Determine the investigation type since it will influence the data you need, the scope, extent and strategy.
β οΈ It’s a very important thing to note in case of IP (intellectual property cases). Ensure, that data and devices of the suspect are IMMEDIATLY preserved and not accessed by anyone. I guess that’s because of the timestamps.
- β What is the case about?
- β What evidence do we expect to recover?
- β Where is the evidence most likely located?
- β What are the legal restrictions?
- β Who is involved and what’s their role?
Develop a plan to collect the data. Each type of data will require separate plan. This plan should prioritise the sources and the order. For example, if you are dealing with a system that is turned on, first, take photos of the screen, then collect the volatile data (RAM) and them make a copy of a hard drive. Then turn it off and send to the lab in a safety bag. Maintain chain of custody.
π For several different case make a checklist
Exfiltration
It usually means that someone has leaked some confidential information. It also usually means, that the person would exfiltrate it to one person only, i.e. you would be looking for e-mail or chat conversations invlolving just two parties (no CC or BCC).
IP cases questions
- β What processes did the suspect perform in order to get IP from the building?
- βHow the suspect accessed email accs?
- βCloud β οΈ storage used?
- βRemote transfer?
- βDVDs/CDs/USBs?
- βSuspects negotiating salary and benefits with the competitors?
- βWas he/she selling the information?
- βMass deletion or drive wiping?
E-discovery
Electronic aspects of identifying, collecting and producing electronically stored info in response to a request for production in a lawsuit or investigation (emails, websites, docs). βοΈFocused on the metadata, not the data itself! How, when and where was the doc created?
- βHow, when and where was the doc created?
- β What is the case about?
- β What evidence do we expect to recover?
- β Where is the evidence most likely located?
- β What are the legal restrictions?
- β Who is involved and what’s their role?
π‘ May be it’s better to arrange it as a table. Merge with the information from Cyber Triage DFIR webinar by Brian Carrier and Digital Archaeology.