46
7/31/2019 Report Prepration A http://slidepdf.com/reader/full/report-prepration-a 1/46 Chapter 7: Report Preparation 1

Report Prepration A

Embed Size (px)

Citation preview

Page 1: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 1/46

Chapter 7: Report Preparation

1

Page 2: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 2/46

Computer Forensic Analysis Reports

• One of the forensic analyst’s primary functions is the dissemination of the forensic

process to the intended audience. To do their jobs successfully, they must write

forensic reports that are both technically accurate and easy to read.

• A great investigation can be rendered largely ineffective if the resulting report is

poor. In fact, a report that is disorganized and poorly written may actually hinder

their case.

• Many find forensic technical writing a difficult job, particularly in making reports

readable for the intended audience.

2

Page 3: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 3/46

Report Preparation

Forensic information has limited value if it is not collected and reported in a usable form andpresented to those who need to apply the information.

Therefore, a big goal of the process is a standard way to document why the computer system wasreviewed, how the computer data was reviewed, and what conclusions were arrived at. Computerforensic technical report writing requires a documented process to ensure a repeatable standard ismet by the forensic analyst or the organization he is representing.

The computer forensic report should achieve the following goals:

• Accurately describe the details of an incident

• Be understandable to decision-makers

• Be able to withstand a barrage of legal scrutiny

• Be unambiguous and not open to misinterpretation

• Be easily referenced

• Contain all information required to explain your conclusions

• Offer valid conclusions, opinions, or recommendations when needed

• Be created in a timely manner

Notes:-

A general methodology based on the five major stages of technical report

preparation. Within these general stages, we will add the specific details orguidelines as they relate to the field of computer forensics.

3

Page 4: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 4/46

Continued….

The five major stages of technical report preparation are :

1. Gathering the data

2. Analyzing the results

3. Outlining and Organizing the report

4. Writing the rough draft

5. Revising the rough draft

Page 5: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 5/46

Gathering the data

• Technical report preparation begins with proper planning. An orderly investigation is aprerequisite for an orderly technical report.

• A common thread in successful technical report writing is the ability to foresee thegeneral content of the report before the forensic process begins. On way to do this isto keep the future report in mind during the course of the forensic process. Maintainorderly records as the data are gathered. Document investigative steps immediately.

• Maintaining orderly records and documentation requires discipline and organization,but it is essential to successful forensic technical writing.

Page 6: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 6/46

Continued….• Do not use shortcuts or shorthand, since such vague notations can result in a

failure to comprehend the notes by yourself or others.

• Writing clearly and concisely at the moment of evidence discovery promotesaccuracy and saves time later.

• Discipline yourself to follow this philosophy: Document as you go! Don’t forget – during this phase consider how the forensic data should be presented in thetechnical report and record the results in this manner. Thus, any need for additionalforensic data will be revealed before the forensic program is completed.

Page 7: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 7/46

Analyzing the results

• This phase is probably the most difficult because it requires considerable thoughtand effort to decide what you want to tell your audience.

• The beginning of this stage overlaps the gathering data stage, since you want toknow what goals of your examination are before you begin your analysis (dataanalysis should begin as the data are collected). This will foster a focused report,what is what your audience wants.

• During the analysis and data review, conclusions should be drawn. This is the mostimportant step in the technical report preparation because the conclusions are thereason for the report and the basis for the technical report preparation.

• However, a caveat must be mentioned at this point: be very careful listing theconclusions as the data are being gathered.

• Limited information gathered during the “Gathering the Data” phase may lead theforensic analyst to incorrect assumptions.

Page 8: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 8/46

Continued….• As data are gathered, the conclusions may (and probably will) change. The risk of

incorrect conclusions is that it creates the potential for “reasonable” doubt in thecourtroom. Therefore, it is best to document the conclusions in this phase(Analyzing the Results), since most of the data has already been gathered. Oncethe conclusions are drawn, it is best to list them in descending order of importance.

• Let us digress a moment and discuss an important concept of forensic reporting. Asdiscussed above, conclusions drawn is the most important step in the report. Areport that offers a conclusion (an opinion) is referred to as an expert report. Theexpert opinion is governed by the Federal Rules of Evidence (FRE) under rule FRE705. A report that offers no opinion does not meet the legal definition of an expertreport.

Page 9: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 9/46

Continued….

• For example, law enforcement examiners are generally trained to create forensicreports that offer no opinions; they merely state the facts. Thus, if a case goes totrial, a forensic analyst can either be called a technical witness or an expert witness.As a technical witness, the forensic analyst is only providing the facts as found inthe forensic investigation. The forensic analyst presents the evidence and explainswhat it is and how it was obtained. The forensic analyst does not offer conclusions,only the facts.

• However, as an expert witness, the forensic analyst has opinions and conclusionsabout what was observed. The opinions and conclusions are based on experienceand the facts found during the forensic investigation and examination of the dataobtained. Corporate and private sector forensic analyst are usually requested to

offer an opinion in court. In most cases, the forensic analyst’s professional opinionabout a case is the most useful item to the client. Selection of the data to be used inthe forensic report is another important part of this step.

Page 10: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 10/46

Continued….

• Developing a consistent way of referencing each item throughout the report iscritical. A good suggestion is to create a unique identifier or reference tag for eachperson, place, and thing referred to in the forensic report. The label will identify theitem for the remainder of the forensic report. For example, using descriptive labelssuch as MARK LAPTOP or IIS WEB SERVER, instead of tag1 (for MARK LAPTOP)or tag2 (IIS WEB SERVER), helps to eliminate confusion.

• Forensic analysis usually results in illustrations for the forensic report. Figures andtables organization should be carefully considered since illustrations are one of thebest ways of emphasizing and supporting conclusions. After the illustrations are

prepared, it’s important to write the significant points about each.• It is helpful to consider the following questions: what is the figure supposed to

show? How were the data obtained? Are there any qualifications to the figure?

Page 11: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 11/46

Continued….• These questions are important and useful when the forensic report writing begins.

Using attachments and appendices are important to maintaining the flow of theforensic report. It is important not to interrupt the forensic report with pages andpages of source code right in the middle of a conclusion. A good rule of thumb isthat any information, files, and code that are over a page should be included asappendices or attachments. Every file that contributes to the conclusion should beincluded as an appendix to the forensic report. This allows the report to stand aloneso it can be referenced for any questions that may arise in a judicial oradministrative process.

• Finally, create and record the MD5 hashes of the evidence as well as record andinclude the metadata for every file cited in the forensic report. By recording the MD5values, the audience can feel confident that the forensic analyst is handling the datain the appropriate manner. The same applies to the metadata. Those reading thereport appreciate the details included, and the forensic analyst will likely need thedetails to remove any ambiguity about the files during testimony.

Page 12: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 12/46

Outlining and Organizing the report

• Outlining is a necessary preliminary step to forensic technical writing. Without theoutline, most inexperienced forensic analyst write reports that are confusing anddifficult to follow. This stage is a natural progression from the forensic analysisperformed in the previous stage. In the analysis stage, concentration was on whatresults should be presented in the forensic report. In the outlining stage, is directedon how the results should be presented.

• Organizing the report is also critically important. A good suggestion for the forensicreport is to start at the high level, and have the complexity of the forensic reportincrease. This way, the high-level executives need to read only the first page to get

a summary of the conclusions. They usually are not interested in the low-leveldetails that support the conclusion.

Page 13: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 13/46

Continued….

• It is recommended that the forensic report writer follow a standardized reporttemplate. This makes the forensic technical report writing scalable, establishes arepeatable standard, and saves time. A template format will be presented and abrief discussion of each section will. This is only a template, and can be modified asdesired by the forensic report writer. Each forensic report produced by the forensicanalyst could include any of the following sections:

• Executive Summary

• Objectives

• Computer Evidence Analyzed

• Relevant Findings

• Supporting Details

• Investigative Leads

• Additional Subsections and Recommendations

Page 14: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 14/46

Executive Summary• This section is the background information that resulted in the investigation. This is

the area usually read by senior management. It is recommended that this sectiondo the following:

• Include who authorized the forensic investigation

• Describe why a forensic examination of computer media was necessary

• List what significant findings were found

• Include a signature block for the examiner(s) who performed the investigation

• Author, investigators, examiners

• Why was the investigation undertaken?

• List significant findings.

• Include signatures of examiners

14

Page 15: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 15/46

Continued….

• It is important to include the full, proper names of all persons involved in the case,their employer and job titles, and the dates of initial communications. We include ahigh-level view of the significant findings as part of the “Executive Summary”section. Here are some examples of significant findings:

• Three days prior to leaving employment, Employee X emailed nine companyconfidential documents to Company B, a competitor.

• Employee X did not have authorized access to these documents, and passwordcracking tools, along with “cracked” executive user passwords, were found on hiscomputer.

• Employee X used a network monitor program to intercept email communicationsbetween corporate executives.

• A thorough forensic examination of the contents of the KELLY LAPTOP did notreveal any evidence that the user of the system downloaded or intended todownload pornographic images.

15

Page 16: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 16/46

Goals/Objectives of the Analysis

• This section outlines all tasks accomplished in the investigation.

• The task list should include the tasks undertaken by the forensic examiner, themethod by which the examiner undertook each task, and the status of each task atthe completion of the report.

Page 17: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 17/46

Computer Evidence Analyzed

• All evidence collected and interpreted are included.

• A good suggestion for communicating this information is using a table to illustratethe evidence collected.

• It is also a good suggestion to not create a formal checklist of the procedures orinclude a checklist into the final forensic report.

• Checklists are easily challenged in court by the opposing counsel.

Page 18: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 18/46

Case Questionnaires with Relevant

Findings• This is the conclusions and opinions of the forensic analyst.

• It answers the question, “What relevant items were found during the investigation?”They should be listed in order of importance, or relevance to the case.

• Organization, in a logical way, is a key component.

• The “Relevant Findings” section provides a summary of the findings of probativevalue. It answers the question, “What relevant items were found during theinvestigation?”

• The relevant findings should be listed in order of importance, or relevance to thecase.

Page 19: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 19/46

Continued….

• It provides the quick reference that high-level decision-makers need and make useof when describing the results of the investigation.

• The fine details supporting these findings should be written in a different section(“Supporting Details”). This conforms to the “macro to micro” report organizationrecommended earlier.

Page 20: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 20/46

Referring to annexing of Supporting

Details/Documents• This section supports the “Relevant Findings” section by providing an in-depth lookand analysis of the relevant findings. It outlines how the forensic analyst arrived attheir conclusions in the “Relevant Findings” section.

• This section should include tables listing the full pathnames of important files, thenumber of files reviewed, string-search results, emails or URLs reviewed, and anyother relevant information

• Use the “Supporting Details” section to outline all the tasks we undertook to meetthe objectives.

• The “Supporting Details” section is the first section where we go into technicaldepth. We are strong believers that tables, charts, and illustrations convey muchmore than written text, so we include many of these in our forensic reports.

• Many subsections to tailor the organization of the report to meet the objectivesoutlined. Traditionally, this is the longest section in our reports.

Page 21: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 21/46

Continued….

• Usually begin the “Supporting Details” section by providing background detailsabout the actual media analyzed.

• It is critical to report the number of files reviewed and the size of the hard drive inlanguage a human can understand.

Page 22: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 22/46

Investigative Leads

• Investigations have to end somewhere usually because the forensic analyst isunder time-constraints.

• However, there are tasks the forensic analyst could have completed had theinvestigator had more time. If more tasks could have been completed, morecompelling evidence could have been collected.

• This must be documented, and this section is often important for law enforcementthat may continue with the investigation.

Page 23: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 23/46

Additional Subsections and Recommendations

• This depends on the needs of the intended audience. For example, the audiencemay want to know the exact attack that was performed, which may requireanalyzing a binary.

• So, a section “Binary Analysis” may be appropriate to the investigation. Alsocommon is a breakdown subsection of Internet activity and Web browsing history.

• The recommendation section is to help the intended audience or client to be betterprepared and trained for the next incident.

• This usually includes countermeasures that can be immediately implemented tostrengthen the client’s security posture.

Page 24: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 24/46

Writing the Rough Draft• With a logically organized outline such as the template for computer forensic

reports, writing the rough draft will be much easier. However, due to the nature ofthe technical materials included in forensic reports, several versions are performed;do not expect to write the final version in the first attempt.

• Each version will be an improvement over the other. This final version is considereda “rough” draft because it still must go through a series of technical reviews.

• A necessary suggestion is to have your co-workers read the forensic report.Remember, the forensic report must be readable by technical and non-technicalpersonnel, and may also be used in court. Have non-technical personnel read theforensic report to determine if it is comprehensible to them.

• The non-technical personnel will include legal counsel, Human Resources

personnel and business managers. It is important to take into consideration thetechnical capability and knowledge of the intended audience. Writing style becomesimportant. Therefore, a glossary of terms may be added to help the non-technicalpersonnel.

Page 25: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 25/46

Revising the Rough Draft

• Finally, we’ve made it to the last stage! However, this is an important step, and theone most often overlooked by inexperienced technical forensic writers. In this step,the “appearance” (readability) is improved without doing major modifications to thestructure of the report.

• Successful forensic technical writers may use a variety of methods to review andrevise the report. One of the best methods involves three separate reviews of theforensic report (From NASA’s Guide –See References):

1. The first review is of the material in the forensic report. Ask these questions: Are theconclusions valid? Is sufficient information given to support the conclusions? Isenough information given to explain the results? Have all irrelevant ideas beendeleted? Are the illustrations pertinent and necessary?

Page 26: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 26/46

Continued…..2. The second review is of the mechanics and organization of the report. Ask these

questions: Are the subject and purpose clearly stated? Does the report flowsmoothly from beginning to end (or topic to topic)? Are the relations betweentopics clear? Is each illustration clear and properly labeled? Are all requiredparts of the report included?

3. The third review is of spelling and grammar, particularly punctuation andsentence structure. Ask these questions: Is each sentence written effectively?Are the sentence varied in length and complexity to avoid monotony? Are thewords specific and not vague? Have unnecessary words been deleted from thereport?

Page 27: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 27/46

REPORT WRITING GUIDELINES

Through our experience of writing a vast number of forensic reports, using thesereports to refresh our recollections during criminal trials, and training numerousemployees new to the field of computer forensics, we have developed some reportwriting guidelines.

Page 28: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 28/46

Continued…..

These embody general principals that should be followed to ensure yourorganization can exceed expectations with your investigative reports.

• Document Investigative Steps Immediately and Clearly

• Know the Goals of the Analysis

• Organizing the Report

• Follow a Template

• Use Consistent Identifiers

• Use Attachments and Appendices

• Have Co-workers Read the Reports• Use MD5 Hashes

• Include Metadata

Page 29: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 29/46

Document Investigative Steps Immediately andClearly

• Documenting investigative steps immediately requires discipline and organization,but it is essential to successful report writing.

• Write everything down in a fashion that is understandable to you and others; do notuse shorthand or shortcuts.

• Such vague notations, incomplete scribbling, or unclear documentation willeventually lead to redundant efforts, forced translation of notes, confirmation ofnotes, and a failure to comprehend notes by yourself or others.

• Writing something clearly and concisely at the moment you discover evidence(information of probative value) saves time and promotes accuracy.

• It also ensures that the details of the investigation can be communicated moreclearly to others at any moment, which is critical should new personnel becomeinvolved or assigned to lead the investigation.

Page 30: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 30/46

Know the Goals of Your Analysis

• Know what the goals of your examination are before you begin your analysis. Thisfosters a focused report, which is what a client/consumer wants.

• For law enforcement examiners, every crime has elements of proof. The reportshould unearth evidence that confirms or dispels these elements.

• The bottom line is that the more focused your reports are, the more effective theyare.

Page 31: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 31/46

Continued….

While hashing out the objectives of the forensic examination, you should alsoaddress issues such as the following:

• Does the client/consumer of the report want a single forensics report for each pieceof media examined or a report of the investigation that encompasses all mediaanalyzed?

• How does the client/consumer wish you to communicate your findings: verbally orin written form?

• How often does the client/consumer want a status report of your forensicexamination?

• Should the interim status reports be verbal or written?

• Which examiner should sign as the provider or author of the forensic report?

Page 32: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 32/46

Organizing the Reports

• Write “macro to micro.” Organize your forensic report to start at the high level, andhave the complexity of the report increase as the audience continues to read it.

• This way, the high-level executives need to read only the first page or so to get thegist of your conclusions, and they should not need to understand the low-leveldetails that support the claims.

• Include a table of contents for the longer reports.

• The table of contents enforces a logical approach to documenting your findings, andit helps the reader understand what the report accomplishes.

Page 33: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 33/46

Page 34: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 34/46

Use Consistent Identifiers

• In a report, referring to an item in different ways—such as referring to the samecomputer as a system, PC, box, web server, victim system, and so on—can create confusion.

• Developing a consistent, unwavering way to reference each item throughout thereport is critical to eliminate such ambiguity or confusion.

• It is a good idea to create a unique identifier or reference tag for each person,place, and thing (nouns) referred to repeatedly in your report.

• That label will identify the corresponding item for the remainder of the report.

34

Page 35: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 35/46

Page 36: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 36/46

Have Co-workers Read the Reports

• Employ other co-workers to read your forensic reports.

• This helps develop reports that are comprehensible to nontechnical personnel whohave an impact on your incident response strategy and resolution (such as HumanResources personnel, legal counsel, and business unit managers). Also, rememberto write your reports at the appropriate level of the consumer of your report. Takeinto consideration the technical capability and knowledge of your audience.

• For instance, if you are providing a computer forensics report to a nontechnicallawyer, it is a good idea to provide a glossary of terms tailored specifically for thatreport.

Page 37: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 37/46

Use MD5 Hashes

• Create and record the MD5 hashes of your evidence, whether it is an entire harddrive or specific files. Performing MD5 hashes for all evidence provides support tothe claim that you are diligent and attentive to the special requirements of forensicexamination. If your evidence is handled properly and remains tamper-proof, theMD5 hashes calculated for a given set of data will always remain the same. Byrecording these MD5 values, your audience becomes confident that you arehandling the data in the appropriate manner.

Page 38: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 38/46

Include Metadata

• Record and include the metadata for every file or file fragment cited in your report.

• This metadata includes the time/date stamps, full path of the file (or physicallocation of the file fragments), the file size, and the file’s MD5

• This identifying data will help to eliminate confusion and also to increase consumerconfidence.

• Those that read your report appreciate that you include all the details, and you willlikely need the details to remove any ambiguity about which files you referenceduring testimony.

Page 39: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 39/46

Conclusion

• The forensic technical report is written to communicate the results of the forensicanalyst’s forensic examination. A formal report presents evidence as testimony incourt, at an administrative hearing, or as an affidavit. Besides presenting facts,forensic reports can communicate expert opinion. Writing the forensic technicalreport can be a daunting task.

• Remember, a great investigation can be rendered largely ineffective if the resultingdocumentation/report is poor. In fact, a forensic report that is disorganized andpoorly written may actually hinder the advancement of the forensic analyst’s case.

Page 40: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 40/46

Fact Witness• If scientific, technical, or other specialized knowledge will assist the trier of fact to

understand the evidence or to determine a fact in issue, a witness qualified as anexpert by knowledge, skill, experience, training, or education, may testify thereto inthe form of an opinion or otherwise, if

(1) the testimony is based upon sufficient facts or data,

(2) the testimony is the product of reliable principles and methods, and

(3) the witness has applied the principles and

Methods reliably to the facts of the case.

Page 41: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 41/46

Continued….

• If the computer examiner is testifying about locating and/or extracting files, howdoes one describe his area of "specialized knowledge?" Does the examiner reallyknow—or even have to know—the intricacies of a particular program loaded on thesuspect's computer? Does the examiner have to display an in-depth knowledge ofthe logarithm (MD-5 (Message Digest) hash value)) used to verify that an exact bit-by-bit copy of a drive was successfully executed? As to the latter, he or she mightonly be able to say that the logarithm for the MD-5 hash value is widely relied uponby examiners and has been rigorously tested to assure that it is completely reliable.

Page 42: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 42/46

Page 43: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 43/46

Continued….III. Types of testimony—examples

A. The file was found in a directory

• Consider whether the computer examiner is really expressing an opinion or merelystating a fact—the file was located on the hard drive in the pathc:\mydocuments\dirtypix .

• The examiner's training in the use of programs to more easily locate certain types offiles (EnCase to find .jpg files) does not mean that his or her testimony has toinvoke that training, or even refer to programs used to more quickly locate certaintypes of non deleted files.

• The fact is that the file was located in a given location.

Page 44: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 44/46

Continued….

• At trial, the examiner would state that on the computer at c:\mydocuments\dirtypix ,there is the file called " lolitta2 ." This is not to say that the witness might never haveto explain the use of EnCase or that a report listing multiple jpg files (sought to beintroduced) is a product of EnCase.

• The point is that in a given case, if a single file is the evidence relevant to the trialand it resided in a particular folder, going into EnCase's capabilities is a waste oftime and might only serve the defense as an opportunity to confuse or divert theevidentiary importance of the file.

Page 45: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 45/46

Continued….

B. The file was first saved, last modified, created

• If the testimony involves critical metadata, then the examiner's testimony takes on amuch more significant role. His or her specialized knowledge might include anunderstanding and explanation of an operating system's (Windows)

• logs and/or how a particular program (WordPerfect) maintains information aboutparticular files.

Page 46: Report Prepration A

7/31/2019 Report Prepration A

http://slidepdf.com/reader/full/report-prepration-a 46/46

Continued….

C. The remnant data was recovered from virtual memory

• The examiner must be able to explain what virtual memory is, its nature, and how itstores information for a limited purpose and for a limited time (depending on thesuspect's usage).

• The specialized knowledge deals with explaining the types of memory on thecomputer and how data can be recovered, even if not saved.