School of Information Systems

Tips for acquisition in digital forensic investigation

Acquisition is a crucial phase in digital forensic investigations, as it involves collecting digital evidence in a way that preserves its integrity and ensures it remains admissible in court. Here are some tips for the acquisition phase in digital forensic investigations:

1. Plan and Document:

Develop a clear acquisition plan that outlines the scope, objectives, and methodologies to be used. Document every step of the acquisition process, including dates, times, and individuals involved.

2. Use Write-Blocking Devices:

Always use write-blocking hardware or software tools to prevent any unintentional modification or contamination of the original data. This ensures that the integrity of the evidence is preserved.

3. Verify Write-Blocking:

Before acquiring data, verify that write-blocking tools are functioning correctly by testing them on a known, disposable device. Document the verification process.

4. Document the Device’s State:

Document the state of the device or media being acquired, including its power state, open applications, and any external devices connected. This information can be vital for understanding the context of the evidence.

5. Create Forensic Images:

Create forensic images (bit-for-bit copies) of the digital storage media. These images should include not only the active file system but also unallocated space, slack space, and deleted files.

6. Hash Verification:

Calculate cryptographic hash values (e.g., MD5, SHA-1, SHA-256) for the acquired images. Verify these hash values against known originals to ensure the integrity of the images.

7. Multiple Copies:

Make multiple copies of the acquired data for redundancy and safety. Store copies securely to prevent data loss.

8. Documentation of Tools:

Document the specific tools and software used for acquisition, including version numbers and settings. This information may be required for authentication and validation in court.

9. Chain of Custody:

Maintain a strict chain of custody for the acquired evidence. Document every transfer or handling of the evidence, including who had access and for what purpose.

10. Maintain Original Evidence:

Preserve the original digital media in its unaltered state, especially if it’s evidence in a criminal case. Any further analysis should be performed on the forensic image.

11. Data Verification After Transfer:

Verify the integrity of the data after transferring it to another storage medium or system to ensure that the transfer process did not introduce errors.

12. Secure Storage:

Store the acquired images and original evidence securely in a controlled environment with access restricted to authorized personnel.

13. Documentation of Storage Conditions:

Document the conditions of the storage environment, including temperature, humidity, and security measures, to maintain the integrity of the evidence.

14. Legal Compliance:

Ensure that all acquisition procedures comply with applicable laws and regulations. Obtain necessary legal permissions or warrants.

15. Continuity Checks:

Conduct continuity checks to ensure that all relevant evidence has been collected and that nothing has been overlooked.

16. Maintain a Working Copy:

In some cases, it may be beneficial to create a working copy of the evidence for analysis, leaving the original image untouched.

17. Prepare for Testimony:

If the investigation leads to legal proceedings, prepare digital forensic experts to testify about the acquisition process and the integrity of the evidence.

18. Stay Current:

Keep up to date with the latest tools, techniques, and best practices in digital forensics to ensure that your acquisition methods are both effective and legally sound.

By following these tips, digital forensic investigators can acquire evidence in a way that ensures its integrity, maintains its admissibility in court, and supports a thorough and accurate analysis during subsequent phases of the investigation.

Joni Suhartono