Computer Forensics Field Triage Process Model

被引:1
作者
Rogers, Marcus K. [1 ]
Goldman, James [1 ]
Mislan, Rick [1 ]
Wedge, Timothy [2 ]
Debrota, Steve [3 ]
机构
[1] Purdue Univ, Comp & Informat Technol Dept, W Lafayette, IN 47907 USA
[2] Natl White Collar Crime Ctr, Richmond, VA USA
[3] US Attorneys Off Southern Indiana, Indianapolis, IN USA
关键词
Computer forensics; process model; triage; computer crime; cyber crime; digital evidence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s). The Cyber Forensic Field Triage Process Model (CFFTPM) proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s)/media back to the lab for an in-depth examination or acquiring a complete forensic image(s). The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s)/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model's forensic soundness, investigative support capabilities and practical considerations.
引用
收藏
页码:19 / 37
页数:19
相关论文
共 19 条
  • [1] [Anonymous], 2000, AM HERITAGE DICT ENG
  • [2] Beebe N, 2004, DFRWS JUN 2004 BALT
  • [3] Carrier B., 2003, INT J DIGITAL EVID, V2, P20
  • [4] Casey E., 2004, DIGITAL EVIDENCE COM
  • [5] Casey E., 2001, HDB COMPUTER CRIME I
  • [6] DeBrota S., 2005, COMPUTER FORENSIC AN
  • [7] Farmer D., 2005, FILE SYSTEM FORENSIC
  • [8] Institute for Security Technology Studies, 2004, LAW ENF TOOLS TECHN
  • [9] Lee H.C., 2001, H LEES CRIME SCENE H
  • [10] National White Collar Crime Center, 2005, REG WIND NT 20 UNPUB