Computer Forensic & Investigation

bitmeorg
20 Jul 200809:32

Summary

TLDRIn this interview, computer forensic expert Richard Marov discusses the growing role of computers in investigations, from gathering evidence to analyzing it. He highlights the varying levels of tech-savviness among police and criminals, the importance of data interpretation in legal cases, and the challenges of adapting traditional investigative methods to digital evidence.

Takeaways

  • 📺 Computers are increasingly central to investigations in crime shows and legal thrillers, reflecting their growing role in real-world forensics.
  • 👨‍💼 Richard Marov, an IT consultant turned computer forensic expert, discusses the importance of computer forensics in modern investigations.
  • 🔍 The level of understanding of computer forensics among police departments and investigators varies widely, from knowledgeable to completely unfamiliar.
  • 🤔 Disagreements often arise not from what is found on a computer hard drive, but from the interpretation of the evidence and its implications.
  • 📑 Evidence in computer forensics includes not only hard drive data but also printouts that may contain hidden metadata like serial numbers and timestamps.
  • 🕵️‍♂️ The ability to trace the origin of emails and identify whether they were spoofed is crucial in cases involving digital threats or harassment.
  • 📈 Both civil and criminal cases can involve computer forensics, with experts often analyzing data for both prosecution and defense.
  • 😮 Criminals' computer literacy ranges from naivety about the permanence of deleted files to sophisticated encryption techniques to hide incriminating information.
  • 📱 Mobile devices, like smartphones, are becoming a common source of evidence due to their advanced capabilities and storage of call records and other data.
  • 👮‍♂️ Law enforcement has established procedures for handling digital evidence, including making copies before analysis to ensure a fair defense.
  • 🌐 Legal frameworks for acquiring digital evidence differ by country, with varying privacy laws and methods for obtaining data in criminal and civil cases.
  • 📚 The field of computer forensics is evolving, with experts now expected to provide more detailed analysis as judges and lawyers become more knowledgeable and discerning.

Q & A

  • What is the significance of computers in modern investigations?

    -Computers play a crucial role in modern investigations as they are used for evaluating and gathering evidence. Evidence that used to be on paper is now often stored on computer hard drives, making computer forensics a vital part of legal and criminal cases.

  • What is the background of Richard Marov, the computer forensic expert mentioned in the script?

    -Richard Marov is an IT consultant who found a growing demand for computer forensic investigation due to the increasing use of computers in various businesses and activities. He helps in analyzing and interpreting digital evidence in legal cases.

  • How knowledgeable are police departments and investigators about computer forensics?

    -The level of knowledge varies among police departments and investigators. Some are well-versed in the subject, while others may have a limited understanding, often requiring the expertise of computer forensic experts to interpret the evidence correctly.

  • What kind of evidence can be found on a computer hard drive?

    -Evidence on a computer hard drive can include data files, computer printouts that may contain serial numbers, time, and date stamps, and other digital artifacts that can be crucial in legal investigations.

  • How does the interpretation of digital evidence differ between different parties in a legal case?

    -Disagreements often arise in the interpretation of digital evidence. While one side might have a narrow interpretation, experts like Richard Marov can provide a broader view, suggesting multiple scenarios that could explain the evidence.

  • What role do computer printouts play in legal cases?

    -Computer printouts can serve as important evidence in legal cases. Some printers include serial numbers and timestamps on printouts, which can help trace the origin of the document and its authenticity.

  • How is the anonymity of digital communication, like emails, perceived in legal investigations?

    -Contrary to popular belief, digital communication is not anonymous. Investigators can often trace the source of emails and other digital messages, which can be crucial in cases involving threats or harassment.

  • What types of cases typically involve computer forensic experts?

    -Computer forensic experts are involved in a broad range of cases, both criminal and civil. They may work for the prosecution, defense, or help in the analysis of digital evidence in legal disputes.

  • How do criminals handle digital evidence, and how does this affect investigations?

    -Criminals vary in their handling of digital evidence. Some may mistakenly believe that deleting a file removes it from their computer, while others use sophisticated encryption to hide information. These actions can provide clues to investigators.

  • What are some challenges in dealing with digital evidence from mobile devices like smartphones?

    -Mobile devices like smartphones can contain significant amounts of evidence, such as call records and frequently called numbers. Investigators must follow proper procedures, such as making copies of data, to ensure the integrity of the evidence and its admissibility in court.

  • How do laws and procedures for acquiring digital evidence vary across different countries?

    -Laws and procedures for acquiring digital evidence can vary significantly by country. Privacy laws, for example, differ, affecting how data can be legally obtained and used in investigations.

Outlines

00:00

💻 The Role of Computers in Modern Investigations

In this paragraph, the discussion revolves around the increasing importance of computers in crime and legal investigations. Richard Marov, a computer forensic expert, explains how computers have become integral to gathering and evaluating evidence. He highlights the varying levels of understanding among police departments and investigators regarding computer forensics. Marov also discusses the challenges in interpreting digital evidence and the importance of having experts who can provide a realistic view in trials. Additionally, he mentions the types of evidence he deals with, such as data on hard drives and computer printouts, and how certain printers can embed serial numbers and timestamps in their prints, adding a layer of traceability to digital evidence.

05:01

📱 Expanding the Scope: Mobile Devices and Digital Evidence

This paragraph delves into the role of mobile devices like smartphones and PDAs in forensic investigations. Richard Marov notes that these devices, with their increasing capabilities, can hold crucial evidence such as call records and frequently contacted numbers. He emphasizes the importance of proper procedures in handling digital evidence, such as making copies of data before analysis. Marov also touches on the legal aspects of data acquisition, highlighting differences in privacy laws and methods of obtaining data across various jurisdictions. The conversation also briefly touches on the challenges of tracing the source of instant messages and the evolving sophistication of both investigators and criminals in the digital realm.

Mindmap

Keywords

💡Computer Forensics

Computer forensics is the process of collecting, analyzing, and preserving digital evidence in a legally acceptable manner. In the video, Richard Marov, a computer forensic expert, discusses how this field is crucial in modern investigations, as evidence that was once on paper is now often stored on computer hard drives. The concept is central to the video's theme, highlighting the importance of understanding digital data in legal proceedings.

💡IT Consultant

An IT consultant is a professional who provides advice and support in the field of information technology. Richard Marov mentions that he started as an IT consultant and then transitioned into computer forensics due to the growing demand for expertise in this area. This keyword is significant as it sets the stage for understanding Richard's background and his transition into a role that is more focused on legal and investigative aspects of technology.

💡Evidence Interpretation

Evidence interpretation refers to the process of analyzing and understanding the meaning behind collected evidence. In the script, Richard discusses how disagreements often arise not from what is found on a hard drive, but from how it is interpreted. This concept is key to the video's narrative, emphasizing the role of experts in providing a realistic view of digital evidence in legal cases.

💡Hard Drive

A hard drive is a data storage device used in computers and other devices. The script frequently mentions hard drives as a primary source of digital evidence in investigations. Richard explains that data on hard drives can be crucial in legal cases, and understanding what is stored there is essential for both investigators and the court.

💡Printers and Serial Numbers

Printers can sometimes embed information such as serial numbers, time, and date in the documents they print. Richard mentions this as an example of how even physical documents can contain digital evidence. This keyword is relevant as it expands the concept of digital evidence beyond just hard drives, showing that various devices can provide crucial information in an investigation.

💡Email Spoofing

Email spoofing is the practice of sending emails with a forged sender address to deceive recipients. In the video, Richard discusses cases where he has been involved in tracing the origins of emails, particularly those that are threatening or contain offensive content. This concept is important in the video as it demonstrates the complexity of digital communication and the need for experts to verify the authenticity of digital messages.

💡Prosecutors and Judges

Prosecutors and judges are legal professionals involved in the criminal justice system. The script mentions that these individuals may not fully understand the technical aspects of digital evidence, such as email headers, and thus rely on experts like Richard to provide clarity. This keyword is significant as it underscores the role of computer forensic experts in educating and assisting legal professionals in understanding digital evidence.

💡Mobile Devices

Mobile devices like cell phones and PDAs are increasingly used as sources of evidence in investigations. Richard mentions that these devices, which are essentially miniature computers, can contain important data such as call logs and contacts. This keyword is relevant as it highlights the expanding scope of digital evidence collection beyond traditional computers.

💡Encryption

Encryption is the process of converting data into a code to prevent unauthorized access. Richard discusses how criminals sometimes use sophisticated encryption to hide information, which can be an indicator of valuable evidence. This keyword is important in the video as it shows how criminals attempt to protect their digital activities and the challenges investigators face in accessing this data.

💡Anton Pillar Order

An Anton Pillar order is a court order used in civil cases that allows one party to search and seize documents from another party. Richard mentions this in the context of acquiring digital evidence in civil matters. This keyword is significant as it provides an example of legal procedures that can be used to obtain digital evidence, illustrating the intersection of law and technology.

💡Expert Witnesses

Expert witnesses are professionals who provide testimony in court based on their specialized knowledge. Richard's role as a computer forensic expert often involves acting as an expert witness, explaining complex digital evidence in a way that is understandable to the court. This keyword is central to the video's theme, emphasizing the need for experts to translate technical information into a legal context.

Highlights

Computer forensics is increasingly important in investigations as evidence shifts from paper to digital formats.

Richard Marov, an IT consultant, discusses the growing demand for computer forensic investigation in various businesses and scenarios.

Police departments and investigators vary in their understanding and use of computer forensics in cases.

Disagreements often arise not from the evidence found on a hard drive, but from its interpretation.

Computer forensic experts are crucial in providing a realistic view of digital evidence during trials.

Evidence in computer forensics can include data on hard drives, computer printouts, and other digital artifacts.

Some printers embed serial numbers and timestamps in printouts, providing additional evidence in cases.

The ability to trace the origin of emails and identify whether they were sent anonymously or spoofed is a key aspect of computer forensics.

Prosecutors, judges, and juries often require experts to explain the technical aspects of email headers and digital evidence.

Richard Marov primarily works in civil cases, assisting both prosecution and defense with computer forensic analysis.

Criminals vary in their computer literacy, with some using simple deletion methods and others employing sophisticated encryption.

Mobile devices like smartphones and PDAs are increasingly relevant in computer forensic investigations.

Police have established procedures for handling digital evidence, such as making immediate copies of data.

The need for a proper defense involves providing a copy of original data to both sides for expert analysis and interpretation.

Laws and procedures for acquiring digital evidence vary significantly between countries, affecting how investigations are conducted.

Experts in computer forensics must be able to explain complex technical findings in plain English for non-expert audiences.

Judges and lawyers are becoming more knowledgeable about computer forensics, leading to more detailed analysis requirements.

The evolution of computer forensics has led to more in-depth questioning and a deeper understanding of digital evidence by the legal system.

Transcripts

play00:08

you all my uh years of TV watching I

play00:10

never once saw columbos said oh yeah

play00:12

there's one more question where's the

play00:14

hard drive but nowadays if you watch

play00:17

crime shows or legal Thrillers or 24

play00:19

anything like that you know computers

play00:21

really are a big part of Investigations

play00:23

they're used for everything from

play00:24

actually evaluating evidence uh to going

play00:27

out and Gathering it today we're joined

play00:28

by a computer forensic expert Richard

play00:30

marov from mov.com he's here to talk

play00:34

about how computers are being used to

play00:35

bring the bad guys to Justice Richard

play00:37

it's good to have you welcome glad to be

play00:38

here so you do a lot of uh expert you

play00:40

were originally an it yes yes I'm an IT

play00:43

consultant and then uh I just found that

play00:45

there was a growing demand for this

play00:47

computer forensic investigation because

play00:50

computers are being used everywhere

play00:51

these days in all sorts of businesses

play00:53

and all sorts of things and a lot of the

play00:55

evidence that used to be on paper is now

play00:57

on a computer hard drive somewhere how

play00:59

how Savvy do you find that police

play01:01

departments and investigators are about

play01:03

this kind of thing yeah it varies it

play01:05

varies I mean some uh really know what

play01:07

they're talking about others just like

play01:09

well I don't know we got this you know

play01:11

computer stuff and and and you know I

play01:14

find that in these cases there's usually

play01:17

not much disagreement about what's on

play01:18

the hard drive where the disagreement

play01:20

comes is the interpretation what does

play01:22

this mean right right and so sometimes

play01:25

what happens is they find the other side

play01:26

they just have a very narrow

play01:27

interpretation saying the only way this

play01:28

could have happened is this and I say

play01:31

well no there's actually about 10 other

play01:32

scenarios that could happen as well so

play01:34

that's why somebody who really

play01:35

understands computers is very important

play01:36

in this kind of setting especially in

play01:38

trial to to to give you a realistic view

play01:41

of what what's going on here absolutely

play01:43

so you say you know no I mean you have a

play01:45

very narrow-minded view of why this

play01:48

thing occurred or or sometimes they have

play01:50

an entirely different interpretation so

play01:52

so it's it's that sort of uh analysis

play01:55

and interpretation that tends to be key

play01:56

in these cases is it mostly data on a

play01:58

hard drive that you deal with or what

play02:00

other kind of evidence would you be

play02:01

dealing with uh data in the hard drive

play02:04

sometimes uh there's things like

play02:06

computer printouts for example I mean

play02:08

there's some printers for example it's

play02:09

not necessarily well known but there's

play02:11

some printers that when you print out a

play02:13

page they actually put in the serial

play02:16

number and the time and date of the

play02:18

print out so I mean there's all sorts of

play02:20

you know evidence uh that you know that

play02:22

can come to bear in a case yeah I know

play02:23

there was a big brewhaha a few months

play02:25

ago about the Xerox docu color because

play02:26

they put dots on the page and say who

play02:28

printed it exactly but but you know in

play02:31

the old days a detective uh could look

play02:33

at a typewritten message and figure out

play02:35

which typewriter came from so this is

play02:36

just the same kind of thing for a

play02:37

computer exactly it's sort of a

play02:39

different way of looking at the same

play02:40

thing but you know it came as a shock to

play02:41

a lot of people that this is that that

play02:44

this can be done they thought they were

play02:45

Anonymous or people think they can send

play02:47

send a nasty hate email anonymously uh

play02:50

uh you know but that's not the case oh

play02:52

so you get involved in stuff like that

play02:53

to tracking down who sent that email

play02:55

exactly sometimes people say hey I've

play02:57

got this email here somebody is

play02:59

threatened me uh or said something nasty

play03:02

uh you know who sent it did it really

play03:04

come from this person they denied they

play03:06

sent it you know maybe it was spoofed or

play03:08

maybe the person sent it and then later

play03:10

decided to to deny it so well I'm sure

play03:13

that comes up because prosecutors judges

play03:15

and juries don't necessarily understand

play03:17

what can and cannot be done with an

play03:18

email header so they need somebody like

play03:21

you to come in and say exactly so I look

play03:23

at the header and say yes this appears

play03:24

to be legitimate or no it looks like

play03:26

somebody tried to try to spoof it you

play03:28

know it didn't really come from Bill

play03:30

Gates and Microsoft assume that that's

play03:32

the case what what are some of the kinds

play03:34

of cases are they mostly criminal are

play03:36

they civil imagine it's a broad range

play03:38

it's a broad range I would tend to get

play03:39

involved mainly in uh civil cases uh you

play03:42

know both both for the prosecution uh

play03:44

and the defense as far as criminal goes

play03:47

the uh police you know in terms of

play03:49

prosecution they have their own experts

play03:51

I would get involved some cases in in

play03:53

terms of criminal defense helping out

play03:55

people who were the police say this is

play03:57

what it was exactly the defense may say

play03:59

well wait a minute you know not so fast

play04:00

there exactly so usually if there's a

play04:02

computer involved both both sides in the

play04:04

process if it's important element they

play04:05

will have their own computer expert

play04:07

involved to analyze and interpret the

play04:09

data and you know can present their uh

play04:12

their opinion as to what it means I

play04:13

asked you how Savvy uh law investig law

play04:16

law officers were how savvy are the

play04:17

crooks are they pretty computer literate

play04:21

uh it depends too I mean you know

play04:23

sometimes they really don't know what

play04:25

they're doing or they think that if they

play04:26

delete a file that's really gone from

play04:27

their computer uh you know and it isn't

play04:30

and other times they're into you know

play04:32

very sophisticated encryption trying to

play04:34

hide things which of course also tells

play04:36

you some evidence too like well if this

play04:38

is encrypted highly encrypted well maybe

play04:40

there's some key information in there

play04:41

that's very valuable I once asked the

play04:44

Secret Service you know what do you do

play04:46

if because I mean there is strong

play04:46

encryption that nobody can crack what do

play04:48

you do if it's encrypted and they said

play04:49

well we find that people usually give us

play04:51

a password if we ask oh well that's one

play04:54

way to do it yeah I guess so just ask

play04:57

you know makes it easy uh sometimes I

play04:59

guess there is tendency among criminals

play05:01

sometimes to confess you know they want

play05:02

to they want to get it off their chest

play05:04

uh so we've talked about hard drives uh

play05:07

what about mobile devices like cell

play05:08

phones and pdas does that come up

play05:10

sometimes too uh that comes up too I

play05:12

mean now that they're becoming more

play05:13

capable I mean you look at what's in a

play05:15

lot of these uh new smartphones and they

play05:17

really are like miniature PCS they have

play05:19

their own processor they have their own

play05:21

memory you know they have records of uh

play05:24

phone calls made and it can be important

play05:26

evidence uh you in a particular case you

play05:28

know who called who when who's in the

play05:31

database of uh you know of frequently

play05:33

called numbers the the police have

play05:35

pretty good procedures now for this kind

play05:36

of thing I mean they established you

play05:38

know like for instance you make an

play05:39

immediately make a copy of the data

play05:41

before you touch it that kind of thing

play05:42

or yes yes yes because uh you know I

play05:45

mean in order to have a proper uh

play05:47

defense you have to have a copy of the

play05:50

original data made available to the

play05:52

other side to say hey here's here's what

play05:54

the police used in terms of their

play05:56

investigation you have to make a copy

play05:57

for the other side say fine you get your

play05:59

expert to analyze and interpret it and

play06:01

you know so we're both starting at the

play06:02

same base as opposed to you know only

play06:04

looking at what the police expert said

play06:06

that's all new for them I mean they had

play06:07

good evidentiary procedures for you know

play06:09

fingerprints and and and shoes and and

play06:12

hair but hard drives this is all new

play06:15

they had to figure this out from scratch

play06:16

it is new uh but uh from my experience I

play06:19

tend to do a pretty good job at least in

play06:21

this area on it and uh you know just

play06:23

give me the evidence and I you know I'll

play06:25

look at it and come up with uh uh with

play06:27

my opinion on it uh how about now we're

play06:30

seeing of course in Canada Australia the

play06:32

Philippines all over the world the the

play06:34

laws of this kind of thing vary from

play06:36

country to country or is it all pretty

play06:37

consistent uh well laws do vary of

play06:39

course privacy laws of course is very

play06:41

different all yes and and like I'm not a

play06:43

lawyer but I mean there's different ways

play06:45

of acquiring the data I mean for example

play06:47

I mean uh if it's a criminal matter you

play06:49

know somebody has to get a search

play06:51

warrant right um here in Canada for

play06:54

example if it's civil matter there's

play06:55

something called an Anton pillar order

play06:57

which is roughly equivalent in which you

play06:59

can basically you know go to somebody

play07:01

and say yeah you know Discovery exactly

play07:03

we you know we want this data and of

play07:05

course as we know in the States you

play07:06

don't need a warrant anymore you do

play07:07

anything you want what are some of the

play07:09

weirdest things you've heard of people

play07:10

hiding and and where they've hidden them

play07:13

well there's all sorts of different

play07:14

things and people get concerned about

play07:16

some things and and yeah you know I get

play07:18

uh I got a call once this this is not a

play07:20

case I accepted but you know there was

play07:22

this woman who's very concerned about

play07:25

some instant messages being sent uh uh

play07:28

you know and this was about instant

play07:29

messages that were that that were

play07:30

apparently were nasty grams about we got

play07:33

that call didn't we we got that call on

play07:35

the show after they talked to you

play07:36

Richard I think she called us and what

play07:39

did you you said H honey you find

play07:41

somebody else to help you on this one

play07:42

well I said you know it's you know if

play07:44

you want to trace back who you know

play07:46

which 12-year-old child is sending

play07:47

messages you know about your 12-year-old

play07:49

child is it going to cost you a lot of

play07:51

money she already went to the police and

play07:52

the police you know weren interesting

play07:54

yeah yeah have there been lately

play07:56

landmark cases in this area that we case

play07:58

law that things have come up things

play08:00

always come up uh you know I think uh

play08:04

what I find is that uh judges and

play08:06

lawyers are becoming more Savvy in the

play08:08

area and they're asking deeper questions

play08:10

than before so what that means is that

play08:13

from the expert point of view I'm having

play08:15

to do more detailed analysis where maybe

play08:18

I could have done a very simple report a

play08:20

few years ago uh based on three or four

play08:22

hours worth of work now I might have to

play08:24

do a week's worth of work on something

play08:26

because there's some very detailed

play08:28

questions about things that they want

play08:30

answer I think in the long run that's

play08:31

good that means they're understanding it

play08:33

better and and they're and they're

play08:34

digging deeper absolutely I mean there

play08:36

is a greater understanding of what's

play08:37

going on I mean I mean the judges and

play08:38

the lawyers they are not computer

play08:40

experts but they are generally smart

play08:42

people and so it's a matter in you know

play08:45

from the work I do I have to be able to

play08:47

take this computer jargon and sort of

play08:49

explain it to them in plain English and

play08:51

sometimes that means putting in charts

play08:52

graphs you know explaining things that

play08:55

are easy to understand for people who

play08:56

are not computer exer but who are smart

play08:58

people you're not dumbing it down you're

play09:00

just making it accessible they need to

play09:02

know it yeah it makes perfect sense well

play09:04

if people need a

Rate This

5.0 / 5 (0 votes)

相关标签
Computer ForensicsCrime InvestigationLegal DisputesData AnalysisEvidence GatheringExpert TestimonyIT ConsultantCybersecurityDigital EvidenceTrial Analysis
您是否需要英文摘要?