Acquisition
In the USA there is a jury and the judge is the gatekeeper of what is presented to the jury, so there is a focus on the admissibility of evidence (if it’s not admissible it will not be presented to a jury). Also in the USA, to strenghten evidence, there's the concept of chain of custody: evidence is tracked in a way to avoid gaps.
In Italy instead criminal action is mandatory. A judge will always evaluate the case (and evidence admissibility) and there isn’t a jury. So, you just present evidence to the judge for deciding if is valid or not: there is no admissibility concept like in the USA. In Italy, the power of admissibility is only limited to what has been acquired in the violation of the law (illegally gathered evidence is not admissible). Consideration: in Italy admissibility standard is way lower than in the USA.
Budapest convention of cybercrime: sets standards for how digital evidence should be collected. If it's not applied, then the evidence is collected in violation of the law. Problem: in Italy there's not penalties associated to this law, which means that it has less strong effects than it should (theoretically it can just be ignored). In fact it rarely happens for some evidence to be deemed not valid for those reasons.
Brittleness of digital evidence
Digital evidence is brittle (fragile). This means that if it gets tampered, the previous state cannot be recovered (by default), and also the fact that it has been modified cannot be determined. We can just show that digital evidence has not been modified. (ensure that it is the same as before). Some technique is needed to ensure:
Legal compliance
Ethical behaviour from all parties
Detection of errors in good faith (e.g. Garlasco thesis alibi)
Detection of natural decay
Solution: hashing
To ensure the integrity of some evidence we use hashing. In order to seal digital evidence, hashes (and digital signatures) are routinely used. If the hash of a digital object is recorded at a given step of acquisition (this means that what happens before is not known), and then constantly checked in further steps, it can ensure on the identity, authenticity and non-tampered state of the evidence from that step on. This means that taking the hash needs to be done as close as possible to the original acquisition of the evidence.
Some notes:
Hashes doesn’t tell you what has been modified if hashes are different.
To be useful, hashes must be stored somewhere else from where the evidence is stored: either sealed in writing (e.g. on a signed report, or more generally on another medium), or encrypted to form a digital signature.
Hashes lack does not invalidate anything automatically, and on the contrary their presence does not make evidence admissible magically.
HW/SW for acquisition
HW:
Removable HDD enclosures
Write blockers
External disks
USB, firewire, SATA, and e-SATA controllers, if possible
SW: Linux. It has extensive native file system support + ease of accessing drives and partitions without “touching” (mounting) them. It can be used to acquire the bitstream of an hard drive, which is a bit-by-bit clone of the original evidence media. The reason being that if we only copy the allocated content we lose (potentially) information. This may be different in special cases (e.g. RAID drives, encrypted or virtual drives…).
Note:
The bistream copy can also be called "forensic clone" or "clone copy" or "image".
Acquisition is also called "freezing" sometimes.
Basic procedure for acquisition
Basic acquisition of a powered-down system
Disconnect the media from the original system (if possible, if not possible see ahead for usage of forensic distributions).
Connect the source media to analysis station, if possible with a write blocker.
Compute the hash of the source, e.g.
dd if=/dev/sda conv=noerror,sync | sha256sum.Copy the source, e.g.
dd if=/dev/sda of=/tmp/acquisition.img conv=noerror,sync.Compute the hashes of the source and the clone
dd if=/dev/sda conv=noerror,sync | sha256sum #sha256sum /tmp/acquisition.img.Compare the three hashes.
Notes:
It could be good to compute also MD5 (even if broken) and SHA-1 hashes of the image at least, for redundancy and to be sure it can be compared. This may be useful because we may compare our result with someone else that may have used MD5 (maybe because it was done 5 years before).
We may get different hashes before and after the extraction despite our measures taken to prevent modification. It means that we have modified the source in some way (or maybe the transmission was corrupted), we can only take notes on that and repeat the procedure. In Italy, this will not change a lot at the condition that the acquisition has been performed in a non-repeatable analysis. In the USA this would be a problem.
There are no techniques to prevent this process from working, but there are techniques "anti-forensics techniques" that make this process not useful. For example, you can destroy the information inside the device overwriting the data (override with zero) or "degaussing" the disks with strong magnets (this is not useful in modern disks).
Write blocker
Piece of hardware that acts as interface towards HDD blocking writing commands. It's an additional measure to prevent accidental proof tampering. Not mandatory but useful. In the case of SDD, this may not be enough to prevent modification.
Problems with acquisition
Time: Because of HW limitation the process of dumping drive data may be slow and take several hours. Some software (e.g., dcfldd) may automate part of the procedure (e.g. compute the source hash while copying, in parallel).
Size: Dealing with today’s capacity in storage is complex, in particular for large-scale investigations. Using external media (e.g. USB drives) slows down operations. NAS or SAN systems are common in forensic shops, and may be useful to mitigate this problem.
Encryption: This is a problematic topic. Even if provided with key, performing acquisition in a repeatable way is challenging.
You can also use embedded devices that perform all presented passes by themselves in a reliable way.
Alternative operating procedures
Booting from live distribution
Sometimes we need to work directly on the machine. For example if we're dealing with systems with weird HW and controllers or physical cases, RAID devices or if we have specific investigation constraints. In this case we can live-boot the system under assessment using a Linux distribution targeted to forensic analysis. For example general purpose linux distros may use the swap of the HDD, therefore corrupting evidence.
Acquisition of a target machine powered on
We are in uncharted territories, which means that there's no standards or no appropriate way to do it.
If a machine is turned on and it needs to remain turned on (e.g. server machine in a server room), we need to keep in mind of modifying the evidence as little as possible.
Live network analysis
Generally speaking this is rare because we do not want to be seen by the attacker while we're watching them, which may result in him deleting proof of what he's doing. Also if the machine we're looking at has been compromised, also what we're seeing may be modified by a malicious user.
Last updated