in the
recent years are starting to call it as Digital Forensic. The fact is that types of digital devices are
becoming more and more, such as smart phone, tablet, etc. Having said that, the workflow of computer
forensic works still pretty much the same and is as below:-
1. Data Acquisition And Preservation
2. Forensic Analysis
3. Reporting
4. Testify as Expert Witnesses

However, subject to technical limitations,
sometimes we might only acquire the logical data file or might only able to
perform a drag and drop data coping, such as server’s email data acquisition or
old hard disk with serious bad-sector issues, etc. resulting that, worst come
to worst, this could only be proofed and justified by the examiner personal integrity
in some rare circumstances as I would say that it is always nothing is
impossible in terms of technologies.
Throughout the data acquisition process, one Master
and one Backup would be produced and sometimes an additional Working copy depends
on the case nature. In most circumstances,
the flow is to get the custodian’s devices, image the data and then return the
devices. With this approach, once the
devices is returned and the custodian started to use this again, the source
data is altered and the exact image will never be able to re-produce again. Therefore, a backup would be essential and all
analysis is supposed to be performed on the backup or the working copy. The
master copy will only be used for creating backup copy whenever this is the
only workable copy.
On top of the above data acquisition process, I did
experience that, due to the case sensitive concern, the original copy also required
to be seizure and only a clone copy for custodian continuous use. The main disadvantage of returning cloned
copy only is that more cost would be induced but I believed that this would be
the best and the most secure process that I ever performed.
No comments:
Post a Comment