28.06.2016 Views

Forensic Examination of Digital Evidence

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SPECIAL REPORT / APR. 04<br />

examiner so they can better understand the investigation and provide a better examination).<br />

You can provide an already completed document or a pending report to cover<br />

this step.<br />

6. ***ITEMS TO BE ANALYZED: (NOTE: IF NOT EVIDENCE, STATE THAT FACT)<br />

NOTE: It is only required to list the items to be analyzed, not to answer all the questions.<br />

This must be a complete list <strong>of</strong> all items that need analysis. An evidence listing must<br />

completely identify all items. The following is just a sample <strong>of</strong> how to list evidence:<br />

Tag #’s<br />

Tag # XX<br />

Tag # XX<br />

Tag # XX<br />

Description<br />

Western <strong>Digital</strong> Caviar 31600 Hard Drive, Serial #: WT2891586134<br />

taken from AST Computer Serial # 186AUZ022348.<br />

Fujitsu M1636TAU Hard Drive, Serial #: 08613105, Size: 1226MB.<br />

Gateway 2000, 386/33 MHz, Serial #: 302557386-330XC. Computer<br />

System with a Western <strong>Digital</strong> 125 MB internal hard drive, a Seagate<br />

107 MB internal hard drive, internal 3.5-inch high-density floppy drive,<br />

one internal 5.25-inch floppy drive, internal sound card.<br />

Gateway 2000 101 Keyboard, Serial #: 9208572226f7.<br />

Computer Mouse Device, Serial #: 850753.<br />

Tag # XX<br />

198 each 3.5-inch floppy diskettes<br />

1 each 5.25-inch floppy diskettes<br />

7. ***SUPPORT REQUESTED: (Specific and detailed request. Do not just cut and paste<br />

what is listed below. These are just some sample statements. If you do not know what<br />

one <strong>of</strong> these items is, then don’t include it. Also, don’t just say “give me everything”<br />

and expect DCFL to take it from there. List items you need the DCFL to find and how<br />

you need it produced and provided to you.)<br />

e.g.<br />

Computer Media<br />

Extract all system logs, graphic files, text, documents, etc.<br />

Examine file system for modification to operating system s<strong>of</strong>tware or<br />

configuration.<br />

Examine file system for back doors, check for setuid and setgid files.<br />

Examine file system for any sign <strong>of</strong> a sniffer program.<br />

Extract data from this 8-mm tape and convert to readable format, cut to CD.<br />

Backup hard drives and place backup on a CD, tape, or other format.<br />

Analyze for deleted files and restore deleted files, cut findings to CD.<br />

If possible, correlate sexually explicit images to the Internet history file.<br />

Extract sexually explicit images from logical, slack space, free space, cut to CD.<br />

Extract all pertinent text files <strong>of</strong> a sexual nature.<br />

Provide an analysis report and cut all findings to CD (specify).<br />

Conduct string search on physical level <strong>of</strong> media (provide list <strong>of</strong> words).<br />

54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!