Forensic Examination of Digital Evidence
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
SPECIAL REPORT / APR. 04<br />
examiner so they can better understand the investigation and provide a better examination).<br />
You can provide an already completed document or a pending report to cover<br />
this step.<br />
6. ***ITEMS TO BE ANALYZED: (NOTE: IF NOT EVIDENCE, STATE THAT FACT)<br />
NOTE: It is only required to list the items to be analyzed, not to answer all the questions.<br />
This must be a complete list <strong>of</strong> all items that need analysis. An evidence listing must<br />
completely identify all items. The following is just a sample <strong>of</strong> how to list evidence:<br />
Tag #’s<br />
Tag # XX<br />
Tag # XX<br />
Tag # XX<br />
Description<br />
Western <strong>Digital</strong> Caviar 31600 Hard Drive, Serial #: WT2891586134<br />
taken from AST Computer Serial # 186AUZ022348.<br />
Fujitsu M1636TAU Hard Drive, Serial #: 08613105, Size: 1226MB.<br />
Gateway 2000, 386/33 MHz, Serial #: 302557386-330XC. Computer<br />
System with a Western <strong>Digital</strong> 125 MB internal hard drive, a Seagate<br />
107 MB internal hard drive, internal 3.5-inch high-density floppy drive,<br />
one internal 5.25-inch floppy drive, internal sound card.<br />
Gateway 2000 101 Keyboard, Serial #: 9208572226f7.<br />
Computer Mouse Device, Serial #: 850753.<br />
Tag # XX<br />
198 each 3.5-inch floppy diskettes<br />
1 each 5.25-inch floppy diskettes<br />
7. ***SUPPORT REQUESTED: (Specific and detailed request. Do not just cut and paste<br />
what is listed below. These are just some sample statements. If you do not know what<br />
one <strong>of</strong> these items is, then don’t include it. Also, don’t just say “give me everything”<br />
and expect DCFL to take it from there. List items you need the DCFL to find and how<br />
you need it produced and provided to you.)<br />
e.g.<br />
Computer Media<br />
Extract all system logs, graphic files, text, documents, etc.<br />
Examine file system for modification to operating system s<strong>of</strong>tware or<br />
configuration.<br />
Examine file system for back doors, check for setuid and setgid files.<br />
Examine file system for any sign <strong>of</strong> a sniffer program.<br />
Extract data from this 8-mm tape and convert to readable format, cut to CD.<br />
Backup hard drives and place backup on a CD, tape, or other format.<br />
Analyze for deleted files and restore deleted files, cut findings to CD.<br />
If possible, correlate sexually explicit images to the Internet history file.<br />
Extract sexually explicit images from logical, slack space, free space, cut to CD.<br />
Extract all pertinent text files <strong>of</strong> a sexual nature.<br />
Provide an analysis report and cut all findings to CD (specify).<br />
Conduct string search on physical level <strong>of</strong> media (provide list <strong>of</strong> words).<br />
54