🔬 Part 3.4

Digital Forensics & Expert Evidence

"The science behind the evidence"

Understanding forensic examination processes and expert testimony is crucial for both presenting and challenging electronic evidence. Learn what happens inside the forensic lab and how to question the findings.

4.1

Digital Forensic Examination Process

🔬 What is Digital Forensics?

Definition: The scientific process of identifying, collecting, examining, and presenting digital evidence in a manner that is legally acceptable and forensically sound.

Key Principle: Preserve the original, work on copies, document everything, maintain chain of custody.

The Forensic Process

📥
Acquisition
Create forensic image (bit-by-bit copy) of original media
🔐
Preservation
Secure original, verify hash, document chain
🔍
Examination
Search, recover, analyze data on work copy
📊
Analysis
Interpret findings, establish timeline, correlate evidence
📋
Reporting
Document methodology, findings, conclusions
🎯 Forensic Soundness Principles

1. No Alteration: Examination must not alter the original evidence

2. Competence: Examiner must be trained and qualified

3. Documentation: Complete record of all procedures and findings

4. Reproducibility: Another examiner following same steps should reach same results

5. Legal Compliance: All actions must comply with legal requirements

4.2

Forensic Imaging & Tools

💾 What is Forensic Imaging?

Forensic Image: A bit-by-bit, sector-by-sector copy of a storage device, including deleted files, slack space, and unallocated space. NOT a simple file copy.

Write Blocker: Hardware/software that prevents ANY writes to original device during imaging. Essential for maintaining integrity.

EnCase
Industry-standard forensic suite. Creates E01 format images. Widely accepted in courts.
FTK (Forensic Toolkit)
Comprehensive forensic analysis. Fast processing. Native viewer for many file types.
Cellebrite UFED
Mobile device forensics. Extracts data from phones, bypasses some locks.
Autopsy
Open-source forensic platform. Free. Good for basic examinations.
dd / dcfldd
Linux command-line imaging. Raw format. Used in combination with other tools.
Magnet AXIOM
Modern forensic platform. Cloud, mobile, computer analysis. Visual timeline.
✅ Image Verification

Before Examination: Calculate hash of forensic image. Compare with original device hash from seizure.

After Examination: Recalculate hash. Must match pre-examination hash (proving no alteration during examination).

Document: Hash values in examination notes. Include in report.

4.3

Expert Evidence under S.45 BSA

👨‍💻 Who Qualifies as Expert?

Qualifications:

• Formal education in computer science/forensics

• Certifications (EnCE, CCE, CFCE, CHFI)

• Training in forensic tools and methodology

• Experience in conducting examinations

• Prior court testimony experience (helpful)

Can Be:

• FSL (Forensic Science Laboratory) examiners

• Police cyber cell technical officers

• Private digital forensic consultants

• CERT-In empaneled experts

⚠️ Expert vs Fact Witness

Expert Witness: Gives OPINION based on specialized knowledge. Can interpret, analyze, conclude.

Fact Witness: States what they SAW, HEARD, DID. Cannot give opinions.

Example: IO can state "I seized the laptop" (fact). But "the data shows accused committed crime" requires expert qualification.

4.4

FSL Reports — Reading & Challenging

📋 Standard FSL Report Components

1. Case Details: FIR number, sections, referring officer

2. Evidence Received: Description of items, condition, seal status

3. Hash Verification: Hash at receipt vs seizure hash

4. Methodology: Tools used, procedures followed

5. Examination: What was searched, what was found

6. Findings: Data recovered, relevant files identified

7. Opinion: Expert's conclusions

8. Limitations: What couldn't be examined and why

🔴 Red Flags in FSL Reports

1. Hash Mismatch: Receipt hash ≠ seizure hash = integrity issue

2. Seal Already Open: Evidence arrived with broken seal

3. Methodology Not Stated: Vague on procedures followed

4. Tools Not Mentioned: What software was used?

5. Selective Examination: Only incriminating data reported, exculpatory ignored

6. Opinion Beyond Expertise: Legal conclusions instead of technical findings

7. No Verification Hash: No post-examination hash verification

✅ Requesting Re-Examination

Defence Right: Accused can request independent forensic examination

Application: File application before trial court under S.45 BSA

Grounds: Doubts about methodology, need for verification, specific queries

Expert: Can engage private forensic expert with court permission

Access: Court can direct FSL to provide forensic image copy

4.5

Cross-Examining Forensic Experts

⚔️ Cross-Examination Questions
  • Qualifications: "What certifications do you hold? When were they last renewed?"
  • Experience: "How many similar examinations have you conducted? How many times have you testified?"
  • Chain: "In what condition did you receive the evidence? Was the seal intact?"
  • Hash: "Did you verify the hash before examination? What was the result?"
  • Write Blocker: "Did you use a write blocker? Which one? Was it verified?"
  • Tools: "What version of EnCase/FTK did you use? Is it the latest? Any known bugs?"
  • Deleted Data: "Could deleted data be recovered? Did you try? What did you find?"
  • Attribution: "Can you say WHO created this file? Or just that it exists on this device?"
  • Timestamps: "Are these timestamps reliable? Could they be manipulated?"
  • Anti-Forensics: "Did you check for anti-forensic tools? Evidence of tampering?"
  • Exculpatory: "Did you look for evidence that might help the accused? What did you find?"
  • Limitations: "What couldn't you determine from this examination?"
🎯 Key Attack Points

1. Qualification Gap: Expert lacks relevant certification or training

2. Integrity Break: Hash mismatch or broken chain

3. Methodology Flaw: Improper procedures, no write blocker

4. Attribution Problem: Can't prove WHO used the device at relevant time

5. Alternative Explanation: Malware, remote access, shared device

6. Selective Analysis: Only looked for incriminating evidence

7. Tool Limitation: Software has known issues with this file type

🎯 Key Takeaways — Part 3.4

  • Digital forensics follows: Acquisition → Preservation → Examination → Analysis → Reporting
  • Forensic image is bit-by-bit copy including deleted data — NOT simple file copy
  • Write blocker is essential to prevent alteration of original evidence
  • Common tools: EnCase, FTK, Cellebrite (mobile), Autopsy (open source)
  • S.45 BSA explicitly includes electronic evidence experts
  • Expert must have qualifications, training, and experience in digital forensics
  • FSL report must document: methodology, tools, hash verification, findings
  • Red flags: hash mismatch, broken seal, vague methodology, selective examination
  • Defence can request independent forensic examination
  • Cross-examination targets: qualifications, chain, hash, attribution, methodology

📝 Quick Assessment — Part 3.4

1. A forensic image differs from a regular file copy because it:
Correct: B. Forensic image is bit-by-bit copy capturing everything including deleted files, slack space, and unallocated areas.
2. A write blocker is used to:
Correct: C. Write blocker prevents ANY writes to original device, maintaining evidence integrity during imaging.
3. S.45 BSA allows expert opinion on:
Correct: A. S.45 BSA explicitly includes "electronic signature, electronic record, computer resource including storage media."
4. A red flag in an FSL report would be:
Correct: D. Hash mismatch indicates evidence may have been altered between seizure and examination — major integrity issue.
5. In cross-examining a forensic expert, you should ask about:
Correct: B. Comprehensive cross-examination covers qualifications, methodology, hash verification, tool limitations, and attribution issues.