Time
7 hours 36 minutes
Difficulty
Advanced
CEU/CPE
7

Video Description

This lesson covers the preservation phase of investigation. This must take place quickly to make sure evidence of preserved accurately. Investigators must take careful and accurate notes and record information such as times and actions taken and be sure to initial and sign off on everything.

Video Transcription

00:04
so moving on from the preparation phase, we go into the preservation phase.
00:10
So the first part of the preservation phases that when encountering system
00:15
investigators must perform a rapid assessment of activity to ensure the preservation of any evidence. So what that means is being able to look at the system and being able to determine
00:28
if something is happening on that machine that essentially going to change state and damage any type of evidence that's going to occur and not just on the system, but maybe in the room where you find the system. So having that situation, awareness of not just
00:46
machine, but your entire surroundings,
00:49
eyes going to age you and being able to preserve all of that evidence. So one of the first things that the investigators going to want to do is part of that preservation process is to take notes,
01:03
and the note taking essentially relates what happened during the investigation.
01:11
A note. You're going to be very important, especially when you
01:15
where if you have to get court often times, a defense attorney will not necessarily attack the evidence per se, but they're going to attack the investigator, which would be you
01:27
and any little thing that they could find that you did wrong during your investigation, they're going to try and pick that apart and destroy your case. That's why it is right importance that you record in detail every action that you take
01:46
from the time that you become aware of the incident
01:49
time you complete your your essential investigation on your notes.
01:57
So here are some key note taking, um
02:01
point. So the first thing that you're gonna want to do is write in pink. Obviously, writing in pencil would subject your notes to change. Writing an ink essentially makes them permanent.
02:13
And then you're going to want to put your name and organization on the first line or the top of the page,
02:17
the location of where the incident occurred, to the smallest detail. So not just the address of 123 Main Street. But if you have a suite number, office number, desk number down to that very small granular detail,
02:32
you'll want to list any individuals who are present at the time of you. Acquiring that data are responding to the inside
02:44
on more enforcement investigations. They generally have a crime scene, tape up
02:49
and anyone who comes in and out of the crime scene. Their name must be written down on that on that log.
02:57
So on from that we have the initial each page
03:01
and putting a number on each page.
03:05
And then we want to cross out any mistakes that we make on her notes and, well, initial above them.
03:09
We must include any diagrams. Photographs that we make in our notes are referenced them and make them available.
03:19
At the end of the notes, we would include the statement. Nothing follows,
03:23
and then we detail any and all actions that we take. Something simple is arriving on the scene and securing the scene that should appear in your notes
03:36
and then very granular details about the operating system to include any information that we we return from the OS from any commands that we enter.
03:46
If we find any media laying around percent, we find a thumb drive, which we're gonna get into later. In the hands on portion, we have to write the granular detail. I found a gray Sandis cruiser 2.0 gigabyte thumb drive with serial number 1234
04:05
on the back,
04:06
and then lastly, we're gonna want to include a known good local time and and and take the source of where we obtain that
04:14
that known good local time will help us normalize all the times that we find throughout our investigation to that one time
04:23
so often. Systems may not be septic the appropriate time. You have a
04:30
suspect who's particularly savvy. They made crying and
04:34
finagle the settings the clock in order to help office Kate. Some of their activities said, including a known good local time on imitating that on your notes is a key importance.
04:46
So here's an example of the notes.
04:49
And as you can see,
04:51
uh, the top of the page, I have the
04:57
the title of investigator notes. We have our case. 1234
05:01
Um, if you are working particularly in an incident response office, you may have an incident response number. So that case member may replace that incident Response number three investigators names. But my name there,
05:15
your organization that you're doing this forensic investigation for and then, uh, the section headings dating time. The actions that were taken in the results
05:29
so essentially a week
05:30
respond to the incident on first of August 2016
05:34
we arrived at the scene of 123 Main Street. Any town Maryland. 12345 zip code.
05:42
And then from there we obtained a known good local time. You know you can use on Internet restore, such as time and date dot com. You can also use your cell phone
05:55
just as long as you annotate where that time came from.
05:59
And then the next thing that we see in her notes is that we
06:01
secured the scene and then any individuals that were present, we can attach a roster. Who was there?
06:11
Hopefully this third step you've already completed before you got to the incident scene. But in case you did not use any, you can wipe the media and then annotate that in your notes on, We'll show you how to white media using the in case
06:30
forensic
06:31
imager and the hands on section
06:34
and then down at the bottom, you can see the title of nothing follows,
06:39
followed by an investigator, Signature and Paige,
06:44
one of one.
06:48
So in conjunction with notes, photography will help build credence to your investigation and help keep track of what was done during your investigation,
07:01
and it is often the best way to record information of the scene. You can sit and write a lot
07:10
on. Essentially, write the novel War in Peace or I can take a photograph of it and write some cursory notes of what happened. I'm not in favor of writing warm piece. I would just rather take a photograph
07:23
of the scene and record that in my notes section.
07:28
Considerations, though, when using photography is that a flash can cause reflection onto the screen, which can distort your image and make it not usable.
07:42
Also, string refresh rates can obscure your photography,
07:46
so you're gonna want to use a slow shutter speed, usually about 1/60 of a second. That's about the refresh rate of most screens in the United States. I think overseas use a 1/50 of a second refresh rate.
08:01
However, the slower the shutter speed you can use, the better it's going to be.
08:07
However, if you get a lot slower than 1/60 because the shutter speed
08:13
eyes so slow, it's going to require a lot of balance and steadiness and your hands, and you're probably not going to be able to do that without the use of a tripod,
08:24
eso, once 1 60 of a second, is generally the recommended speed, especially for hand photography.
08:33
That being said, it's very important to know your equipment.
08:35
The time to figure out how your camera works is before you respond to the incident, not during. So if you get one of these very expensive DSLR cameras,
08:48
figure out how it works before you get there.
08:50
And then the old mantra to is one and one. It's none, even if you have this very nice, expensive,
08:58
uh, DSLR camera. If it's the only one you have, it's gonna break when you need it most. So having something as a backup, even an iPhone eyes better than nothing,
09:11
and they never all with photographs, because any evidence that you take, especially if you're gonna go to court,
09:16
it needs to be admissible, and you have to qualify that evidence. Altering the evidence after you take a picture essentially makes those photographs unusable in court process. And then after you take the photographs, you're gonna want hash stood of graphs,
09:37
and then we go into some detail on the hands on portion of how to use MD five cash.
09:43
We're going to hash a memory file that we
09:48
are going to create
09:50
from volatile memory from a system. The same process of running empty five hash on evolved memory file is applicable to any type of flower in ash. One file. You could hash,
10:03
but we'll show you how to to do the MD five passions.

Up Next

Incident Response and Advanced Forensics

In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery.

Instructed By

Instructor Profile Image
Max Alexander
VP, Cybersecurity Incident Response Planning at JPMorgan
Instructor