DEV Community

BEIDI DINA SAMUEL
BEIDI DINA SAMUEL

Posted on

Computer Crime Investigation

Introduction

Computer crime investigation is a branch of digital forensics that aims to detect, analyze, preserve, and present digital evidence related to illegal activities carried out via or against computer systems.

Objectives of Digital Investigation

  • Identify sources of digital evidence.
  • Preserve the integrity of collected data.
  • Reconstruct events that led to an attack.
  • Identify the perpetrators or those responsible for malicious actions.
  • Provide admissible evidence in a court of law.

Key Steps in the Investigation

  1. Identification
  2. Detection of an incident or crime (e.g., intrusion, fraud, data theft).
  3. Defining the digital crime scene.
  4. Preservation
  5. Backing up systems, drives, and event logs.
  6. Using bit-by-bit imaging tools to avoid altering evidence.
  7. Collection
  8. Extracting files, emails, logs, metadata, etc.
  9. Maintaining the chain of custody.
  10. Analysis
  11. Examining data using specialized tools (e.g., EnCase, Autopsy, Volatility).
  12. Reconstructing activities: logins, transfers, deletions, etc.
  13. Presentation
  14. Writing a clear and chronological technical report.
  15. Legal use of evidence: expert testimony, submitting evidence in court.

Types of Computer Crimes Investigated

Type of Crime Example
Intrusion Unauthorized access to a server
Fraud Phishing, bank fraud
Espionage Theft of confidential data
Sabotage Data deletion or denial of service
Hacking Deployment of malicious software (malware)

Tools and Methods Used

Disk Analysis: FTK Imager, Autopsy

RAM Analysis: Volatility Framework

Network Analysis: Wireshark, tcpdump

Timeline and Correlation: Plaso, SleuthKit

Legal Aspects

  • Comply with local laws (e.g., GDPR, cybersecurity laws, Budapest Convention).
  • Digital evidence must be authentic, intact, complete, and explainable.

Best Practices

  • Always work on a copy of the original data.
  • Document every action (time, tool used, responsible person).
  • Use certified tools recognized by the forensic community.

Top comments (0)