The Digital Evidence Investigation Flashcards

1
Q

What is this a definition of:
the methodological acquisition, authentication, reconstruction, and examination of digital media using computer software, hardware, and analytical techniques for the purpose of presenting digital evidence in a judicial or quasi-judicial proceeding.

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What changes were made to the criminal code in 1983?

A

To address the use of computer to commit or aid in committing crimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of testimony can police officers be called for in digital forensic investigations?

A

Expert or lay witness. Depends if opinion is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What key terms related to digital forensics are defined in the criminal code?

A

Computer data
Transmission data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a preservation demand?

A

Requires a person to preserve computer data in their possession or control when the demand is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the conditions for making a preservation demand?

A

Officer must have reasonable grounds that:
An offence has been or will be committed; AND
The computer data is in the person’s possession or control and will assist in the investigation of the offence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the limitation of preservation demands?

A

The demand cannot be made to a person under a criminal investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the result of the limitation to preservation demands?

A

PD, production orders and assistance orders often go hand in hand and apply to non-accused persons who may have valuable evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term does this define:
means representations, including signs, signals or symbols, that are in a form suitable for processing in a computer system

A

Computer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term is this defining:
means representations, including signs, signals or symbols, that are capable of being understood by an individual or processed by a computer system or other device. 

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What term is this defining:
a medium on which data is registered or marked

A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term is this defining:
data that relates to the location of a transaction, individual or thing. 

A

Tracking data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is transmission data?

A

Can see what a device is sending or communicating with, does not tell use the substance of that communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What information can be adduced from transmission data?

A

Date and time of communication
Duration of communication
General location of device based on cell tower data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a production order?

A

Order for company to produce the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an assistance order?

A

Requires company to assist in investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Instead of digital or physical evidence, what term dose the Canada evidence act use?

A

Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the best evidence rule with respect to digital evidence?

A

The party submitting the evidence should submit the original unless unable to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When is the best evidence rule satisfied?

A
  1. Proof of integrity of system; OR
  2. If evidentiary presumption applies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two relevant assumptions related to digital evidence?

A

Presumption of integrity
Presumptions regarding secure electronic signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of evidence is digital evidence considered to be?

A

Latent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does an electronic document in the form of a printout satisfy the best evidence rule?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the digital question to answer?

A

Who is responsible for performing some digital action on the subject media and what is the resulting output?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a byte?

A

Smallest collection of digits that will display on-screen in human readable format
8 digits displayed as a single character or digit

25
What is the primary challenge for police early in a digital investigation?
Proper preservation of evidence. Must be identified before it is preserved
25
What are the two components of the science of digital evidence?
Preservation Analysis
26
What are the 5 situations that identification of digital evidence typically applies to?
Seizures with judicial authorization Street checks Random Canada Border Service Agency checks Prisoner processing Voluntary productions of evidence
27
What evidence related to digital evidence is processed first?
Most volatile evidence - DNA, fingerprints
28
What are examples of judicial authorizations that can result from an ITO (information to obtain)?
Production orders Search warrants Tracking warrants Transmission data recorder warrants Part VI authorizations (wiretaps)
29
What is a tracking warrant?
Provides information on location
30
What us a transmission data recorder warrant?
Captions transmission data in real time.
31
Who is able to authorize a wire tap?
Superior court justice
32
What are the two types of criminal offences involving computers?
Technology-as-instrument Technology-as-target
33
What is technology-as-instrument?
Technology is instrumental in the commission of a crime.
34
What is technology-as-target cybercrime?
Criminal offences targeting computers
35
Outline the 9 steps of a digital investigation.
Identify potential sources of evidence Preserve evidence Collect info Analyze Investigators establish reasonable grounds based on analysis Charges laid Major crime management Disclosure Trial, etc.
36
What are the two sources of data on a storage device?
Program or application Output generated by that application
37
What is the most common form of digital evidence?
Output
38
What are the three types of data output?
User-created content Application-generated content System-generated content
39
Give example of non-volatile storage devices.
Laptop hard drives USB drives SD cards DVDs
40
What are volatile storage devices? Give an example/
Lost when the computer is turned off. RAM
41
What important information can be extracted from volatile memory?
Passwords Documents Pictures List of running processes
42
What is an issue with mobile devices?
Susceptible to remote access, including phone locking and data destruction
43
What are the two basic data types requiring preservation?
Public and private
44
What are 4 types of private information that can be obtained from a service provider?
IP address Name, address, phone number connected to owner Cached content Information stored in private view.
45
What are the three methods of obtaining the forensic copy?
1. Removal/connection of the subject media to a trusted system 2. Booting the subject computer with a trusted boot disk 3. Obtaining the data while the subject computer is running
46
What is the traditional method of obtaining the forensic copy?
Removal/connection of the subject media to a trusted system
47
When is the method of booting with a trusted boot disk used?
If source media cannot be removed.
48
When is is most helpful to obtain the data when the subject computer is running?
When computer is connected to a network.
49
What does forensic duplication software do?
Provides a method of validating the forensic copy against the source data
50
What are the objectives of the analysis portion of a digital investigation?
Establish control over data Establish ownership of the data Determine how the data was produced and distributed
51
What is the complicating factor during the analysis of digital evidence? What is its effect?
Encryption Prevents unauthorized access
52
How can link charts be used in communication data analysis?
Can show where people were when they spoke to others.
53
How can call pattern analysis be used in a digital investigation?
Can reveal patterns relevant to crime and involvement of parties
54
How can timelines be useful in digital investigations?
Helpful for understanding large scale cases
55
How can flow charts be used in digital investigatons?
Show sequence of events
56
How can maps be used in digital investigations?
Can visualize who was talking to who when, where and in what format
57