guidelines on digital forensic.pdf

46
Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 1 STANDARDS FOR DIGITAL AND COMPUTER FORENSICS IN NIGERIA DRAFT PREPARED BY: FIRST DIGITAL & TECHNO-LAW FORENSICS CO. LTD. FOR NATIONAL TECHNICAL COMMITTEE (NTC) MEETING ON STANDARDS FOR DIGITAL AND COMPUTER FORENSICS MARCH 2014

Upload: maren-david-dangut

Post on 03-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 1

STANDARDS FOR DIGITAL AND COMPUTER FORENSICS IN NIGERIA

DRAFT

PREPARED BY:

FIRST DIGITAL & TECHNO-LAW FORENSICS CO. LTD.

FOR

NATIONAL TECHNICAL COMMITTEE (NTC) MEETING ON STANDARDS FOR DIGITAL AND COMPUTER FORENSICS

MARCH 2014

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 2

TABLE OF CONTENTS 1. Introduction …………………………………………………….. 3 1.1 Background …………………………………………………….. 3 1.2 Objectives …………………………………………………….. 5 1.3 Methodology ……………………………………………………… 5 1.4 Scope of Assignment …………………………………………………… 5 2. Digital and Computer Forensic Investigation…..………………………… 7 3. Data Recovery ……………………………………………… ……………….. 16 4. Establishing a Digital and Computer Forensics Laboratory …………. 20 4.1 Needs Statement ……………………………………………………… 20 4.2 Scope of Work ……………………………………………………… 20 4.3 Design of a Laboratory (New Building) ……………………………… 20 4.4 Starting a Laboratory in an Existing Building ………………………… 29 4.5 Suggested Digital and Mobile Forensics Equipment, Software, Tools and Supplies …………………………………………………... 30 5. Training and Professional Qualifications of Digital and Computer Forensics Examiners ………………………………………..………… 34 5.1 Training …………………………………………………………… 34 5.2 Profile/Qualifications of a Digital and Computer Forensics Examiner … 34 5.3 Profile/Qualifications of Digital and Computer Forensics Consultants for the Implementation of Laboratory Implementation … 35 5.4 Skill Sets Required by Digital and Computer Forensics Examiner ……. 37 5.5 Job Description: Computer Forensics Examiner/Investigator ……….. 39 5.6 Computer Forensics Examiner/Investigator Salary ……………………. 39 APPENDICES A Forensics Portals ……………………………….. 40 B Glossary of Terms ………………………………. 43 FIGURES 2.1 Sample of a Single-evidence Form ………………………………….. 12 2.2 Sample of a Multi-evidence Form ………………………………….. 13 SELECTED REFERECES ………………………………………………………….46

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 3

1. INTRODUCTION 1.1 BACKGROUND Today, virtually every business and personal document is prepared on a computer and mobile, hand-held devices. E-mail records and pages visited on the Internet yield even more critical information about our daily lives. More importantly, the information stored on a computer can make or break a business or a person or a group of people or a court case. Computer and digital forensics is the science of retrieving and chronicling evidence located on a computer's hard drives and other sources of Electronically Stored Information (ESI) such as floppies, CDs and DVDs, external drives, thumb drives and voice mail servers, so that it can be presented as evidence in a court of law. It is the use of specialized techniques for recovery, authentication and analysis of electronic data when a case involves issues relating to reconstruction of computer usage, examination of residual data, and authentication of data by technical analysis or explanation of technical features of data and computer usage. Computer and digital forensics is useful for the detection and investigation of crime committed on computers, computer networks, the internet and other digital devices with the intent of giving digital evidence in law courts and tribunals. It is also the professional extraction and handling of potential electronic evidence from any digital device or digital storage media to assist investigators, prosecutors, and the trier of fact (Judges, magistrates and members of tribunals) in a criminal justice system in arriving at the right judgment in litigation. The practice of computer and digital forensics includes the use of formal, accepted techniques for collecting, analyzing, and presenting suspect data in court, concentrating on rules of evidence, the legal processes, the integrity and perpetuity of evidence, reporting of facts, and the preparation and presentation of expert testimony. It requires the use of specialized techniques for recovery, authentication, and analysis of computer data, typically of data which may have been deleted or destroyed. Similar to all forms of forensic science, computer and digital forensics comprises of the application of the law to computer technology. Computer and digital forensics deals with the preservation, identification, extraction, and documentation of computer evidence. Like many other forensic sciences, computer forensics involves the use of sophisticated technological tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Computer forensics requires specialized expertise that goes beyond normal data collection and preservation techniques available to end-users or system support personnel. The applications of computer forensics require specialized training and techniques and state of the art forensics tools and software to evaluate the potential usefulness of computer data, to retrieve and interpret "hidden" data from computer media, and to provide chain of custody and data accuracy with court-accepted techniques.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 4

Law-enforcement agencies worldwide have successfully used computer forensics experts to investigate crimes such as fraud, murder, terrorism, hacking, cyber-warfare, money laundering and other cases for many years. But the advent of PCs (personal computers) used by businesses and individuals in recent years has dramatically increased the volume of criminal acts committed with the use of computers. Hence, digital and computer forensics can be used to investigate the following crimes amongst others: Espionage, Terrorism and Treason; attacks against National Critical Infrastructure; Cyber Terrorism, Cyber Warfare, Identity Theft, Hacking, Financial Fraud e.g. e-Payment fraud, ATM fraud, etc.; Human resource/Payroll Fraud; Fraudulent Websites and mails; Blackmails; Theft, Narcotics, Homicide, Forgery, Electoral Fraud; Kidnapping; Threats and malicious calls; Extortion; Recovering evidence after formatting hard drive or after evidence deletion; Corporate or Governmental internal investigation; Law-enforcement investigation; Computer Security violations; Child Pornography; Corporate or Governmental Policy Violation; Perjury; etc. Digital and Computer Forensics can also be used proactively as a preventive tool against cyber-attacks. Forensic, Digital or electronic evidence, therefore, is any data stored or transmitted using a computer or similar electronic devices (including phones, hand-held devices) that support or refute a theory of how an offence occurred or that address critical elements of the offence such as intent and alibi. It is estimated that over 85 percent of all criminal cases today have one form of digital, electronic or forensic evidence or the other. In July, 2011, Nigeria, signed into law her Evidence Act, 2011 which recognizes electronic, digital and computer-generated evidence. No doubt that this singular act has the capability to transform our legal and judicial systems. As electronic evidence grows in both volume and importance in criminal and civil courts, judges and magistrates need to fairly and justly evaluate the merits of the offered evidence. To do so, prosecutors, investigators, judges and magistrates need a general understanding of the underlying technologies and applications from which forensic evidence is derived and the appropriate standards that must be met. Even though Nigeria now has a new Evidence Act, it should be noted that digital and computer forensics is a new field and profession in Nigeria. Furthermore, the area of standards for digital and computer forensics is a technical issue and not a legal issue. Hence, the need for the development of an appropriate Standards for the implementation of forensic platform in the new Evidence Act, 2011 in Nigeria. There is need for standards to be set on how electronic evidence should be acquired, examined, analyzed and presented in a manner that will be admissible in the Nigerian Law Courts and Tribunals. Not only these, standards for laboratories where admissible forensic evidence could be extracted and for the quality of forensic laboratory staff need to be set as well. To demonstrate the need for the development of the Standards for Forensic Evidence, the Federal Ministry of Justice commenced the training and certification of its Prosecutors and Zonal Officers in Forensic Evidence in August 2012. The first batch of these prosecutors

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 5

were inducted by the Computer Forensics Institute, Nigeria (CFIN) at a special induction ceremony on 29th November, 2012. The Nigeria Police Force also commenced the training and Certification of its officers in Digital and Computer Forensics in August, 2013. However, the lack of Standards for the implementation of digital, computer and electronic evidence in Nigeria has left a big vacuum in the entire process. The NITDA Act empowers NITDA to develop such Standards. Furthermore, this study is in line with the Scope, Goals and Objectives of ICT4D Governance and Legislature generally and Law of Evidence in particular. 1.2 OBJECTIVES: The objectives of this Standards document are as follows: 1.2.1. To develop the Standards for the implementation of digital and computer forensics in Nigeria in terms of electronic evidence acquisition, examination, analysis and presentation in a manner that will be admissible in the law courts; and 1.2.2. To develop standards for: (a) forensic laboratories where admissible forensic evidence could be extracted; and (b) develop standards for the quality of forensic laboratory staff. 1.3 METHODOLOGY 1.3.1 Prepare a Draft of the Standards for Forensic Evidence. 1.3.2 Make the Draft Standards available to Stakeholders. 1.3.3 Review the Draft with relevant Stakeholders at the National Technical Committee (NTC) Meeting on Standards for Digital and Computer Forensics in Nigeria. 1.3.4 Obtain comments from Stakeholders and take these into consideration in preparing a Final Draft of the Standards for Digital and Computer Forensics in Nigeria. 1.4 SCOPE OF THE STANDARDS This standards document, in this version, will cover all areas of digital and computer forensic evidence obtained from computers, laptops, servers and other digital or electronic storage devices, including phones and mobile devices, video, photo, digital fingerprints and other biometric data, etc. This document shall be subject to review and update from time to time in view of the dynamic nature of information technology. Appendix A shows the forensic portals. Appendix B contains the Glossary of digital forensics terms. This Standards document is aimed principally at police officers, law-enforcement and security agents, military officers, prosecutors, anti-corruption agencies, regulatory agencies, other public sector investigators and private sector investigators working for their organizations and those working in conjunction with law enforcement. This document is meant for all those involved in the investigation and prosecution of incidents or offences which require the collection and examination of digital evidence in Nigeria. This document is intended for use in the recovery of computer-based electronic evidence; it is not a comprehensive guide to the examination of that evidence. It is a standards

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 6

document. It is, therefore, the responsibility of the users of this document to obtain the necessary training required for carrying out digital and computer forensic examination and analysis. This document was developed to ensure that in a crime which involves a high-tech element the digital forensics examiner collects all relevant evidence in a timely and appropriate manner.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 7

2. DIGITAL AND COMPUTER FORENSIC INVESTIGATION According to the Association of Chief Police Officers’ (ACPO), as information technology is ever developing and as each new development finds a greater role in our lives, the recovery of evidence from electronic devices has now become firmly part of investigative activity in both public and private sector domains. According to the Association (ACPO), in its Good Practice Guide for Computer-Based Electronic Evidence (www.acpo.police.uk), “electronic evidence is valuable evidence and it should be treated in the same manner as traditional forensic evidence - with respect and care. The methods of recovering electronic evidence, whilst maintaining evidential continuity and integrity may seem complex and costly, but experience has shown that, if dealt with correctly, it will produce evidence that is both compelling and cost effective.” The ACPO went further to give four Principles of Computer-Based Electronic Evidence. These are listed and explained below: Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. Principle 2: In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. Principle 3: An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to. The ACPO’s explanation of the principles: Computer-based electronic evidence is subject to the same rules and laws that apply to documentary evidence. The doctrine of documentary evidence may be explained thus: the onus is on the prosecution to show to the court that the evidence produced is no more and no less now than when it was first taken into the possession of police. Operating systems and other programs frequently alter and add to the contents of electronic storage. This may happen automatically without the user necessarily being aware that the data has been changed. In order to comply with the principles of computer-based electronic evidence, wherever practicable, an image should be made of the entire target device. Partial

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 8

or selective file copying may be considered as an alternative in certain circumstances e.g. when the amount of data to be imaged makes this impracticable. However, investigators should be careful to ensure that all relevant evidence is captured if this approach is adopted. In a minority of cases, it may not be possible to obtain an image using a recognized imaging device. In these circumstances, it may become necessary for the original machine to be accessed to recover the evidence. With this in mind, it is essential that a witness, who is competent to give evidence to a court of law makes any such access. It is essential to display objectivity in a court, as well as the continuity and integrity of evidence. It is also necessary to demonstrate how evidence has been recovered, showing each process through which the evidence was obtained. Evidence should be preserved to such an extent that a third party is able to repeat the same process and arrive at the same result as that presented to a court. The Nature of Computer-Based Electronic Evidence Digital and Computer Forensics is the application of science and technology to law in the search for truth in civil, criminal, and social behavioral matters to the end that injustice shall not be done to any member of society. It can also be defined as the acquisition, preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis using well-defined and approved methodologies and procedures. It is also the study of network traffic to search for truth in civil, criminal, and administrative matters to protect users and resources from exploitation, invasion of privacy, and any other crime fostered by the continual expansion of network connectivity. Goal: To determine the evidential value of crime scene and related evidence. Computer-based electronic evidence is information and data of investigative value that is stored on or transmitted by a computer. As such, this evidence is latent evidence in the same sense that fingerprints or DNA (deoxyribonucleic acid) evidence is latent. In its natural state, we cannot see what is contained in the physical object that holds our evidence. Equipment and software are required to make the evidence available. Testimony may be required to explain the examination and any process limitations. Computer-based electronic evidence is, by its very nature, fragile. It can be altered, damaged, or destroyed by improper handling or improper examination. For this reason, special precautions should be taken to document, collect, preserve and examine this type of evidence. Failure to do so may render it unusable or lead to an inaccurate conclusion. Functions of the Digital and Computer Forensic Examiner: The functions of the forensic examiner are: (a) Analysis of Physical / Electronic Evidence (b) Provision of Expert Opinion/ Testimony

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 9

(c) Furnishes training in the proper Recognition, Collection, Analysis and Preservation of physical / electronic evidence.

Methodology: (a) Acquire the evidence without altering or damaging the original. (b) Authenticate that the recovered evidence is the same as the original seized. (c) Analyze the data without modifying it. (The methodology is discussed in full later in this section) Categories of Digital Evidence:

Hardware

Software: o Data o Programs

Digital Evidence: Digital data that can establish that:

a crime has been committed or

can provide a link between a crime and its victim or

provide a link between a crime and its perpetrator. Categories:

Text

Audio

Image

Video Where Forensic Evidence Resides:

Computer systems, Laptops, Phone and Mobile devices, etc. o Logical file system o File system o Files, directories and folders, FAT, Clusters, Partitions, Sectors o Random Access memory o Physical storage media: HDD, CD, Flash-Drives, etc. o Slack space: space allocated to file but not actually used due to internal

fragmentation. o Unallocated space

Computer Networks: Application Layer:

Web pages, Online documents.

E-Mail messages.

News group archives.

Archive files.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 10

Chat room archives.

Transportation Layer

Network Layer

Data Link Layer

TAKING A SYSTEMATIC APPROACH:

Steps for problem solving: Make an initial assessment about the type of case you are investigating Determine a preliminary design or approach to the case Create a detailed design Determine the resources you need Obtain and copy an evidence disk drive Identify the risks Mitigate or minimize the risks Test the design Analyze and recover the digital evidence Investigate the data you recovered Complete the case report Critique the case

Systematically outline the case details:

Situation Nature of the case Specifics about the case Type of evidence OS Known disk format Location of evidence.

Based on case details, you can determine the case requirements:

Type of evidence Computer forensics tools Special OSs

A basic investigation plan should include the following activities:

Acquire the evidence Complete an evidence form and establish a chain of custody Transport evidence to a computer forensics laboratory Secure evidence in an approved secure container. Prepare a forensics Workstation Obtain the evidence from the secure container Make a forensic copy (image copy) of the evidence Return the evidence to the secure container Process the copied evidence with computer forensics tools

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 11

An evidence custody form helps you document what has been done with the original evidence and its forensics copies.

There are two types: Single-evidence form (see Figure 2:1 Multi-evidence form (Figure 2:2)

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 12

Nigeria Yzx Dept. Forensics Investigations Unit

This form is to be used for only one piece of evidence

Fill out a separate form for each piece of Evidence.

Case No: Unit Number:

Investigator:

Nature of

Case:

Location

where

evidence was

found:

Item # ID

Description of

evidence Vendor Name Model No./ Serial No.

Evidence recovered

by:

Date &

Time

Evidence placed in

Locker by:

Date &

Time

Evidence processed

by Disposition of Evidence Date & Time

Page __of ____

Figure 2-1: A single-evidence form

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 13

Nigeria Xyz Dept.

Forensics Investigations Unit This form is to be used for one to ten pieces of evidence

Case No:

Investigating

Organization:

Investigator:

Nature of

Case:

Location

where

evidence

was found:

Description of Evidence Vendor Name Model No./ Serial No.

Item #1

Item #2

Item #3

Item #4

Item #5

Item #6

Item #7

Item #8

Item #9

Item #10

Evidence

recovered by:

Date &

Time

Evidence placed

in Locker by: Date &

Time Item # Evidence processed by Disposition of Evidence Date &

Time

Page__ of__

__

Figure 2-2 A sample Multi-evidence form

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 14

Securing your Evidence:

o Use evidence bags to secure and catalog the evidence o Use computer safe products o Antistatic bags o Antistatic pads o Use well-padded containers. o Use evidence tape to seal all openings

Floppy disk or CD drives Power supply electrical cord

o Write your initials on tape to prove that evidence has not been tampered o Consider computer-specific temperature and humidity ranges.

Data-Recovery Workstations and Software

o Investigations are conducted in a computer forensics lab (or data-recovery lab)

o Computer forensics and data-recovery are related but different o Computer forensics workstation:

Specially configured personal computer o To avoid altering the evidence, use:

Write-blocker devices.

Gathering the Evidence: Take all necessary measures to avoid damaging the evidence

Place the evidence in a secure container Complete the evidence custody form Transport the evidence to the computer forensics lab Create forensics copies Secure evidence by locking the container

Image Copy or Bit-Stream Copy: Bit-by-bit copy of the original storage medium

Exact copy of the original disk

Different from a simple backup copy; backup software only copies known

files; it cannot copy deleted files or e-mail messages, or recover file fragments

A bit-stream image file contains the bit-stream copy of all data on a disk or

partition

If possible, copy the image file to a target disk that matches the original disk‟s

manufacturer, size, and model.

Use a Write-blockers to ensure that the Operating System (OS) does not

write to the source and target disks.

Verify the integrity of the image copy, that is, it is the exact replica of the

source disk by obtaining a set of Hash Values. Three (3) most common

types of Hash Values are:

o MD5 Hass

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 15

o SHA1 Hass

o SHA256 Hass

Analysing your Digital Evidence: Your job is to recover data (digital evidence) from:

Deleted files File fragments Complete files Encrypted files Passworded files

Completing the Case:

Prepare a draft report State what you did and what you found Include logs from the forensic tools you used If required, use a report template The report should show conclusive evidence that the suspect did or did not

commit a crime or violate a company/government policy Forward draft report to a Solicitor/Prosecutor/Investigator or requesting party

for review Produce a final report

Critiquing the Case: Ask yourself the following questions:

How could you improve your participation in the case? Did you expect the results you found? Did the case develop in ways you did not expect? Was the documentation as thorough as it could have been? What feedback has been received from the requesting source? Did you discover any new problems? What are they? Did you use new techniques during the case or during research?

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 16

3. DATA RECOVERY 3.1 INTRODUCTION Data recovery is the process of retrieving or recovering or salvaging either a deleted or a damaged or inaccessible data from a failed electronic media such as computer Hard Disk Drives, RAIDs, Removable Media (Flash Drives, Zip Drives, Memory Cards, etc.), Optical Devices (CDs, DVDs),Tape Cartridge, Phones and mobile devices, and other storage media. One of the most important functions of a Digital and Computer Forensics Examiner is recovery of data that has been deleted maliciously or intentionally for criminal purposes or to conceal evidence. Data recovery is also useful in discovering „digital‟ action(s) of the suspect that could link him or her to a crime, e.g. homicide – where all physical evidence regarding a suspected murder case has been neatly concealed but electronic evidence found on the suspect‟s laptop showed that the suspect ordered a substance used in poisoning the victim. Therefore, in order to effectively handle this aspect of the job, the examiner must have at least an elementary technical knowledge of Data Recovery and how the data storage media work. The hard disk (HD) drive will be used for this purpose in this document. This part is divided into five parts: data, the essence of data recovery, scope of data recovery, elementary knowledge of hard disk, and steps in data recovery. 3.2. DATA Data, as used here includes not only multi-media files such as data documents, images, voices that stored in file system or data base, but also hardware information, network addresses and network services, which are used to store and manage those information. 3.3 THE ESSENCE OF DATA RECOVERY Data recovery means retrieving lost, deleted, unusable or inaccessible data that lost for various reasons. Data recovery not only restores deleted or lost files but also recovers corrupted data and data maliciously deleted for criminal intent. On the basis of different lost reason, we can adopt different data recovery methods. 3.4 THE SCOPE OF DATA RECOVERY There are two purposes of data recovery:

for forensic investigation and

for disaster recovery. We can also divide the scope of data recovery according to different symptoms, namely:

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 17

3.4.1 Files loss: If files are lost because of deletion and formating (malicious, intentional and unintentional, criminal intention), format or Ghost clone error. files recovery tools such as FTK, EnCase, etc. can be used to recover data. 3.4.2 System problem: The main symptom is that you cannot enter the system or the system is abnormal or computer closes down. There are complex reasons for this, thus we need adopt different processing methods. Reasons for this symptom may be the key file of system is lost or corrupted, there is some bad track on hard disk, the hard disk is damaged, MBR or DBR is lost, or the CMOS setting is incorrect and so on. 3.4.3 Bad track of hard disk: There are logic and physical bad track. Logic bad track is mainly caused by incorrect operation, and it can be restored by software. While physical bad track is caused by physical damage, which is real damage, we can restore it by changing the partition or sector. 3.4.4 Partition problem: If partition cannot be identified and accessed, or partition is identified as unformatted, partition recovery tools such as Partition Table Software can be used to recover data. 3.4.5 Password loss: If files, system password, database or account is lost, some special decryption and password cracking tools can be used. 3.4.6 Files repair: For some reasons, some files cannot be accessed or used, or the contents are full of corrupted characters, in which the contents are changed and thus become unreadable. 3.5 METHODOLOGY OF DATA RECOVERY Taking a perfect image of a computer suspected of containing incriminating data is critical to all ensuing investigative work. Its significance must not be underestimated. When an imperfect image is used to gather suspect data, the resulting evidence will be found inadmissible in court. In most cases, "hidden," "deleted," or "lost" data cannot be located with the assistance of the limited software tools available to most users. However, sophisticated computer forensic tools allow specialists to find and restore missing data. Using specialized forensic tools and software, the technician will:

Inspect all hard drives, floppy drives, and other available electronic media using methods that will allow the data to be preserved and exhibited in court.

Explore and recover deleted files. Explore unallocated space and file slack for data, including hidden data. Explore areas of the media for fragmented data. Explore swap files. Locate and document current and deleted e-mail (sent and received).

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 18

Extract e-mail and e-mail conversations, identify all e-mail addresses and Web URLs.

Our focus in this document is on approved methodology for data recovery for forensic evidence. Data recovery, in most cases, may require exhaustive, detailed work to recover the data. However, any data recovery case for forensic purpose typically involves the same general process for recovering such lost data for disaster recovery. The steps are stated below: 1. Make a Log Book Entry: Make a log book entry as to date and time, details of the suspect HD or device to be recovered, Case number, Name of Suspect, etc. 2. Evaluate the media and provide an initial determination of the extent of the damage, potential for recovery, and work involved to recover the data.

3. Estimate how much work will be involved, how much data can be recovered, what steps will need to be taken, and what the cost will be to recover the data.

4. Mirror or Image the suspect HDD. In this step, the forensic examiner perform an image copy or bit-stream copy of the HDD, using Write-blockers to protect the original HD from being written to by the Operating System (OS). If possible, make two (2) copies for yourself as the Examiner and one (1) copy ready for the defense (or the prosecutor) depending on which side you are. (If this process fails due to hardware problem or physical damages to the HD, then perform step 5 before returning to perform step 4. If you can perform this step without any problem, then skip step 5.)

5. Repair any electrical or physical damage that may be preventing the media from accessing the data. (A suspect may have deliberately smashed the HD or the computer system or device on the floor to prevent possible data recovery). This step 5 must be carried out in a “Clean Room” and with the appropriate tools since Hard Drives and finely tuned and sealed tightly to protect it from dust.

6. Recover the data through "logical" (software) processes that work with the raw data or image of the data on the disk or drive. World class software such AccessData FTK, EnCase, Belkasoft Evidence Centre are examples of software that can be used for this purpose. You must ensure that the software you are using is properly licensed to you or your organization, and that the updates/upgrades are up-to-date.

7. Examine the recovered (imaged) data to be sure it is intact and usable and extract a list of the results of the recovery (what data was recovered, etc.).

8. Return the original media (HD, etc.) to the appropriate authority from where you collected the HD for data recovery.

9. Analysis: Conduct a detailed analysis of the recovered data based on the scope of your assignment (or charges brought against the suspect): e.g. MS-Office Document files, PDF files, Photos (JPEG, etc.), Videos, SMS, MMS, Emails, Contact Book, Databases, Apps, Call logs, GPS data, etc. Restrict yourself to the scope of your assignment.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 19

10. Report Writing: Prepared a detailed report of your findings and digital evidence found during your examination in respect of the examination. Review the draft copy and submit a final draft.

3.6 COMPRESSED, ENCRYPTED OR PASSWORD-PROTECTED FILES Compressed file archives such as zip, rar, tar, cab, 7z, etc. will be extracted and examined to determine if they contain relevant file types. The processing must be able to recursively extract files from the archive because a compressed archive can be included in another compressed archive. Encrypted or password-protected files must be identified and a log generated. Once it is clear that this is the situation, attempts will be made to “crack” the password. Whatever actions are taken, must be well-documented in the report (including name(s) of tools used). 3.7 WHEN THERE IS SUSPICION OF POTENTIAL EVIDENCE TAMPERING The following forensic questions must be answered and documented for each computer or electronic device: 3.7.1 Was a data destruction tool used on the hard disk drive? 3.7.2 Is there evidence that the user of the suspect computer copied files to a network

drive or external drive and deleted the files? 3.7.3 Is there evidence that someone may have tampered with the system clock? 3.7.4 Is there evidence that there was a massive destruction of files prior to imaging?

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 20

4.0 ESTABLISHING A DIGITAL AND COMPUTER FORENSIC

LABORATORY 4.1 Needs Statement

The emerging problem of terrorism, cybercrime, cyber-terrorism, cyber-warfare, kidnapping, financial fraud, money-laundering and other crimes in Nigeria places new responsibilities on law-enforcement agencies, regulatory agencies, financial institutions, corporate organizations, and governments at all levels. Furthermore, the passage of the Nigeria‟s Evidence Act, 2011 further requires law-enforcement, regulatory bodies and other organizations in the country to build capacity to address issues of digital forensics and electronic-based evidence. 4.2 Scope Of Work What is a “Computer Forensics Lab”? A Computer Forensics Lab or CFL is a designated location (permanent or mobile) for conducting computer based investigations. The lab should be securable in order to prevent unauthorized access. The scope of the work for a digital forensics laboratory are: 4.2.1 Planning and Design (including integration with existing systems); 4.2.2 Implementation: including supply and installation of computer/digital/mobile forensics

laboratory equipment/software and tools, and moving into the laboratory, etc.; 4.2.3 Training and Capacity Building (including Certification); 4.2.4 Digital Forensics Best Practices Documentation; and 4.2.5 Post-Implementation Support. 4.3 Design of a Laboratory (New Building) Although the laboratory building presents some very complex and challenging design issues, elements of the site design must also be addressed in order to ensure a successfully designed forensic laboratory facility. Issues such as site access, proximity of secured and unsecured parking areas, and even landscaping have implications regarding the efficiency and security of the overall site and building design. Site Design

Site access. o It is desirable that the site be designed with access from at least two

directions to ensure access to the site despite traffic conditions, street maintenance work, acts of sabotage, or other unforeseen site disruptions.

Emergency and service access.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 21

o Coordinate with laboratory staff and local authorities to ensure emergency access for fire department and other emergency vehicles. Access for shipping and receiving must comply with code requirements without compromising site security.

Site lighting. o The site lighting should be designed to enhance security and discourage

vandalism and unauthorized entry. Lighting comparable to that of a college campus offering night classes might serve as a guideline.

Landscape design. o Landscaping should be designed to enhance site security by preventing

potential vandals, burglars, and saboteurs from hiding in the landscaping until after dark.

The following types of landscape design should be avoided:

Dense shrubbery within 3.048 m (10 ft) of the building or any security fence.

Large clusters of shrubbery, 0.61 m (2 ft) to 1.83 m (6 ft) high.

Tall evergreens with branches less than 1.52 m (5 ft) above grade.

Parking design:. o Like landscaping, the design of parking areas should consider site security

requirements. The following are recommended levels of security for parking:

Level 1, unsecured. Visitor parking located near the visitors‟ entrance to the building allowing entry and departure without security barriers.

Level 2, partially secured. Fenced area for use by persons having business at the facility. For example, shipping and receiving, biological and toxic waste pickup, dumpster replacement, and evidence delivery. The area should be gated, and the gate may be left open during business hours and locked after hours. Access might be through the level 1 parking area.

Level 3, secured. Staff parking area secured 24 hours, surrounded by a security fence, and accessible by use of a proximity or card key device. Depending on security policy, this level might be eliminated, and staff could park in the level 2 parking area.

Level 4, high security. Vehicle impound parking with limited personnel access and monitored security systems.

General Building Design

Exterior walls. o Materials. Bullet-resistant, such as concrete. o Windows. Reflective and/or bullet-resistant glazing where exposed to public

view. o Window sill design. Windows should be installed flush with the exterior

surface of the wall, or if recessed, provide a sloped exterior sill to prevent the placement of explosives at the window.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 22

o

HVAC intakes. o Locate in areas inaccessible to the public, such as in secured fenced areas.

Design to prevent the possibility of someone introducing a tear gas canister into the intake.

o If located in parking areas, design to prevent introduction of vehicle exhaust. o Locate away and upwind from fume hood exhaust.

Visitor access protection. o Administrative or security receptionist at visitors‟ access should be protected

behind bullet-resistant glazing with adjacent walls of similar bullet-resistive construction.

Duress alarms. o “Call assistance” or duress/panic alarms should be installed in key areas

throughout the facility and concealed as appropriate. Locations might include visitor reception desk, bulk chemical storage spaces, weapons ranges, parking garages, and clandestine lab storage and exam spaces.

Laboratory tours. o If the facility is to be designed to accommodate guided tours, tour groups

should not be allowed into the laboratory spaces. Guided tours should be conducted through the main corridor system with viewing through strategically placed windows in the corridor walls providing viewing into the laboratory spaces.

Interior glazing. o It is recommended that the use of windows between laboratory spaces be

maximized. o This is a feature designed to enhance safety of personnel by allowing those in

one laboratory space to view the activities of those in other spaces that might be of a more hazardous nature.

Equipment and systems service and maintenance. o Equipment and systems that are part of the building and might require

periodic service and maintenance should be located outside of the laboratory spaces, and particularly outside of any space where evidence are stored. Such equipment and systems might include, but are not limited to, electrical panels, walk-in cooler compressors, and water purification filters.

Corridors. o Primary circulation and exit corridors: 1.83 m (6 ft) wide, minimum. o Secondary circulation and non-exit corridors: 1.37 m (41/2 ft) wide, minimum.

Doors. o Double doors to all laboratory sections and spaces that are expected to

receive oversized evidence or equipment. Double doors shall consist of a 0.914 m (36 in) wide active leaf and an 0.457 m (18 in) wide inactive leaf.

o Freight elevator doors minimum 1.22 m (48 in) wide.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 23

Security Design

Security Strategy Meeting. o Although this is not a design guideline, it is recommended that a security

strategy meeting take place upon completion of an approved schematic design of the building and the site. This meeting should be attended by representatives of the building owner, building users, security staff, the architect, the electrical engineer, and a security design consultant.

o The purpose of this meeting is to establish and document a comprehensive security strategy for the new facility. This security strategy will act as a guideline for the design of passive and electronic security systems. This strategy should include, but not be limited to, security policy and procedural issues, site and building access as related to security, types of security electronics systems, performance requirements for security access systems, and any other special security needs that might be identified by the users. Specific considerations regarding hardening the laboratory against terrorist attack may be important, depending on the location and function of the lab.

Escort only design. o The design of the building should incorporate a security perimeter within

which unauthorized persons may enter under an “escort only” policy. This security perimeter should be defined during the Security Strategy Meeting.

o The sign-in and badging area should be located at the visitors‟ entrance.

Door access systems. o Access to and circulation throughout the facility, as well as key zones of the

building, should be provided with controlled access through the use of proximity or card-key access systems. The system should be capable of programming access devices for specific areas and times, and should fully document all access attempts.

o The system must prevent unauthorized entry while maintaining safe and legal exiting. This security must be maintained in multistory buildings having shared elevator access.

Door status monitoring. o Key doors throughout the building, particularly exterior doors and doors to

evidence storage spaces, should be electronically monitored for open/closed status.

Closed circuit television (CCTV) systems. o Key areas of the building, both interior and exterior, should be kept under

video surveillance. Key areas might include, but are not limited to, exterior doors, lobby/reception areas, parking lots, and evidence delivery areas. Placement of CCTV cameras and features (pan, zoom, tilt, constant sweep, time lapse recording, etc.) should be defined during the Security Strategy Meeting.

Special security design features. o The security design of the facility should include consideration of such special

features as: Motion detection in evidence storage spaces, circulation corridors, or other key areas.

o Additional security protection for storage of high-value evidence items such as money and jewelry.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 24

Electrical Systems Design Checklist: Emergency generator.

Recommend emergency power and lighting for the following spaces: o Entire evidence section. o All refrigerators and freezers, including walk-in units. o Photography darkroom(s). o Entire security section, including electronic security systems and telephones. o All computer-driven systems and equipment including, but not limited to,

laboratory instrumentation, Automated Fingerprint Identification System (AFIS), Combined DNA Identification System (CODIS), Laboratory Information Management System (LIMS), Integrated Ballistic Imaging System (IBIS), and LAB Network.

Central UPS system is preferred, but local UPS units are acceptable.

General Laboratory Design

Laboratory floors. o Chemical-resistant sheet vinyl or vinyl tiles with welded seams.

Laboratory walls. o Epoxy in all spaces considered highly biologically or chemically hazardous,

such as examination rooms, bulk drug analysis, and bulk chemical storage. o Semi-gloss latex enamel in all other spaces.

Laboratory ceilings. o Epoxy in all spaces considered highly biologically or chemically hazardous,

such as examination rooms, bulk drug analysis, and bulk chemical storage. o Suspended acoustical in all other spaces.

Non-laboratory spaces. o Acceptable interior finish standards for offices and non-laboratory support

spaces.

Laboratory casework. o Standard laboratory casework with utility access space behind base cabinets. o Steel or wood preferred, plastic laminate acceptable. o Maximize use of flexible laboratory casework systems.

Files. o Generally, one four-drawer filing cabinet, or the equivalent file storage space,

should be provided for each forensics analyst at the area of the non-laboratory workstation.

Special considerations. o Acoustics. o Reflective surfaces. o Vibration-proof flooring. o High-strength flooring.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 25

Technical Laboratory Sections:

General Design Comments

The forensic laboratory consists of various laboratories within the overall facility.

These various laboratories are commonly referred to as laboratory sections or units. The recommended guidelines provided here are intended to serve as checklists for the design of laboratory space in the technical laboratory sections. Many of the items listed, such as laboratory workstations, are universal components of technical sections. Other items may or may not be necessities, depending upon the needs and size of individual laboratory sections.

In some instances area (m2, ft2) of floor space or linear footage (lin m, ft) of bench space have been assigned to represent minimum guidelines for space requirements. Items and areas that are not assigned measurements will vary as needed by individual laboratories and the sections within those laboratories.

For most laboratory sections the checklist below follows a common theme. This theme consists of the concept of a main laboratory space for each section, and supporting spaces that are enclosed rooms with direct adjacency to the main laboratory. The main laboratory is where each analyst will have an individual laboratory workstation. The adjacent supporting spaces will be spaces devoted to specific procedures or equipment items and that might be used by each analyst from time to time during the course of his or her examinations.

Administrative Work Spaces

Each laboratory section will identify various non-laboratory work spaces. A significant amount of the forensic analyst‟s responsibilities include non-laboratory tasks such as data analysis, report writing, court testimony preparation, and other administrative responsibilities.

The design should provide the analyst with an administrative work area, away from the hazards of the laboratory, where these tasks can be conducted in an efficient and safe environment.

Supervisors‟ offices, case review areas, and space for files can also be included in this environment. With the exception of the supervisors‟ offices, which shall be private offices, all other spaces in the administrative work area can be designed as open office systems workstations.

Some analysts, such as document and latent print examiners, require additional administrative work space since a significant amount of their technical examinations can occur outside of the laboratory environment.

Computer Evidence Section

May be designed as computer hardware space. Chemical and biological hazards will not be present.

Main computer evidence laboratory space. o Individual analyst laboratory workstation: 7.62 lin m (25 lin ft) bench space per

analyst.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 26

o Miscellaneous computer evidence bench: 7.62 lin m (25 lin ft) bench space per analyst.

o Independent data line with two jacks.

Various types of telephone lines.

Evidence room. o 9.29 m2 (100 ft2) per analyst.

Equipment room. o 9.29 m2 (100 ft2) per analyst. o Administrative work spaces. o May be included as part of the main computer evidence laboratory space. o Supervisor‟s office: 13.935 m2 (150 ft2). o Analyst‟s administrative workstation: 9.29 m2 (100 ft2) per analyst. o Independent data line with two jacks. o Various types of telephone lines.

Dry fire-suppression system. Universal Facility Design Components

Although no two forensic laboratories are alike, there are basic functional components and areas that are universal to most laboratory buildings. For example, office space, training rooms, and technical support areas are standard necessities that must be considered for space during the design phase.

The following set of checklists serve as recommended guidelines and requirements for universal laboratory building components, and have been divided into four categories: administrative, building, technical support, and general technical.

Administrative areas are nontechnical and primarily consist of office space used for evidence support.

Building areas are not directly related to evidence analysis, and needs will vary for freestanding laboratories or laboratories occupying only part of a building.

Technical support areas are directly related to, but are not used for, evidence analysis.

General technical areas are shared by most laboratory sections within a building, and needs will vary depending upon laboratory size and functions.

Administrative:

Design standards for these spaces should be based on acceptable office space design standards.

Private offices. o Based on existing space standards, if any.

Offices for support personnel. o Shared offices or open office systems furniture.

Files for active cases.

Clerical, administrative, and case support.

Mail, photocopy, and facsimile.

Conference room(s).

Lobby/reception.

Consultant offices.

Library.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 27

o Book stacks. o Periodicals shelves. o Study carrel(s) o Study table(s) o Computer information terminal(s)

Building:

Mechanical. o Heating, ventilation, and air conditioning (HVAC) equipment rooms. o Air handling systems. o Fume and biological hood exhaust equipment. o Laboratory compressed air and vacuum systems. o Central plant water treatment systems. o Domestic hot and cold water systems. o Fire extinguishing systems and sprinkler control rooms. o Instrument gas manifold and distribution systems.

Communications. o Computer rooms and/or closets. o Telephone equipment rooms and/or closets. o Premise wiring rooms and/or closets. o Data line provisions

Electrical. o Service entrance and main switch gear. o Emergency generator. o Uninterruptable power supply (UPS) equipment. o Electrical closets. o Electrical service panels.

Staff use. o Lunch room. o Break room(s). o Locker rooms with showers. o Rest rooms. o Other. o Janitorial closet(s). o Passenger and/or freight elevator(s). o Recycling. o Lab coat cleaning. o Shipping and receiving. o Hazardous waste disposal. o Compressed gas cylinder storage. o General waste disposal.

Technical Support

Storage. o General laboratory storage. o General supplies storage. o Long-term files storage.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 28

o Chemical storage.

Dry fire-suppression system.

Evidence. o Evidence receiving and return counter from and to submitting agencies. o After-hours secure evidence lockers. o Evidence disbursal and return counter to and from laboratory sections. o Evidence custodian workstations: minimum 5.95 m2 (64 ft2). o Evidence supervisor office: minimum 11.48 m2 (120 ft2). o Evidence storage.

General evidence storage shelving.

Refrigerated and frozen evidence storage: refrigerators and freezers or walk-in units.

Secure narcotics storage.

Secure valuables storage.

Flammable evidence storage: fire-rated, ventilated storage room, or ventilated flammable storage cabinets.

Bio-hazardous evidence storage.

Gun storage.

Long-term evidence storage. o Evidence workroom.

Mail room features for packaging, sending, and receiving evidence.

Layout countertop space with sink.

Photocopy and facsimile. o Evidence case review/triage/conference room(s). o Evidence drying.

General Technical:

Vehicle processing. o Securable and air conditioned/heated forensic garage bay(s).

At least one bay large enough to accommodate vans and motor homes. o Workbench space: 3.048 lin m (10 lin ft) per bay. o One shop sink per bay. o Laser or remote fiber light source.

o Vehicle lift (fixed or portable). o High-intensity lighting. o Additional pull-down lighting. o Tools storage. o Evidence drying room(s). o Compressed air.

Forensic photography. o Can be utilized for laboratory support only or offer full services, including

public relations and graphic arts. o Film and print for black and white and color processing. o Chemical storage and mixing space. o Studio. o Finishing. o Computer-aided design and drafting (CADD) for graphic arts.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 29

o Photographic equipment and supplies storage. o Refrigerator.

Computer imaging. o Video and photographic enhancement. o General enhancement of latent prints, footprints, etc. o Virtual reality crime scene recording.

Training. o Classroom(s). o Audio/visual media room. o Exhibit storage. o Mock crime scene room(s). o Training laboratory. o Breath alcohol training. o Video conferencing. o Computer and television networking.

Quality assurance. o Proficiency testing/sample preparation laboratory (might be shared with

training laboratory). o Conference/office. o Record storage and archival facilities.

Crime scene unit. o Equipment storage. o Staging area.

4.4 Starting a Laboratory in an Existing Building 4.4.1 Minimum Space Requirements The minimum space requirements for a small laboratory (for a total of eight (8) forensics examiners) in an existing building in organizations just starting off a digital and computer forensics laboratory are as follows:

A Reception Room

The Main Digital Forensics Lab Room Optional (if additional space is available):

A Data Recovery/Clean Room

Office for the Head of Unit/Department The above space is just adequate for a start and should be evaluated periodically as the activities increase.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 30

4.4.2 FURNISHING 4.4.2.a The Reception:

1 No. Reception Table with two compartments

2 Nos. Swivel Chairs for two officers.

1 No. Four-seater visitors‟ chair

1 No. Centre Table.

4.4.2.b The Main Digital Forensics Laboratory Room (for six (6) Forensics Examiners):

The Main Laboratory will contain:

1 No. Custom-built (Wall) Workstation Table with six (6) compartments, each having a mobile, multi-coloured 3-drawer cabinet;

6 Nos. Swivel Chairs for Forensics Examiners

6 Nos. Wall-Hanging Filing Drawers/Wooden Cabinets

2 Nos. Metal Office Filing Cabinets (with Bar for padlocking).

1 No. Fire-proof Filing Cabinet. 4.4.2.c Additional Items required for the two rooms (4.4.1 and 4.4.2):

Split Unit Air-conditioners

Office Fridge – for Main Lab.

2 Nos. Plasma TV – 24”

Burglary-proof Window Protector (Qty depends on number of windows in the two rooms)

Secured Metal Doors (if not in place)

Curtains and accessories (Qty depends on number of windows in the two rooms)

1 No. Signboard (to identify the laboratory)

4.5 SUGGESTED DIGITAL/MOBILE FORENSICS EQUIPMENT, SOFTWARE, TOOLS, AND SUPPLIES

4.5.1 Factors to consider: In determining the type of forensic computer equipment needed, you should consider the following:

Type and volume of investigations being conducted Is the organization Law-enforcement or Corporate? If Corporate, are investigations internal only or internal and external. Organizations conducting external investigations may require a more broad range of

capabilities than one that only does internal investigations. Intended use of the machine:

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 31

o Will it be used only for imaging? o Will it be used only as an analysis platform or will it be used for everything?

Relatively few labs have an unlimited budget. So, there are a number of other things to consider:

How many investigators/examiners are assigned to the lab? What equipment and software are already present? What is the expected or known volume of work? Purchasing from one source can often save you money as the company may be

able to give larger discounts on volume purchases. Commercially Purchased Systems – Selecting a vendor

Commercial Companies like Dell, HP, IBM make good computers, but may have restrictions on customer repair and customization. Opening the case can void all warranties.

These companies do not design their systems with forensics in mind.

Dell recently started to partner with forensic software vendors.

Ask: Has the company actually delivered forensic systems or are they just a website wonder?

A company which specializes in forensic workstations should have: o The forensic experience to know what components are required, what the

methodologies are and know how to use them. o A warranty policy that is “No Hassle” for the end user. o A policy that allows forensically qualified individuals to open the system.

without voiding an warranty. o Test the systems to ensure they are forensically sound - not all computers are

not created equal – test results must be repeatable. o The company should be responsive to customer needs and allow

configuration changes based on customer specific needs.

At the end of the day you want systems that will do the job.

How fast the job gets done will in part depend on your budget.

Is the system configured to accept the media routinely received in a investigation?

Is the hardware easy to use?

Do you need portable forensic systems?

Portables come in a variety of shapes and sizes.

Some are built specifically for mobile forensics.

Laptops can work well as long as you test before you buy or buy from a forensics company that has tested them.

The portable solution you choose should give you the same basic capabilities as you lab systems.

Why use Hardware Write Protection?

Do not think that if you do not use Windows, you may not a Write-blocker device.

You can never be too careful.

Linux and Mac OS X can be configured so they do not auto-mount hard drives and other media.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 32

Windows OS‟s will mount devices you attach automatically. 4.5.2 Minimum Standards for Forensic Equipment, Software and Tools in a new

Digital Forensics Laboratory The following items and the stated minimum quantities are to be provided for the kick-off of a e-Crime and Digital Forensics Laboratory:

2 Nos. UFED Touch Ultimate Phone Forensics Solution, with Chinex and Link Analysis (plus 2 Nos. extra batteries) – Ruggedized.

2 Nos. UFED 4PC Phone Forensics Solution, with Chinex and Link Analysis.

2 Nos. Susteen‟s Secured View 3 - svNUC Mobile Forensics Kit with the Intel® “Next Unit of Computing”.

2 Nos. AccessData Mobile Phone Examiner MPE+

1 No. Belkasoft Evidence Center Enterprise (multi-user) 2014 or latest

2 Nos. Belkasoft Photo Forgery Detection Plugin

Belkasoft Live RAM Capturer -- (Free of charge)

FTK Imager (Free of Charge)

2 Nos. FTK 5.0 Licenses (AccessData)

1 No. FTK Lab (10 users Licenses)

1 No. FTK CIRT – 200 nodes

2 Nos. EnCase 7.09 or latest

1 No. Paraben Device Seizure

1 No. Paraben P2 Commander

4 Sets Write-Blockers

2 Nos. Image MASSter 4000PRO/WipePRO X2 IT & FORENSIC Extension Ready (Std i7)

2 Nos. Image MASSter RAPID IMAGE Complete Solutions - IT & FORENSIC with SCSI Cables, Image MASSter SATA Adapters, IDE Adapters, Expansion Boxes, Accessories,

2 Nos. Encryption Tools

8 Nos. Forensic Workstations with min. of 1TB HDD, >2.5MHz speed,

4 No. Forensic Laptops (for field work) with min. of 1TB HDD, >2.5MHz speed, Ruggedized, etc.

12 Nos. Microsoft Office Licenses

2 No. HP Deskjet 5500 or similar

2 No. LaserJet HP P2035 Printer or similar

8 Nos. UPS 650v

1 No. Scanner HP Scanjet G2710 or similar

12 Nos. Backup 2TB Hard Drives

12 Nos. Anti-Virus Software Licenses

Electrical Cabling and Extension cords

4 Nos. Internet Routers (Optional: for field use)

3 months Internet Subscription for 4 Nos. WIFI Routers (Optional)

12 Nos. Packs of Latex Gloves

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 33

Consultancy: Planning/Design, Implementation, Configuration and Setup, Support, etc.

Tool Sets: For the Lab a good starting list is:

High quality screwdriver set (small ones also) – I like Craftsman and Wiha

Small Wire Cutters

Small Needle Nose Pliers

Assortment of Torx bits

Assortment of Hex head bits

Small flashlight

Technicians Mirror (the kind you can adjust the mirror head)

Hemostats (forceps - Radio Shack calls them as solder helpers)

Static Wrist Strap

Small Digital Multimeter

Container of computer screws

Spare Hard Disk Jumpers (large and small)

Spare Cables (Floppy, IDE, SATA, SCSI)

Assortment of Gender Changers

Assortment of Molex Male and Female Cables

Latex type gloves

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 34

5.0 TRAINING AND PROFESSIONAL QUALIFICATIONS OF DIGITAL FORENSICS EXAMINERS

5.1 TRAINING 5.1.1 General Awareness Training in Digital/Mobile Forensics for staff in all key

departments, such as Legal, ICT, Information Security, Accounting, Audit/Inspection, Forensics, Investigation, Prosecution, Judiciary, Admin/Human Resources, etc.;

5.1.2 Computer Forensics Certification Training for Digital and Computer Forensics Examiners and others officers working in the Lab who may testify as Expert Witnesses and present electronic evidence in courts and tribunals such as: MCFI – Member, Computer Forensics Institute CCE- Certified Computer Examiner CCFE- Certified Computer Forensics Examiner

; 5.1.3 Application-specific Certification Training in digital/mobile forensics for officers (i.e. for each adopted/procured forensic hardware/software/tool, training must be

provided) such as: ACE Certification – AccessData Certified Examiner EnCE Certification- EnCase Certified Examiner

. 5.1.4 Attendance at local/national and International Digital and Computer Forensics

Conferences. 5.1.5 Provision of a Digital and Computer Forensics Library, with books, journals, and

other resources.

5.2 PROFILE/QUALIFICATIONS OF DIGITAL AND COMPUTER

FORENSICS EXAMINERS (a) At inception, the Head of Unit/Department must have at least three (3) to five (5) years‟

practical experience in the field of computer and digital/mobile forensics and particularly, in setting up new digital forensics laboratories for the detection and investigation of electronic crime (e-Crime). Where this level of experience is not available in-house, an organization should either arrange with its digital forensics consultant/consulting firm to provide the necessary support, training and supervision until such a time that capable hands are available in the unit or department or recruit from outside your organization.

(b) Must be: i. A Certified Forensics Examiner through any of:

MCFI - Computer Forensics Institute, Nigeria (CFIN) which offers a digital

and computer forensics program which include: Biometrics, Cryptology, Data

Recovery, Questioned Documents Examination, Hand-writing Analysis,

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 35

Nigeria‟s Evidence Act, 2011, Evidence Acquisition, Analysis, Reporting and

Presentation.

CFCE - The International Association of Computer Investigative

Specialists offers the Certified Forensic Computer Examiner Program, which

is open to active law enforcement personnel and others who qualify for

membership in IACIS.

CCE - Certified Computer Examiner certification through the International Society of Forensic Computer Examiners.

and any other two of ii. to v: ii. A Certified Live Wire Examiner; iii. ACE or EnCase Certification; iv. Phone/Mobile Forensics Certification; v. Membership of High Technology Crime Investigation Association (HTCIA) (for Law-

enforcement Officers); (c) Working knowledge of operating systems, communication and application systems; (d) A good knowledge of Nigeria‟s Evidence Act, 2011 as it relates to the Rules of

Evidence, and Electronic Evidence in particular. (e) Good experience of the Nigerian environment; (f) Ability to image and use the recommended digital forensics hardware/software and

tools, following sound digital and computer forensics approved methodology; (g) For those who will act as Expert Witnesses in the courts, a minimum of Bachelor‟s

degree or HND in any field and success in an aptitude test is mandatory. For Laboratory Assistants, a minimum of OND in any field plus (b)i. are minimum requirements;

(h) Must have an analytical and investigative mind; and (i) Must be ready to work long and odd hours.

5.3 PROFILE/QUALIFICATIONS OF DIGITAL AND COMPUTER FORENSICS CONSULTANT FOR LABORATORY IMPLEMENTATION

(a) The Consultant for digital and computer forensics laboratory implementation assignment

(individual or company) must have at least seven (7) years‟ experience in the field of computer/digital/mobile forensics;

(b) Must have previous experience in setting up new digital forensics laboratories for the

detection and investigation of electronic crime (e-Crime);

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 36

(c) Experience in the management and implementation of large scale computerization and

infrastructural development in the public sector; (d) Ability and experience in providing training in computer/digital/mobile forensics; (e) Must be: i. A Certified Forensics Examiner through any of:

MCFI - Computer Forensics Institute, Nigeria (CFIN) which offers a digital

and computer forensics program which include: Biometrics, Cryptology, Data

Recovery, Questioned Documents Examination, Hand-writing Analysis,

Nigeria‟s Evidence Act, 2011, Evidence Acquisition, Analysis, Reporting and

Presentation.

CFCE - The International Association of Computer Investigative

Specialists offers the Certified Forensic Computer Examiner Program, which

is open to active law enforcement personnel and others who qualify for

membership in IACIS.

CCE - Certified Computer Examiner certification through the International Society of Forensic Computer Examiners.

and any other two of ii. to v: ii. A Certified Live Wire Examiner; iii. ACE or EnCase Certification; iv. Certification in Phone/Mobile Forensics; v. Membership of High Technology Crime Investigation Association (HTCIA); (f) Good knowledge of operating systems, communication and application systems; (g) A good knowledge of Nigeria‟s Evidence Act, 2011 as it relates to the Rules of

Evidence, and Electronic Evidence in particular. (h) Good experience of the Nigerian environment; (i) Ability to provide local support for forensic hardware, software and tools proposed. (j) Ability to manage a large-scale digital and computer forensics laboratory; (k) A minimum of Bachelor‟s degree with post-graduate qualifications as an added

advantage.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 37

5.4 SKILL SETS REQUIRED BY DIGITAL AND COMPUTER FORENSICS

EXAMINERS

Who is a Certified Computer/Digital Forensics Examiner? Computer and digital forensics is still a relatively new field, so defining what a forensic examiner does can sometimes be difficult to understand for new comers to the field. Basically, the certified computer and digital forensics examiner applies reliable investigation and analysis techniques in order to discover potential electronic or digital evidence for legal purposes. Normally, the forensic examiner will inspect storage media such as hard drives, flash drives, CD‟s/DVD‟s, phone and mobile devices and other electronic components. The basic responsibilities are:

To acquire the digital evidence by carefully extracting the data. Preserve the data/evidence Analyze the data/evidence using proper protocol and specialized tools Present and report on the findings

Digital and computer forensic investigations involve three (3) distinct scenarios:

1. The computer was used to commit a crime or involved in inappropriate use. 2. The computer was the target of a crime, such as being hacked for information, or

used as a zombie in a botnet. 3. The computer was a container of electronic evidence required in a legal matter.

Forensic examiners are responsible for extracting and preserving three types of data from these computers:

1. Active data is the information clearly visible. Files, folders, programs, etc. 2. Archival data is data that has been backed up and/or stored. This could consist of

backup tapes, CD/DVD‟s, floppies, or hard drives. 3. Latent data is the data that has been deleted or formated, usually requiring

specialized software tools.

Skills and Knowledge Required: The key aspect to being a certified digital forensic examiner is being able to protect evidence from intentional or accidental modification. In the information technology world, this means protecting and preserving data. The forensics field has its own set of software and hardware tools for this specific purpose. The digital forensics examiner will need to be familiar with these tools. The following is not an exhaustive list but should cover the basic skills that a computer forensic examiner should acquire, and which may also differ according to type of employment situation and environment:

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 38

Understanding of forensic methodologies Hardware imaging systems; Computer skills-hardware and software Legal concepts of criminology Familiarity with local, region, domestic, and international laws on Rules of Evidence

and procedure Advanced knowledge of the Windows registry Experience with computer forensics processes and tools Using the Forensic Toolkit by AccessData Using Encase forensic software or any other top class forensic software Using Cellebrite‟s UFED or AccessData MPE+ or Paraben Solutions or other top

class solutions Questioned Document Examination Hand-writing Analysis Biometrics – including Fingerprinting, face-recognition systems, etc. Network forensics Incident response skills Investigative skills Ability to work long hours Knowledge of finance and accounts Malware Analysis expertise or Malicious Code Examination Experience in full life cycle investigations Strong communication and interpersonal skills Ability to establish positive relationships with law enforcement professionals Ability to document evidence and complete investigation reports Ability to handle live incidents with appropriate responses Forensic analysis skills including hardware, media storage, data storage, forensic

imaging, and file system analysis Investigation skills Personal interviewing skills Familiarity with the use of rootkits, monitoring mechanisms, remote control services Experience with unauthorized access methods and exploitation of known

vulnerabilities, such as SQL injection, Mobile Instant Messaging (MIM), buffer overflows, and others

Excellent written and verbal skills Ability to communicate complex technical information in non-technical staff and

clients. Ability to lead presentations Investigative experience, i.e. military or law enforcement or private investigation

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 39

5.5 JOB DESCRIPTION: COMPUTER FORENSICS EXAMINER/INVESTIGATOR Duties of Computer Forensics Examiners and Investigators: Computer and Digital Forensics specializes in examining digital media to identify, recover, preserve, analyze, and present facts and opinions in a forensically sound manner. The need for such examination and analysis is needed not only for computer crime, but in other criminal and civil cases as well, and also where an electronic audit trail may be created from the information on the computer. There are many duties a computer forensics examiner performs. Some of these are:

Conduct forensic and security investigations related to: o financial crime o breach of policy o standards of conduct o hacks o leaks o information security o corporate compliance o terrorism o cyber warfare o homicide and other crimes

Provide technical guidance to upper level management Provide policy recommendations Develop and implement security policies and procedures for information technology

infrastructures Conduct witness interviews Perform forensic analysis on electronic storage media and mobile devices Document evidence findings and prepare briefings Communicate investigation findings with law enforcement personnel Testify in court (when applicable) Research new forensic technologies Stay up-to-date with the most recent malicious technologies and evolving technology

platforms

5.6 COMPUTER FORENSICS EXAMINER/INVESTIGATOR SALARY

In 2014, the average annual salary of a Computer Forensics Examiner in the United States is between $50,000 and $70,000.00. There is a need to design and pay a special salary scale and allowances for digital and computer forensics specialists outside of the civil service salary scale. In the private sector, it is recommended that the pay be negotiated appropriately.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 40

APPENDIX A

FORENSIC PORTALS

Art forensics concerns the art authentication cases to help research the work's authenticity. Art authentication methods are used to detect and identify forgery, faking and copying of art works, e.g. paintings.

Computational forensics concerns the development of algorithms and software to assist forensic examination.

Criminalistics is the application of various sciences to answer questions relating to examination and comparison of biological evidence, trace evidence, impression evidence (such as fingerprints, footwear impressions, and tire tracks), controlled substances, ballistics, firearm and toolmark examination, and other evidence in criminal investigations. In typical circumstances evidence is processed in a Crime lab.

Digital forensics is the application of proven scientific methods and techniques in order to recover data from electronic / digital media. Digital Forensic specialists work in the field as well as in the lab.

Forensic accounting is the study and interpretation of accounting evidence

Forensic aerial photography is the study and interpretation of aerial photographic evidence

Forensic anthropology is the application of physical anthropology in a legal setting, usually for the recovery and identification of skeletonized human remains.

Forensic archaeology is the application of a combination of archaeological techniques and forensic science, typically in law enforcement.

Forensic astronomy uses methods from astronomy to determine past celestial constellations for forensic purposes.

Forensic botany is the study of plant life in order to gain information regarding possible crimes.

Forensic chemistry is the study of detection and identification of illicit drugs, accelerants used in arson cases, explosive and gunshot residue.

Forensic dactyloscopy is the study of fingerprints.

Forensic document examination or questioned document examination answers questions about a disputed document using a variety of scientific processes and methods. Many examinations involve a comparison of the questioned document, or components of the document, with a set of known standards. The most common type of examination involves handwriting, whereby the examiner tries to address concerns about potential authorship.

Forensic DNA analysis takes advantage of the uniqueness of an individual's DNA to answer forensic questions such as paternity/maternity testingand placing a suspect at a crime scene, e.g. in a rape investigation.

Forensic engineering is the scientific examination and analysis of structures and products relating to their failure or cause of damage.

Forensic entomology deals with the examination of insects in, on and around human remains to assist in determination of time or location of death. It is also possible to determine if the body was moved after death using entomology.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 41

Forensic geology deals with trace evidence in the form of soils, minerals and petroleum.

Forensic geophysics is the application of geophysical techniques such as radar for detecting objects hidden underground or underwater.[41]

Forensic intelligence process starts with the collection of data and ends with the integration of results within into the analysis of crimes under investigation[42]

Forensic Interviews are conducted using the science of professionally using expertise to conduct a variety of investigative interviews with victims, witnesses, suspects or other sources to determine the facts regarding suspicions, allegations or specific incidents in either public or private sector settings.

Forensic limnology is the analysis of evidence collected from crime scenes in or around fresh-water sources. Examination of biological organisms, in particular diatoms, can be useful in connecting suspects with victims.

Forensic linguistics deals with issues in the legal system that requires linguistic expertise.

Forensic meteorology is a site-specific analysis of past weather conditions for a point of loss.

Forensic odontology is the study of the uniqueness of dentition, better known as the study of teeth.

Forensic optometry is the study of glasses and other eye wear relating to crime scenes and criminal investigations

Forensic pathology is a field in which the principles f medicine and pathology are applied to determine a cause of death or injury in the context of a legal inquiry.

Forensic podiatry is an application of the study of feet footprint or footwear and their traces to analyze scene of crime and to establish personal identity in forensic examinations.

Forensic psychiatry is a specialized branch of psychiatry as applied to and based on scientific criminology.

Forensic psychology is the study of the mind of an individual, using forensic methods. Usually it determines the circumstances behind a criminal's behavior.

Forensic seismology is the study of techniques to distinguish the seismic signals generated by underground nuclear explosions from those generated by earthquakes.

Forensic serology is the study of the body fluids.[43]

Forensic toxicology is the study of the effect of drugs and poisons on/in the human body.

Forensic video analysis is the scientific examination, comparison and evaluation of video in legal matters.

Mobile device forensics is the scientific examination and evaluation of evidence found in mobile phones, e.g. Call History and Deleted SMS, and includes SIM Card Forensics

Trace evidence analysis is the analysis and comparison of trace evidence including glass, paint, fibres and hair.

Wildlife Forensic Science applies a range of scientific disciplines to legal cases involving non-human biological evidence, to solve crimes such as poaching, animal abuse, and trade in endangered species.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 42

Blood Spatter Analysis is the scientific examination of blood spatter patterns found at a crime scene to reconstruct the events of the crime.

Source: http://en.wikipedia.org/wiki/Forensic_science

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 43

APPENDIX B

GLOSSARY OF TERMS

Acquisition: The process of creating a duplicate copy of digital media for the purposes of examining it. Agent: A person who serves the interests of an agency that has jurisdiction over criminal or civil matters involving digital evidence. In many jurisdictions and circumstances, the agent will be a law-enforcement officer. However, an agent may also be a non-sworn individual of suitable qualification who is serving the interests of the parties involved in a criminal or civil investigation or dispute. Buddy list: A collection of screen names, usually compiled by a user for instant messaging” on his or her personal computer or cellular telephone. Duplicate digital evidence: An accurate digital reproduction of all data objects contained on the original physical item. Electronic device: A device that operates on principles governing the behavior of electrons. Electronic evidence: Information and data of investigative value that are stored in or transmitted by an electronic device. Copy (v.): Accurately reproduce information contained on an original physical item, independent of the electronic storage device (e.g., logical file copy). Maintains contents, but attributes may change during the reproduction. Deleted files are not copied. Only the files which the operating system (OS) can recognize are copied. Encryption: Any procedure used in cryptography to convert plain text into cipher-text so as to prevent anyone but the intended recipient from reading the data. First responder: The initial responding law enforcement officer(s) and/or other public safety official(s) arriving at the scene. Digital evidence: Information stored or transmitted in binary form that may be relied on in court. Digital forensics: A branch of the forensic sciences related to the investigation of digital

devices and media. Within the field a number of "normal" forensics words are re-purposed,

and new specialist terms have evolved.

Digital media: Used within the fields to refer to the physical medium (such as a hard drive)

or data storage device.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 44

Documentation: Written notes, audio­tapes, videotapes, disc, printed forms, sketches, and photographs that form a detailed record of the scene, evidence recovered, and actions taken during the search of the crime scene. Duplicate: An accurate digital reproduction of all data contained on a digital storage device (e.g., hard drive, CD-ROM, flash memory, floppy disk, Zip®, Jaz®). Maintains contents and attributes (e.g., bit stream, bit copy, and sector dump). EA2011: Nigeria‟s Evidence Act, 2011. e-discovery or eDiscovery: A common acronym for electronic discovery.

Exhibit: Digital media seized for investigation is usually referred to as an "exhibit".

Hashing: Within the field, "hashing" refers to the use of hash functions (e.g. SHA1,

SHA256 or MD5) to verify that an "image" is identical to the source media.

High-technology crime: Criminal offenses that involve computer technology, including computer crimes, computer-related crimes, and Internet-related crimes. Image: A duplicate copy of some digital media created as part of the forensic process.

Imaging: Synonym of "acquisition"

ISP: Internet service provider. ISPs are organizations that provide subscribers with access to the Internet. Small ISPs provide service via modem and ISDN (Integrated Services Digital Network), while the larger ones also offer private line hookups (e.g., T1, fractional T1). Live Forensics or Live Analysis: Analysis of a piece of digital media from within itself;

often used to acquire data from RAM where this would be lost upon shutting down the

device.

Metadata: Data about data. Network: A group of computers connected to one another to share information and resources. Server: A computer that provides some service for other computers that are connected to it via a network. Slack Space: The unused space at the end of a file in a file system that uses fixed size

clusters (so if the file is smaller than the fixed block size then the unused space is simply

left). Often contains deleted information from previous uses of the block.

Sniffer: Software that monitors network packets and can be used to intercept data including passwords, credit card numbers, etc.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 45

Steganography: The word steganography comes from the Greek name “steganos”

(hidden or secret) and “graphy” (writing or drawing) and literally means hidden writing.

Steganography uses techniques to communicate information in a way that is hidden.

Trier of fact: The person or persons who decide the facts in legal cases. In a jury trial the jury is the trier of fact. When there is no jury (sometimes called a “bench trial” or “trial to the court”), the judge is the trier of fact. With or without a jury, it is the judge who determines the law in a case. Unallocated Space: Clusters of a media partition not in use for storing any active files.

They may contain pieces of files that were deleted from the file partition but not removed

from the physical disk

URL: Universal Resource Locator. Verification: A term used to refer to the hashing of both source media and acquired image

to verify the accuracy of the copy.

Write Blocker: The common name used for a forensic disk controller, hardware used to

access digital media in a read only fashion.

Standards for Digital and Computer Forensics in Nigeria – Draft v0.2 46

SELECTED REFERENCES

Association of Chief Police Officers‟ (ACPO), Good Practice Guide for Computer-Based

Electronic Evidence. (Official release version). (www.acpo.police.uk)

Federal Republic of Nigeria. Evidence Act, 2011 (HB. 214).

Greg Dominguez.

Equipping A Forensic Lab. Techno Forensics 2007 National Institute for Standards and Technology (NIST).

Guide to Integrating Forensic Techniques into Incident Response. Special Publication 800-86.

Olayiwola, Peter O.

“Digital Forensics in the Investigation and Prosecution of Criminal Cases,” A Paper presented at the Commonwealth National Workshop for Prosecutors and Investigators on Money Laundering, Terrorism and the Financing and Recovery of Proceeds of Crime, at Sheraton Hotel, Abuja, Nigeria, 15th-18th January, 2013.

Olayiwola, Peter O.

“Evidence Collection and Crime Scene Documentation.” A Paper presented at the First West African Digital & Computer Forensics Conference (Theme: Digital Forensics: Antidote to High-Tech Crimes in West Africa) held at the International Conference Centre, Abuja, Nigeria, 18th April 2012.

U.S. Department of Justice, Office of Justice Programs, National Institute of Justice,

Forensic Laboratories: Handbook for Facility Planning, Design, Construction, and

Moving.

U.S. Department of Justice, Office of Justice Programs, National Institute of Justice,

Electronic Crime Scene Investigation: A Guide for First Responders.

July, 2001.