Hello, everyone, and welcome to today's session on digital forensics: best practices from data acquisition to analysis. I'm Shilpa Goswami, and I'll be your host for the day. Before we get started, we would like to go over a few house rules for our attendees. The session will be in listen-only mode and will last for an hour, of which the last 15 minutes will be dedicated to Q&A. If you have any questions during the webinar, for our organizers or speakers, please use the Q&A window. Also, if you face any audio or video challenges, please check your internet connection or you may log out and log in again. An important announcement for our audience: we have initiated CPE credit certificates for our participants. To qualify for one, attendees are required to attend the entire webinar and then send an email to cyber talks at eccouncil.org, after which our team will issue the CPE certificate. Also, we would like to inform our audience about the special handouts. Take a screenshot of the running webinar and post it on your social media, LinkedIn or Twitter, tagging EC Council and Cyber Talks. We will share free handouts with the first 15 attendees. As a commitment to closing the cybersecurity workforce gap by creating multi-domain cyber technicians, EC Council pledges $3,500,000 towards ECT Education and Certification Scholarships to certify approximately 10,000 cyber professionals ready to contribute to the industry. Did you know that you can be part of the lucrative cybersecurity industry? Even top companies like Google, Microsoft, Amazon, IBM, Facebook, and Dell all hire cybersecurity professionals. The cybersecurity industry has a 0% unemployment rate. The average salary for an entry-level cybersecurity job is about $100,000 per year in the United States. Furthermore, you don't need to know coding, and you can learn from home, and you get a scholarship to kick-start your career. Apply now. EC Council is pledging a $3,500,000 CCT scholarship for cybersecurity career starters. Scan the QR code on the screen to apply for the scholarship. Fill out the form. Now, about our speaker Dr. Luis. Dr. Luis Noguerol is the Information Systems Security Officer for the U.S. Department of Commerce, NOAA, where he oversees the cybersecurity operation for six states in the Southeast Region. Dr. Luis is also the President and CEO of the Advanced Division of Informatics and Technology, Technology INC, a company that focuses on data recovery, digital forensics, and penetration testing. He is a world-renowned expert in data recovery, digital forensics, and penetration testing. He holds multiple globally recognized information technology and cybersecurity certifications and accreditations and is the recipient of multiple awards in technology, cybersecurity, and mathematics. He currently serves pro bono as an editorial board member and reviewer for the American Journal of Information Science and Technology, and is a member of the prestigious high-edging professor program for undergraduate and graduate programs at multiple universities in the U.S. and as a reviewer for the doctoral program at the University of Karachi in Pakistan. He is the author of multiple cybersecurity publications and articles, including Cybersecurity Issues in Blockchain: Challenges and Possible Solutions. He is also one of the co-authors and reviewers of the worldwide acclaimed book, Intrusion Detection Guide. Prior to obtaining his doctorate degree in Information Systems and Technologies from the University of Phoenix, Dr. Luis earned a Bachelor's in Science and Radio Technical and Electronic Engineering, a Bachelor of Science in Telecommunications and Networking, and a Master of Science in Mathematics and Computer Science. Without any further delay, I will hand over the session to you, Dr. Luis. Thank you very much. Thanks. Okay. Good morning, everybody. Good afternoon, and good night, depending on the specific area in which you reside. We are going to have an interesting conversation today about digital forensic best practices from data acquisition to analysis. This is the title of the presentation or subject, and I’m more than happy to be here with you all and share some of my expertise. So, let's go ahead and start the conference, okay? She already mentioned some of my credentials. I have been working in cybersecurity at this point for over 41 years. This is in my DNA, a topic that I didn’t like and respect as much as I cannot talk about any other topic in my life. Before we go, I have here a statement that I put together for you, okay? Digital forensic best practices. Well, consideration number one: just to break the ice in the labyrinth of cyberspace, where shadows dance through encased passages and data whispers its secrets, the digital detective emerges. This is us, the digital forensic experts. Clad in lines of code and armed with algorithms, we seek the hidden treasures of truth and solving enigmatic cybercrimes. With a visual magnifying glass, this is what we do: we dissect the digital tapestry, unveiling the footprints of elusive cyber cultures. This is what cyber forensics, or digital forensics, is about. Each keystroke and pixel holds a clue, something that we can use in our favor. And in this mesmerizing world of the digital era, ones and zeros, the art of digital forensics is about finding the secret of the digital reality. Digital forensics is about finding evidence that can lead to a particular process. It can be a legal process, or it can be any other kind of process. But what is digital forensics from my point of view? Well, I mentioned earlier that I've been working in cybersecurity for 41 years. My specialties are in penetration testing, data recovery, and digital forensics. I’ve been working for the police department in multiple places doing digital forensics for them. So I try to put together an easy definition for you from my standpoint about what digital forensics is. Digital forensics investigates digital devices and electronic data to use as evidence. Please note that I don’t say electronic information; I use the word "data" intentionally to understand digital events and trace illicit activities. This is a key component of digital forensics. Normally speaking, digital forensics happens, of course, after the facts, and the idea of digital forensics is identifying traces, okay, that lead to particular data that we can gather together and make a conclusion. It involves the systematic collection, preservation, analysis, and presentation of digital evidence in legal proceedings. This is key today because we are technology-dependent, and there are multiple states, at least in the USA and some other countries, where digital forensics is still in limbo because it's not accepted in the court of law. Okay. So, this is very important to keep in mind. What are we going to do from the digital forensics standpoint, the data collection process, and the analysis? Digital forensics experts use specialized techniques and tools to extract data from computers, smartphones, networks, and digital storage media to support investigations and resolve legal matters. So this is basically what digital forensics is about. Let's go ahead and start with the technical part, which is the topic I like most. Okay, let's talk about those 30 best practices that I’ve put together for you. At the end of the presentation, you will have the opportunity to ask as many questions as you like. 1. You have to follow the legal and ethical standards: For this particular first point, I am not going to make any comment. I believe that ethics is a key component of cybersecurity. We always have to follow the rules. We must always follow the legal procedures in the places in which we operate because every single place is a different component. 2. Understand the original evidence: This is key. Okay. You always have to maintain the integrity of the original evidence to ensure it is admissible in court. Any kind of manipulation or modification will result in disqualification from the court system. Document everything: This is something that technical people like me don’t like too much, but when it comes to digital forensics, we have to document every single step we take. We have to record all the steps we follow, and we want to make sure that everything is documented and recorded in a specific chronological order. This is a key component for digital forensics or investigations to be accepted in the court of law. Secure the scene: It’s not just physical crime scenes that need to be secured to prevent contamination or tampering. If you present anything in court and the opposing party has the ability to prove that something was not preserved, the conversation is over. Chain of custody: I’m going to repeat this more than once during the presentation. Sorry. Chain of custody refers to how you establish and maintain the evidence and the process that facilitates how the tracking process is handled. Use-Write- Blocking Tools: This is another key component of digital forensics. It means that you have to use the appropriate hardware and software that allow for write blockers when you are collecting data to prevent alteration. There are a set of tools you can use, and at the end of the presentation, I’m going to provide you with a specific set of tools you can use as write-blocking tools. Verify hashing or hash values. This is how you calculate and compare hash values to verify the data's integrity. There is often confusion about integrity, confidentiality, and availability. In digital forensics, the most important component is integrity. It means that we must make every effort to ensure that the data is not modified in any possible way, from the time we arrive at the scene to the time we present the evidence in court and even after that as well. So other component is Collect volatile data first. Okay, this obviously makes perfect sense. You have to prioritize this type of data collection as it can be lost or modified when the system is powered down. For many of you, what I’m going to tell you may sound not appropriate, and this is the following assessment: we've been told from the time we arrived at school and even at work that information or data in random access memory (RAM) disappears when the computer is shut down. Back in 2019, I made a presentation similar to this one for this account, in which I proved that the data in RAM can be recovered. Okay. So, what we have been learning in multiple places, and what you can easily find on Google, that data in RAM is lost when computers are powered down, is not exactly correct. The other component is Forensic image. You have to create a forensic image of storage devices to work with copies. You must always present the original evidence. This is a requirement in the court of law. You must present the original evidence every single time. The other component is the Data recovery. Data recovery is closely associated with digital forensics for obvious reasons. Okay. You have to employ specialized tools to recover deleted or hidden data. This is also something to keep in mind. At the end, I'm going to provide some specific applications you can use to do data recovery. Timeline analysis: You must construct and analyze timelines to understand the sequence of events. What happened first? The chronological order is a mandatory requirement in the court of law. You cannot present evidence in court in a random manner. You have to follow the specific chronological order. The other consideration is Preserving the metadata. Ensure metadata integrity to verify results, timing, and authenticity of the digital artifacts you are going to present in the court of law. Use known good reference data: This means you have to compare the collected data with known good reference data to identify anomalies, specific patterns, and statistical processes. Many times, you have to do this as well. Antiforensic awareness: You have to be aware of the antiforensic techniques in use. There are multiple applications that work against digital forensics. So, you must be aware of that. Before you start digital forensics analysis, while working on the data collection process, you want to make sure you don't have any anti-forensic tools or applications installed on the particular host or hosts in which you are going to conduct the investigation. Another very important component is Cross-validation. This is what brings actual reputation and respect to the data you are presenting in the court of law. Okay? So the standard operating procedures are a very important component that is oftentimes overlooked, and it's about developing and following SOPs that maintain consistency. This is why documentation is key, and it was presented in slide number one. Training and certification are also important components, and this is relevant. The reason why it's relevant is that I understand you can learn many things by yourself. This is becoming more popular as we become more technology-dependent. This is normal and expected, but certifications still hold particular value. There are multiple questions in certification exams, in general terms, not only in EC-Council certifications or others, in which, most likely, if you don't go through the certification process, you will never find out. And this is what some people say: "Well, this is theoretical information." Digital forensics involves a lot of theoretical information-- A LOT. Remember that we are doing the analysis at a low level, from the technical standpoint. So theory is extremely important and relevant when we do forensic investigations--digital forensics. The same happens with medical doctors. When medical doctors do a forensic analysis of a body of someone who passed away, they also employ a lot of theoretical knowledge they have been accumulating. Digital forensics is no different. The other consideration is expert testimony. Okay? I, for example, live in Miami, Florida, in the USA, and I am one of the 11 experts certified by the legal system in the 11 districts. This means that when you go to court, you have to be classified as an expert in order to provide comments and evidence. Otherwise, you will probably not be able to speak in court, as what we say in court is relevant for the case. And with our wording or statement, along with the evidence we provide, we have the ability to put somebody in jail or release this person from jail. So, this is extremely important. Okay? So, evidence storage is one of the most important components. Your opponent in court or in your company will try their best to challenge what you are presenting. So, you have to safely store and protect evidence to maintain its integrity. Integrity is the most important characteristic or consideration in digital forensics-- without any other factor coming close. So, integrity is everything in digital forensics. Okay? Data encryption: There are multiple cases in which you will do digital forensics on encrypted storage devices, encrypted data, or encrypted applications. You need to develop the ability to handle encrypted data and understand the encryption methods. Among the publications I have, I have over 25 publications on different topics and concepts within security. A few of them, probably five or six, are specifically about encryption. If we want to do digital forensics, we must become data encryption experts. There is no other way. I understand that many people don’t like math, statistics, physics, etc., but this is a requirement for doing an appropriate digital forensic assessment. It’s a necessity today. Okay? The other consideration, and this is for the people who love technology like me attending or watching this conference, is network. I am a big fan of networks. I have been working in networking for 41 years. My doctoral degree is in telecommunications and cybersecurity. So, networking is in my DNA. I love networking more than any other topic in information technology. Network analysis is the ability to analyze network traffic logs and data to trace digital footprints. I’m pretty sure everyone has a tool of mine, and, of course, this tool is most likely part of the tools I’m going to provide in the last slide for you. But network analysis today, from a digital forensics standpoint, is everything. Everything is network-related in one or another way. Malware analysis: We need to develop the ability to understand malware behavior and analysis and how those malwares impact systems. This needs to be incorporated as part of the cybersecurity analysis when performing digital forensics today. Cloud forensics: I don’t have to highlight how important cloud operations are. Okay? We are moving operations to the cloud, and for those still running operations on-premises, there is a high expectation that sooner rather than later, you will move operations to the cloud for multiple conveniences. However, the configuration at this point does not fully benefit all aspects of the cloud. From a forensic standpoint, when you do cloud forensics, the situation is a little different from on-premises investigations. So, you have to adapt methodologies for investigating data in the cloud, regardless of the cloud provider. Here, as a matter, you can see AWS, Google, Azure, or anyone else. The operation in the cloud is somehow different from a digital forensics standpoint, starting with how you access the data. Remote forensics: Remote forensics is the opportunity to develop skills for collecting and analyzing data from a remote location. This is happening more frequently now as we become more telework-dependent. In multiple cases--my own company, for example, knowing my job with the government, but owning my own company--I have been doing more remote digital forensics in the last two, three years, probably two years. Digital forensics that than probably ever before in my life. So, this is an important skill to develop as well. Case management: This is how we use digital forensics case management to organize and track investigations. I mentioned to you that I go to court very often--more often than I want, very, very often. Okay. And they scrutinize every single protocol you present, every single artifact, every single document, and the specific chronological order. This is a complex process. It’s not just collecting the data, performing the digital forensics analysis, and going to court to testify. Okay? The process is much more complex than this. Collaboration: Collaborate with other experts and there's one in the middle that I'm going to highlight in a few. Collaborate with other experts, law enforcement, or organizations for complex cases. Cases are different from one another. Of course, this is okay, and I know you know that. Okay? But you have some cases sometimes in which the forensic analysis becomes very complex. In those particular cases, my advice is to collaborate with others. Okay? You do better when you work as part of a team and not when you work independently. I’ll skip the data privacy compliance for a minute because this is relevant. Every single state, every single... No exception. A state court operates on the different requirements. So, you want to make sure that you follow the privacy regulations in your specific place. Okay? And by the way, I'm going to ask you a question. I'm not expecting any response. But the question is: by any chance, do you know the specific digital forensic regulations in the place you live? Ask yourself this question, and probably some of you are going to respond "no." This is a critical thing. Continuous learning: You need to keep asking about what we do. Okay? Cybersecurity is an specialization of IT. From my point of view, it's the most fascinating topic in the world. This is the only topic I can talk about for 25 hours without drinking water. This is my life. I dedicate multiple hours every single day, seven days a week, even when it creates some personal problems with my family, etc. This is in my DNA. I encourage each of you, if you are not doing so, to dedicate your life to become a digital forensics expert. Digital forensic is one of the most fascinating topics in the planet. Okay. And you want to be attentive to these type of things. Report and presentation: When you go to the court or when you present your outcomes of all the digital forensic outcomes to your organization, you want to make sure that you use clear language, you are concise, and you are ready for the presentation questions and answers. You never want to go to the court unprepared. Okay? Never in your life. This is not appropriate because, at the end your assessment, you have the possibility to put somebody in jail or somebody will be fired from the organization or not. So what we said is relevant. Our wording has a huge impact in other people's lives. It's important to be attentive to that. One of the most relevant topic that I have been using in my practice is the use of artificial intelligence in digital forensic. Since 2017, this is not a topic that is well known. At this point, the reason why I really want to share my experience-- practical experience with you guys, digital evidence analysis, how artificial intelligence can help us. Well, everybody knows that we have multiple applications that we can use in order to analyze the different kind of media that can be generated. For example, text, image, and videos, artificial intelligence studies have the ability to detect and flag potential relevant content for investigations, especially from the timing standpoint. Digital forensic is extremely time consuming, very, very time consuming and complex. This is probably along with data recovery the most complex specialization in cybersecurity. So the use of artificial intelligence, in our favor, is very convenient. And at the end, I'm going to include as well or actually I included in the list a particular artificial intelligence tool that you can use in your favor. The other use of artificial intelligence is pattern recognition. Artificial intelligence can identify patterns in data, helping investigators recognize anomalies or correlations in digital artifacts that may indicate criminal activity. Out of the whole sentence, the most important question is: "What is the key word?" The key word, correlation. How do we correlate data by using artificial intelligence? The process is going to be simplified dramatically. Speaking based on my personal experience, the other component is NLP. This can be used to analyze text-based evidence, including logs and emails, to uncover communication patterns or hidden minutes. A lot of evidence that we collect, about 65%, is included in emails, chats, documents, etc., so this is when NLP plays a predominant role in artificial intelligence in the digital forensic analysis for image and video analysis. It provides incredible benefits. Okay? You have the ability to analyze multimedia content to identify objects, people, and potentially illegal or sensitive content. I’m sure a word is coming to your mind right now, steganography. Yes, this is part of steganography, but it's not similar to doing steganography by using a particular application. When you employ artificial intelligence tools that are dedicated exclusively to digital forensics, the benefit is really awesome. Predictive analysis: Machine learning models can predict potential areas of interest in an investigation, guiding forensic experts to focus on critical evidence. Imagine that you are analyzing a hard drive that is one terabyte holds a lot of documents, videos, pictures, sounds, etc. You know that, right? If you are attending this conference, it’s because you are very familiar with information technology, cybersecurity, and digital forensics. Well, how do you find the specific data you need to prove something in a court of law? You have to be very careful about the pieces of data you pick for the analysis, otherwise, your assessment is not appropriate. And again, every single word we say in a court of law or in the organization we are working for is relevant. It implies that probably somebody will be in jail for 30 years, or probably somebody, if we’re talking about a huge crime like an assassination or child pornography abuse, will face consequences like death. Our assessment is critical. Okay? We become the main players when digital forensics is involved. We have to be very careful about the way we do it. This is not a joke; it's very serious. Okay? Predictive analysis, machine learning models, or artificial intelligence are pretty close in this concept and can predict potential areas of interest in an investigation. But we also talk about detection. Artificial intelligence driving security tools can identify cyber threats and potential cybercrime activities, helping law enforcement and cybersecurity teams respond effectively and proactively. More importantly, the majority of us have multiple tools that we call proactive in our place of work. Okay? We have different kinds of monitors, etc. But the possibility to do something in a proactive mode is really what we want. Evidence authentication: Artificial intelligence can assist in the authentication of digital evidence, ensuring its integrity and the possibility of this data being admitted in court. Data recovery: Artificial intelligence helps with the recovery of data that has been deleted intentionally or unintentionally. It doesn't matter. When we do digital forensics, we want to have as much data as we can to make a case against a particular party. From the malware analysis standpoint, artificial intelligence brings a lot of speed, and this is needed because, again, you are looking for a needle in a ton of water or in a ton of sand, and this is very complex. From the network forensic standpoint, we are accustomed to using tools such as Wireshark, which everybody knows, well, anyway, there are now specific artificial intelligence tools for network forensic analysis. I have included two of those tools in the list on the last slide. Automated trace: This is one of the most important considerations for you to consider with artificial intelligence in digital forensics. Speed is key. It’s basically the ability to do correlation between large data sets. Case priority: Artificial intelligence can assist investigators in prioritizing cases based on factors like severity, potential impact, or resource allocation, meaning timing. Predictive policing: This is super important because, until today, digital forensics has always been reactive. We react to something that happened. The possibility to make predictions in digital forensics is fantastic. It has never happened before. This is new, at least for me. I started using artificial intelligence back in my own company in 2017, and I have been able to that in multiple cases for the police department in Miami and in other two cities in Florida: Tampa and St. Petersburg. The results have been amazing. Document analysis: You know that NLP can extract information from documents and analyze sexual content for investigations. Artificial intelligence dramatically minimizes the time needed for that. Emotional recognition: Everybody knows what happened with the DSP algorithms. Okay? So we can use artificial intelligence to analyze videos, which is awesome because our eyes, our muscles in our eyes, don't have the ability to lie. We can lie when we speak, or we can try, but our eyes’ reactions to a particular stimulus cannot be hidden or cannot be modified. So this is unique. From the data privacy and compliance standpoint, you also have the ability to automate the specific data you want to include as part of your report. Okay? Now, digital forensic data acquisition steps: From my standpoint, after 41 years of experience, preservation--we already talked about this. Documentation: Preservation is integrity. Okay? This is the most important consideration, categorically speaking, in any kind of digital forensic investigation. You have to preserve the data as it is. And remember, you never use the original data for your forensic analysis—-never. You always use a copy. And to do copies, you have to use bit-by-bit applications. Bit-by-bit—you cannot copy bytes, or you cannot copy data and forget about the information. So, preservation is the most important thing. Documentation: We already know that everything needs to be documented, okay? From the crime scene to the last point. Chain of custody: One more time, and I guess I’m going to mention this one more time because chain of custody means or opens the door for you to present a case in the court of law or to prove, in your organization, that what you are presenting is appropriate. You have to plan how you are going to collect the data. you have to plan with anticipation the specific tools you are going to use what methods are you going to consider in your data collection process this is relevant and you always have to consider the coms coms is probably more important than PR when you select or decided to use a particular application for the data acquisition you always want to focus on the negative people usually tends to talk about the positive oh I like why the Shar because this and that it's better that you focus on the negative in Information Technology everything has cross and comes no exceptions exceptions do not exist there is not one exception everything positive have something negative in information technology and this is what you want to focus on it to avoid problems at the end Okay so how about the verification process you have to verify before you work with the real data that the tools and methods you selected work okay you never want to mess up with the original data needed with a copy you want to test in a test environment your tools your methods your approach the steps you are going to follow is very time consuming it is but by the way it's also very well paid is very well paid the only thing I can tell you that it's very well paid you have no idea if you become a cyber security expert and specialize in digital forensic this is where the money is and trust me this is where the money is okay I'm telling you first person duplication we talk about that already the only way to do that is by creating bit forbit image there is no other ways okay this is why you you want to use PR blocking devices software and Hardware I mentioned that before Tex rooms and hatching different concepts that some people are still confusing about it okay there is a huge difference between the two the main one is that Asing is a oneway function you go from the left to the right and usually you don't have the ability to come back to replicate the process of course if you have the algorithms on hand then you can do reverse engineering this is obvious but this is not what happen in regular conditions okay so check zoom and hatching both minimize the possibility that you mistake in your digital forensic ER analysis the other component is acquisition okay so how are you going to collect the data what particular tools are you going to use you always have to maintain a strict R only access to the source if you have the ability to manipulate the data in the source you have the ability to tamper with actually the most important consideration out of the CIA which is integrity if the opponent is the opposite part to you in your organization the defendant in other words have the ability to prove that the the original data or source can be manipulated in any way the conversation is 100% over and the case will be dismissed categorically speaking it's no more conversation so this is a humongous responsibility when it comes to data acquisition what protocols you use what the specific tools how do you plan it how you document is a very painful process in other words okay now data recovery we already talk about the complexity of finding a needle in a tone of s this is super complex okay but it's doable the only thing you have to use is the appropriate tools and you you need to have a specific plan because every single case is 100% different digital signatures sign the acquire data in hatches with a dig digital signature for authentication there are multiple cases today in which H signatures are not accepted anymore in the go government I am a Federal Officer for the US Department of Commerce in USA in the government we are not allowed to sign anything by hand for many years back many years okay digital signatures have a specific component that minimize dramatically speaking the possibility of replication and this is why this is accepted in the court of law verification R verifies the Integrity of that Qui image by comparing hash values with those calculated before the hash values must be exact no difference not even in one 0.001 percentage most much 100% categorically speaking otherwise the court is going to dismiss the case as well or the organization probably is not going to take the appropriate action vus in a particular individual or problem or process okay LS and no we already talk about documentation at the beginning you have to actually make sure that everything is timestamped as I mentioned before at the beginning digital forensic must be collected in a particular order analyzed in the similar Manner and presented in the report in the specific order in which the process was done otherwise the process is going to be disqualified and this is exclusively at this point our own responsibility and nobody else okay the storage we already know that gain of custody is one of the most important component there are multiple forms depending of the state in which you live and the countries as well that you have to follow anything if you miss a check mark or if you put a check mark on those particular forms you are basically dismissing you the case you intentionally the court doesn't work in the way many of us believe okay we have the possibility to put somebody in the electric share or to release to provide to this particular individual or organization what we said is relevant okay this is very important the brift you always have to be in Comm communication with all parties both the one presenting the digital process or ruling the process and the other part as well you cannot hide anything Zero from your opponents in the court of law or for the defendant part never in your life this is why the first bullet in the whole presentation was as you may remember ethics okay in digital forensic we provide what we known to the other parties as well even to the defendant to the opponents every single time no exception and we provide every single artifact with the most clear possible explanation to the opponents this is how the digital forensic process work otherwise it will be dismissed as well in the court steing you have to make sure that every single piece of digital evidence is properly still then that you follow the process by the book again if you Skip One Step just one out of 100 or 200s depending of the case the case is going to be this measure no exceptions the Cod goes by the book as you can imagine and your opponent is going to be very attentive to to the minimum possible failure to dismiss the case okay so how you transport the data from one place to the other place chain of custody this is the key component chain of custody data encryption you have to make sure that you prevent or actually Pro prevent a Integrity manipulation and you always want to meure the confidentiality of the data CIA we already talked about the component confidentiality Integrity availability from the digital forensic standpoint the most important no exception is integrity and also the confidentiality okay so from the recovery image standpoint you always want to have a duplicate for validation and reanalysis and remember that you always want to work with a copy of the digital evidence 100% of the time no 9 you have to preserve the original evidence this is part of our responsibility and this is why we do bit by bit analysis and bit by bit copy it's complex okay now a specific step in digital forensics to analyze the collected data at this point you already went through multiple process and spent a lot of time how do you analyze the data you have because you are going to have probably terabytes of data okay well you have to make sure that hashing and TS digital signatures and the chain of custody have been followed data priorization what happens and what is more relevant you cannot present in the court two terabytes of data or 2,000 Pages this is Irrelevant for the case okay you have to make sure that you use keywords in order to provide a solid report to the court for this particular case for the keywords artificial intelligence have been proven to me that is of huge help file caring you have to use a specialized tool to recover files that may been deleted or you intentionally hiting timeline analysis we talk about you have to do everything by following a particular sequence of activities in other words you have to present and do the analysis in chronological order in the way that you collect the data this is the exact way you do the analysis and later you do correlation okay but you have to follow a particular chronological order data recovery you have to do your best to reconstruct the data that have been deleted or probably damaged even by a physical or electronic condition in the storage media the metadata analysis is also complex okay this is the next component after the time the timeline analysis metadata includes multiple kind of data so this part of the analysis is going to be complete colle and more time consuming than the data collection and the data collection is already very time consuming content analysis you have to be very careful because this is basically what the forensic analysis is going to be parent recognition how you can match one bit of data with another bit okay is there any association between bits between bites between data between words this is a iCal component communication analysis again you want to make sure that you include everything emails today are probably the most relevant component of digital forening analysis you wants to make sure that you master email analysis as well data encryption you always have to keep in mind the confidentiality and when we are talking about the recovery or the recovery image I mentioned that as well similar to the chain of custody before because you always have to pres the digital the original data evidence examination you want to make sure that you verify the Integrity of the data you have been acquiring including hash value digital signature and the chain of custodies we talk about this already this is a repeat of the slide by the way okay so database examination and you foring a duplicate slide so this slide is the same to this okay so my apology for that it's my fault data database examination investigate databases for valueable valuable information including structure data and locks entries Etc media analysis this is a very complex process because it's usually about atigo or include testigo and this is about image videos audios geolocation in digital signatures Network traffic analysis tools as why the Shar h but my suggestion is that you use all the tools that are part of the artificial intelligence applications we can use today and are available in the market estigo is always complex okay because stigo include not only image but in many cases audio as well and this is very complex time consuming you always wants to make sure that you use the appropriate estigo analysis techniques and that are multiple specific for volatile analysis as I mentioned before there is multiple ways to do data acquisition from RAM memory when we turn off the computer all the data from Ram doesn't goes off this is what everybody said this is what Google said this is what people that never do forensic investigation repeat this is not appropriate if you know how to do it and again I make the presentation for e councel in 2019 if you Google my name in this presentation you will be able to find a particular video in which I was able to recover data from RAM memory after the computer was took down took down believe it or not go for the other presentation that this is DC councel database and you will be able to see the video okay comparison you have to do cross reference every single time to make sure that the data you identify is appropriate and you always identify identity deviations and inconsistency before you do the final report I told you already when you present the report in the court of law and minimum mistake something minimum will be disqualified in the case for example in this presentation I include IED by mistake this slide and this slide if I do that in the in the court of flow is dismiss okay that's it it's no more conversation the emotion analysis we have talk about that we are talking about persons digital evidence is always related to people in process processes applications Hardware software so we want to make sure that what we present is accurate and from the documentation at some point it was the second point in the presentation we have to document everything reporting is about compiling in a clear and comprehensive manner including summaries methodologist and supporting evidence you have to include or at least in my case I always include the recordings of everything I do everything means even if I open my personal email or if a notification come to my computer and I open something in my my in my WhatsApp for example this is part of the recording as well okay so you have to make sure that you provide an expert testimony in order to do that you have to be an expert in digital currency Feer review consult with other with your partners with the opponent with the defendant part before you present it's not that you are going to modify to report because the defendant doesn't like it this is not what I'm telling you it's just that you are going to provide the report and by the way you must provide the report to the defendant before you go to the Court by the time you stand up in the court everything needs to be done the other part need to know exactly what you are going to present this is how the legal systems work okay with deceptions of very few countries but in the world this is how it work so the quality assurance is just making sure that what you present is appropriate the case management is how you use the digital forensic and manage system to track everything in analysis process and from the data privacy compliance I told you already every single place every single City every single state operate under different conditions popular tool for digital forensic few of those in Cas autopsy Access Data everybody know how is a forensic tool kit hway forensic celebrity vola volatility wi sh everybody most likely know oxygen forensic detective and the digital evidence and forensic tool kit so some of those are included in Cali others do not some are open source others are extremely expensive for example in case which is very very expensive some relevant reference about digital forensic I prefer to use keywords and not particular reference or books because I don't recommend any specific book instead the combination of content and knowledge and expertise but some words or key words you can use if you want to expand more in digital forensic are digital forensic best practice challenge iMobile digital forensic Network forensic techniques Cloud forensic investigations Internet of Things forensic memory forensic analysis because you want to stop repeating what you have been learning for years when you took down the computer with the computer is turn it off and there is a lot of data that remains in r memory for a particular amount of time of course okay so try to expand on this topic malware analysis in digital forensic and cyber security and digital forensic Trends those are keywords that will be facilitating your expansion or you expanding on digital forensic knowledge other considerations are some particular journals okay I in this case I'm going to risk and recommend the digital investigation that is published by xier is one of the top in the world the other one is the Journal of digital forensic security and law and forensic science International digital investigation report I'm open to any question you may have and one more time I want before I close my lips I want to sincerely thank you EC Council for another opportunity to talk about this fascinating topic thank you very much for all the staff in the e Council that work tily who made this presentation a possibility and thank you so much as well for you guys attending the conf the conference and for the questions that you may ask thank you very much Dr Lewis for such an insightful and informative session that was really a very interesting webinar and we hope it was worth your time too now now before we begin with the Q&A I would like to inform all the attendees that EC council's CH maps to the forensic investigator and the consultant digital forensics anyone with the chfi certification is eligible for 4,000 plus job vacancies globally with an average salary of $95,000 if you're interested to learn more andly take part in the poll that's going to be conducted now let us know your preferred mode of training and we will reach out to you soon uh Dr L shall we start with the Q&A yes I'm ready for okay our first question is how to prove in court of law that the collected evidence is from the same object and not collected from any other object this is a very important question I really appreciate the clarification on this topic as I said we have to be very careful about the way we collect the data when we are talking about objects objects are associated to bits not to bikes only but Bits And as I mention multiple times when we do the copy of the original data we want to make sure that we always do bit by bit when you do bit by bit and not B by B because a bit implies up to 3.4 volts in electricity we are eliminating the possibility of mistake objects are bigger a bit do not constitute an object objects are formed by multiple bits this is why we have to do the analysis bit by bit and I mentioned that multiple times thank you for answering that question our next question is what kind of forensic data can we obtain from the encrypted data where the key is not available to decrypt the data could you please repeat the question what kind of forensic data can be obtained from the encrypted data where the key is not available to decrypt the data you encryp data uh I'll just P the question to you on chat uh Dr Ls I'm not watching the chat right now something happened I'm not watching the shat sorry H long hello hello hello can you hear me yes I can hear you yes I have posted the question on the chat Dr leis okay okay please yes I have already pasted okay let me check here okay give me a second okay what kind of forensic data can be obtained from encrypted data oh okay okay well this is another misperception okay everybody knows that when the data is encrypted we cannot open the data or the particular file document video any kind of Digital forening Data let me tell you something there are multiple forensic tools that have the ability to decrypt the data even when we don't have the key this and I understand the key component and I understand that the two type of encryptions symmetric and asymmetric and as I said I have multiple Publications about encryption ER but there is most likely always the possibility to encrypt data without having the encryption key I understand that it doesn't sounds popular it's not what we hear every single time but when we spend specialize on digital forensic we have usually the tools we need to decrypt the data especially if you are using artificial intelligence also in the government at least in the US government in my operation in the operation I direct I handle I supervise we are using artificial intelligence for multiple things in cyber security since 2017 and we are also using Quantum Computing Quantum Computing is not not coming quantum computer is in use in the US government for years now so we are using Quantum Computing for years there are multiple ways to decrypt the data when the encryption key is not available multiple ways multiple applications as well that help with the process it's very time consuming but there is a possibility for that and this is a great question because the question is okay how about the hard drive is encrypted there is nothing that I can do right no this is not like that there is always ways to decrypt the data always it doesn't matter how strong the encryption is but you need to have the appropriate tools of place for example I'm going to mention just one in case when I present this some tools that I suggest before I said that in case is very expensive in case do magic between quotation man in case do multiple things that we don't learn in the school okay so I can see the other question here how to adapt to investigation in the cloud since the clouds provided do not allow most of important operation to access media when you have to do a case or conduct digital forensic in the cloud the cloud providers 99% of the time I don't want to say 100 because I don't want to risk on that but usually the cloud providers include in the SLA in the service level agreement what is going to happen if a digital forensic or any kind of Investigation needs to do needs to be performed in the cloud space so most likely the cloud operator is going to facilitate access to everything you need sometime you have to move and go physically to the place in which the data is host don't believe that the cloud provider doesn't know where the data is host we know where the data is host specifically I have been in San Diego California and another States in Hawaii back in 2019 as well doing forensic investigation in a cloud environment it was actually for something government related and I was given the permission I need to do any kind of Investigation so Cloud providers facilitate forensic analysis because forensic analysis are usually related to legal cases there are multiple cases in which in USA we don't have access to this data and I'm going to mention an example Tik Tok Tik Tok the problem between the US government and Tik Tok is that when Tik Tok get the authorization to operate in USA the government was one step behind behind Okay and we don't regulate Tik Tok at this point Tik Tok has the ability to prevent forensic investigation in the Tik Tok platforms for the US government cour system or legal system okay but again usually Cloud providers facilitate investigation in the cloud 100% they cooperate in every single manage they have to facilitate the forensic investigation thank you for answering that question uh we'll take last question for the day uh what is the best open source free tools for social media forensics there is no best open source tool that is a combination of tools number one digital forensic cannot be performed categorically speaking with one or two tools this is a complex time consuming and expensive process I made some suggestions it's included in the slide ER let me see a slide slide number 16 okay this is the slide in which I include in case autopsy the S some of them are upper cases as I I'm sorry open source as I mentioned before but there is not a particular tool or two or three tools that I will recommend because in top of that every single forensic investigation is about the different process you cannot use the similar tools this is why there are very at least in USA very small amount of organizations companies that specialize in digital forensic as my company does the reason why is because between many other things lack of expertise and expenses okay so I do not recommend a particular tool instead the combination of tools there are multiple open source I mention a few in a slide number 16 of my PowerPoint presentation but again those are not sufficient those are the most popular and strong ER more accurate uh tools that you can use for digital forensic but a particular tool one or two to do forensic investigation it doesn't exist is impossible doesn't thank you again to our wonderful speaker Dr Lewis for answering those questions and for the great presentation and knowledge shared with our Global audiences it was a pleasure to have you with us and we are looking for more and more sessions with you before we conclude the webinar Dr LS would you like to give a small message to our audiences please well no just want to thanks everybody again the one that work tiously behind the presentation to you in e Council as always thank you very much for the support for all the attendees I hope you learn something new let me clarify that every single content wording words Etc that I have been presenting for you is my original creation 100% not 99.99 but 100% categorically speaking and I put together those notes and reflection for you guys with the hope that you can come back to your organization and ser better that you can become a public servant ER and go to the court and testify in favor of the park that deserve your benefits and I sincerely thank you for the opportunity to share my expertise with you guys have a nice weekend okay thank you very much for the time in question thank you so much thank you so much Dr Louis for your message before we end the session I would like to announce the next cyber talk session why are strong foundational cyber securities skills essential for every IT professional which is scheduled on November 8 2023 this session is an export presentation by Roger Smith director car Managed IT industry fellow at Australian Defense Force Academy to register for this session please do go visit our website www.ccu.edu cybert talks the link is given in the chat section hope to see you all on November 8th with this VN the session with this you may disconnect your lines thank you thank you so much Dr leis pleasure having you likewise thank you very much for the opportunity thank you have a good day