Chapter 5 Β· AICITSS Cyber Security

Digital Forensic Process

An interactive guide to the systematic stages of a digital forensic investigation β€” from first identification of evidence to final court presentation. Includes sample document formats used in real investigations.

πŸ”¬ 5 Core Stages
πŸ“‹ 6 Sample Document Formats
πŸ”— Interactive Process Flow
πŸŽ“ AICITSS Curriculum
πŸ”­

What is the Digital Forensic Process?

A structured, legally admissible approach to investigating digital devices and systems

The Digital Forensic Process is a systematic and methodical investigation of digital devices, systems, and networks to gather and analyze digital evidence for legal purposes. It follows a strict structured approach to ensure the integrity and admissibility of evidence in court.


Every step must be documented, every piece of evidence handled carefully, and every conclusion backed by verifiable data. The entire process can be divided into 5 core stages β€” click any stage in the diagram below to learn more.

Click a Stage to Explore

01 Identification
Identify
β†’
02 Preservation
Preserve
β†’
03 Analysis
Analyze
β†’
04 Documentation
Document
β†’
05 Presentation
Present

πŸ“Œ Stage 1: Identification

The starting point of the entire investigation. The investigator plans all steps, assesses the case, and defines clear objectives before touching any evidence.

  • Case Intake: Who is involved, what happened, what evidence is needed
  • Case Assessment: Identify which digital devices may hold evidence
  • Objective Definition: What specific questions must the investigation answer?
  • Legal & Ethical Considerations: Ensure all laws and regulations are followed
  • Resource Allocation: Staff, tools, and equipment needed
  • Risk Assessment: What could go wrong? Plan for it
  • Scope Definition: Which devices and data sources to examine
  • Initial Documentation: Record every decision made during this phase

πŸ”’ Stage 2: Preservation

Protecting the integrity of digital evidence so it is unaltered, authentic, and admissible in court. Digital evidence is volatile β€” it can be lost, overwritten, or corrupted instantly.

  • Do NOT change device state: If OFF β†’ keep OFF. If ON β†’ keep ON
  • Volatile data first: RAM β†’ Cache β†’ Routing tables β†’ Disk (order of volatility)
  • No copying: Never copy to/from the device β€” it changes slack space
  • Cryptographic hashing: Create SHA1/MD5 hash to verify evidence integrity
  • Chain of Custody: Document every person who touches the evidence
  • Forensic copies only: Always work on forensic copies, never originals
  • Secure storage: Evidence safe with restricted access and evidence log

πŸ”¬ Stage 3: Analysis

Using collected digital evidence to prove or disprove facts in the case. The analysis must be carried out in a forensically sound manner.

  • Data Recovery: Extract data β€” including deleted, hidden, and encrypted files
  • Examination: Search for specific files, activity patterns, and evidence of crimes
  • Who created the data? Who edited it? How? When?
  • Timeline Analysis: Reconstruct the sequence of events
  • Keyword Searching: Find specific terms relevant to the case
  • Network Forensics: Analyze email headers, communication logs
  • Note: Forensic professionals spend 50–75% of their time on reporting

πŸ“ Stage 4: Documentation

A continuous process throughout the entire investigation. Every action, decision, and finding must be permanently recorded to ensure transparency and legal admissibility.

  • Continuous recording: Every step from identification to presentation
  • Device records: Location, state, serial number of all devices seized
  • Tool logs: Which forensic tools were used, version numbers
  • Timestamps: When each action was performed
  • Chain of custody records: Every person who accessed evidence
  • Photo documentation: Images of the crime scene and devices
  • Decision logs: Why certain evidence was included or excluded

βš–οΈ Stage 5: Presentation / Reporting

Creating a comprehensive, court-admissible forensic report that documents findings clearly enough for legal authorities, judges, and non-technical personnel to understand.

  • Step 1: Familiarize with best practices of forensic report writing
  • Step 2: Study recommended forensic report examples
  • Step 3: Write the digital forensics report
  • Step 4: Re-check for factual correctness and apply edits
  • Step 5: Present the report to court
  • Must be reproducible β€” another examiner using same methods must get same results
  • Must include: case ID, findings, tools used, conclusions, chain of custody
πŸ›οΈ

Investigation: Crime Scene vs Lab

The digital forensic investigation process is divided by location

🚨 At the Crime Scene
1
Identification β€” Identify devices, custodians, and scope
2
Collection β€” Collect, image, and document devices
3
Preservation β€” Secure and seal evidence with chain of custody
πŸ”¬ In the Forensics Lab
4
Examination β€” Extract and inspect data from forensic copies
5
Analysis β€” Interpret evidence, build timeline, draw conclusions
6
Reporting β€” Write comprehensive, court-ready forensic report
πŸ”¬

Analysis Phase β€” 7 Key Steps

How to read and analyze a digital forensic evidence report

1. Understand the Scope

The report must clearly define which devices or systems were analyzed, the nature of suspected activity, and the timeframe of interest.

2. Review the Methodology

Verify the procedures used β€” file carving, keyword searching, timeline analysis, network forensics. Methods must be appropriate for the investigation type.

3. Examine the Findings

The core section. Provides a detailed account of evidence discovered β€” suspicious files, emails, chat logs β€” and how it relates to the case.

4. Check the Conclusions

Conclusions must logically follow from findings. They should clearly answer every question posed in the investigation scope.

5. Evaluate Documentation

Good reports include forensic tool logs, timestamps of every action, screenshots, and photos taken during the investigation.

6. Verify Chain of Custody

The report must document the complete chain of custody β€” crucial for ensuring evidence is admissible in court.

⚑

Order of Volatile Data Collection

Most volatile evidence must be collected first β€” it disappears when power is lost

Priority Data Type Volatility Why Critical
1st Registers & CPU Cache Highest Lost immediately on power-off β€” contains current execution state
2nd RAM, Routing Table, ARP Cache, Process Table, Kernel Stats Very High Running processes, open network connections, memory contents
3rd Temporary File Systems High Temp files and swap space may hold fragments of key data
4th Disk Storage Medium Persists after power-off but can be overwritten β€” image immediately
5th Remote Logging & Monitoring Data Medium Server logs and remote monitoring data relevant to the system
6th Physical Configuration, Network Topology Lower Network diagrams, physical layout β€” changes slowly
7th Archival Media Lowest Backup tapes, external drives β€” most stable and persistent
πŸ”—

Chain of Custody (CoC)

The written record tracking evidence from collection to court β€” must never be broken

The Chain of Custody is a written or electronic document in which the acquisition, custody, and all transfers of evidence are recorded. A broken chain of custody can make evidence inadmissible in court.

1
Acquisition

Who collected the evidence, when and where it was collected, and what method was used to acquire it.

2
Custody

Who had possession of the evidence, where it was stored, how it was stored, and how long it was kept.

3
Processing

What was done to the evidence β€” cloning, analysis, hash verification β€” all actions recorded with timestamps.

4
Transfer

Every transfer from one person to another is recorded along with the signature of the new custodian.

5
Final Disposition

Secure destruction, secure deletion, or return of evidence to the owner β€” all formally recorded and authorized.

🚨

10 Critical Rules for Preserving Digital Evidence

Follow these strictly to prevent evidence contamination or loss

Rule 01
Do not change the device state
If device is OFF β†’ keep OFF. If ON β†’ keep ON. Call a forensics expert first.
Rule 02
Power down mobile devices correctly
Do not charge an uncharged phone. If ON, power it down to prevent data wiping from auto-boot.
Rule 03
Secure the device location
Never leave device unattended. Document who has access, where it is, and every time it moves.
Rule 04
No external storage media
Never plug USB drives, memory cards, or any storage media into the device.
Rule 05
No copying to/from device
Any copying changes the slack space of memory β€” this alters the evidence permanently.
Rule 06
Photograph all sides of the device
Capture photos from all angles to prove the device has not been tampered with before forensic experts arrive.
Rule 07
Secure login credentials
Know and securely record the PIN, password, or pattern. Share only with certified forensic experts.
Rule 08
Do not open files or apps
Opening any app, photo, or file may cause data loss or memory overwriting β€” destroying key evidence.
Rule 09
Only trained forensics experts
Untrained persons must not investigate or view files on the original device β€” data corruption risk.
Rule 10
Hibernate, do not shut down
Hibernate mode preserves volatile memory contents. A shutdown erases RAM β€” losing critical running state evidence.

πŸ“Œ Note: The documents below are sample format templates for educational reference only β€” based on standard digital forensics practices as covered in Chapter 5 of the AICITSS Cyber Security curriculum. Actual formats may vary by jurisdiction and agency.

πŸ“‹ Document 1 β€” Chain of Custody Form Evidence Management

CHAIN OF CUSTODY FORM

Digital Forensics Unit Β· Evidence Tracking Document

Case Information
Case Number:DF-2024-0047
Case Title:Corporate Data Theft β€” ABC Technologies Pvt. Ltd.
Date Opened:15 October 2024
Lead Investigator:Inspector R. Sharma, Cyber Crime Cell
Jurisdiction:Mumbai Cyber Crime Cell, Maharashtra
Evidence Item Details
Item #DescriptionMake / ModelSerial NumberCondition
E-001Laptop ComputerDell Latitude 5420DL7894321XPowered ON, screen locked
E-002External Hard DriveSeagate 1TB USBST100023ZDisconnected, intact
E-003Mobile PhoneSamsung Galaxy S22SM-S9010023Powered ON, unlocked
E-004USB Flash DriveSanDisk 64GBSDCZ00-064GDisconnected, intact
Custody Transfer Log
Date & TimeReleased ByReceived ByPurposeSignature
15-Oct-2024 14:35Const. P. Patil (Scene)Insp. R. SharmaScene Collection_____________
15-Oct-2024 17:00Insp. R. SharmaForensic Lab (Lab ID: FL-07)Lab Examination_____________
22-Oct-2024 10:15Forensic Lab (FL-07)Insp. R. SharmaReport Completion_____________
25-Oct-2024 09:00Insp. R. SharmaCourt RegistryCourt Submission_____________
Certification

I certify that the above information is accurate and complete. The evidence was handled in accordance with standard forensic procedures to maintain its integrity.

Collecting Officer
Evidence Custodian
Supervising Officer
🏷️ Document 2 β€” Evidence Seizure Tag / Label Physical Label

DIGITAL EVIDENCE SEIZURE TAG

Affix securely to the evidence item β€” Do Not Remove

Evidence Tag No.:ET-2024-E001
Case No.:DF-2024-0047
Item Description:Dell Latitude 5420 Laptop β€” Black Color
Serial Number:DL7894321X
Seized From:Desk #3, 4th Floor, ABC Technologies Pvt. Ltd., BKC Mumbai
Date & Time Seized:15 October 2024 β€” 14:20 hrs
Seized By:Const. P. Patil, Badge No. MP-2341
Device State at Seizure:Powered ON β€” Screen Locked β€” Battery 67%
Packaging Method:Anti-static bag, sealed, heat-sealed outer bag
MD5 Hash (if imaged):a3f8d9c1b04e7f2a1c9d3b8e6f7a2c10
Witness:Mr. Anil Mehta (Company HR Manager)
⚠ WARNING: Tampering with this evidence tag is a criminal offence. This item must not be opened or examined except by an authorized forensic examiner in an accredited forensic laboratory.
Seizing Officer
Witness Signature
Date: ___________
πŸ“¨ Document 3 β€” Forensic Examination Request Form Lab Submission

FORENSIC EXAMINATION REQUEST

Digital Forensics Laboratory β€” Official Submission Form

Requesting Agency
Agency Name:Mumbai Cyber Crime Cell
Officer Name:Inspector Rajesh Sharma
Badge / ID No.:MCC-1098
Contact Number:+91-XXXX-XXXXXX
Case Reference No.:DF-2024-0047
Date of Submission:15 October 2024
Nature of Case & Examination Objectives
Case Type:Corporate Data Theft / Insider Threat
Applicable Law:IT Act 2000 β€” Section 43, 66 / IPC 408, 420
Examination Required:1. Recover deleted files from laptop HDD
2. Extract USB connection history
3. Recover browser history and email data
4. Extract WhatsApp chat history from mobile
5. Check for data exfiltration via external drives
Items Submitted for Examination
Tag No.ItemSerial No.Priority
ET-2024-E001Dell LaptopDL7894321XHigh
ET-2024-E002Seagate External HDDST100023ZMedium
ET-2024-E003Samsung Galaxy S22SM-S9010023High
Requesting Officer
Lab Receiving Officer
Lab Case No.: ________
πŸ“‘ Document 4 β€” Digital Forensic Examination Report Court Submission

DIGITAL FORENSIC EXAMINATION REPORT

Confidential β€” For Law Enforcement / Court Use Only

Report Header
Report No.:DFR-2024-0047-01
Case No.:DF-2024-0047
Reporting Agency:Regional Cyber Forensics Laboratory, Mumbai
Forensic Examiner:Mr. Sunil Verma, B.Sc. (Forensics), CFCE Certified
Date of Examination:16–22 October 2024
Date of Report:23 October 2024
Case Summary:Alleged theft of proprietary source code by a former employee of ABC Technologies Pvt. Ltd.
Tools & Methodology Used
ToolVersionPurpose
EnCase Forensicv22.1Disk imaging and file system analysis
FTK Imagerv4.7Creating forensic copies and hash verification
Cellebrite UFEDv7.62Mobile device data extraction
Volatility 3v2.4RAM analysis and process examination
Summary of Findings
Finding No.Evidence ItemFinding DescriptionSignificance
F-001Dell Laptop (E-001)157 files copied to external USB on 12-Oct-2024 at 22:14 hrs. USB serial: SDCZ00-064G matches E-004.Critical
F-002Dell Laptop (E-001)Deleted folder “ProjectAlpha_Backup” recovered β€” contains 43 proprietary source code files.Critical
F-003Samsung Mobile (E-003)WhatsApp messages to unknown number +91-98XXXXXXXX discussing file transfer on 11-Oct-2024.High
F-004External HDD (E-002)12 GB of data matching recovered files found in hidden folder “/.sysbackup”.Critical
Conclusions

Based on the forensic examination of the submitted evidence, it is concluded that: (1) The suspect laptop was used to copy proprietary files on 12-Oct-2024. (2) Files were transferred to USB flash drive E-004. (3) Identical files were found on the external hard drive E-002. (4) Mobile communications indicate coordination for the data transfer. All findings were verified using cryptographic hash comparison and multiple forensic tools.

Examiner Certification

I certify that the contents of this report are accurate to the best of my knowledge. The examination was conducted using accepted forensic practices, and all results are reproducible using the same tools and methodology.

Forensic Examiner
Lab Director
Official Stamp
βœ… Document 5 β€” First Responder On-Site Checklist Crime Scene

FIRST RESPONDER DIGITAL EVIDENCE CHECKLIST

To be completed at the crime scene before evidence collection

Scene Information
Scene Location:______________________________________
Incident Type:______________________________________
Date / Time:______________________________________
First Responder:______________________________________
Pre-Collection Checklist
βœ“Action RequiredNotes
☐Photograph the scene from all angles before touching anything
☐Note and photograph the state of all devices (ON/OFF)
☐Do NOT press any keys or move the mouse
☐Identify all digital devices present
☐Check if any devices are connected to networks or external media
☐Note screen contents of any powered ON devices (photograph)
☐Identify and record serial numbers of all devices
☐Obtain login credentials from authorized personnel
☐Restrict access to scene β€” unauthorized persons removed
☐Contact Digital Forensics Unit / Lab for guidance
☐Prepare evidence tags for all items to be seized
☐Anti-static packaging available for storage media
First Responder
Supervising Officer
Date & Time: _______
#️⃣ Document 6 β€” Hash Verification & Integrity Log Integrity Record

DIGITAL EVIDENCE HASH VERIFICATION LOG

Cryptographic Integrity Record β€” Chain of Evidence

Purpose

This log records the cryptographic hash values (MD5 and SHA-1) of all digital evidence items at the time of acquisition and after examination. A match between acquisition hash and examination hash proves the evidence has NOT been altered.

Hash Records
Item Hash Type Acquisition Hash Post-Exam Hash Match?
E-001 (Laptop Image) MD5 a3f8d9c1b04e7f2a1c9d3b8e6f7a2c10 a3f8d9c1b04e7f2a1c9d3b8e6f7a2c10 βœ“ MATCH
E-001 (Laptop Image) SHA-1 2fd4e1c67a2d28fced849ee1bb76e739 2fd4e1c67a2d28fced849ee1bb76e739 βœ“ MATCH
E-002 (HDD Image) MD5 b94f7e3c12d08e4a2b8f1e9c3a7d5f20 b94f7e3c12d08e4a2b8f1e9c3a7d5f20 βœ“ MATCH
E-003 (Mobile Extraction) SHA-1 c8d9f2a1b3e4c7d8f9a0b1c2d3e4f5a6 c8d9f2a1b3e4c7d8f9a0b1c2d3e4f5a6 βœ“ MATCH
βœ… All hash values verified β€” Evidence integrity confirmed. No alterations detected during examination.
Examiner: _________
Date: _____________
Tool Used: ________
❓

Key Concepts β€” Click to Expand

Important definitions and concepts from Chapter 5

What is the Digital Forensic Process and why is it important? +
The Digital Forensic Process is a systematic and methodical investigation of digital devices, systems, and networks to gather and analyze digital evidence for legal purposes. It is important because it ensures that evidence is collected, preserved, and analyzed in a way that maintains its integrity and makes it legally admissible in court. Without a structured process, evidence may be contaminated, altered, or challenged in court β€” making it useless for prosecution.
What is Digital Evidence and what makes it unique? +
Digital Evidence is any information in binary form that can be useful in criminal or other legal investigations and proceedings. It resides on physical media (hard drives, phones, USB drives), but it is the content and related information β€” not the media itself β€” that matters most. What makes it unique: (1) It is highly volatile β€” RAM disappears on power-off; (2) It can be extraordinarily large in volume; (3) It is easy to alter but there are powerful techniques to detect alterations; (4) It can be verified using cryptographic hashing (MD5, SHA-1).
What is Chain of Custody and why must it never be broken? +
Chain of Custody (CoC) is a written or electronic document that records the acquisition, custody, processing, transfer, and final disposition of every piece of evidence. It must document: Who acquired the evidence, when and where it was acquired, what method was used, who had possession, where it was stored, and every transfer with signatures. A broken Chain of Custody means the evidence may be declared inadmissible in court β€” the prosecution case may collapse entirely.
What is Hash Verification and why is it used? +
Hash verification uses mathematical algorithms (MD5, SHA-1) to generate a unique fixed-length “fingerprint” of a file or disk image. This hash is recorded at the time of evidence acquisition. After any examination, the hash is recalculated. If both hashes are identical, it proves the evidence has not been altered in any way. Even a single changed byte produces a completely different hash value. This is how forensic examiners demonstrate to courts that evidence is authentic and unmodified.
What is “Order of Volatility” and how does it affect evidence collection? +
Order of Volatility refers to how quickly different types of digital evidence disappear. Investigators must collect the most volatile evidence first before it is lost. The order is: (1) Registers & CPU Cache β€” disappear in nanoseconds; (2) RAM / ARP Cache / Process Table; (3) Temporary files; (4) Disk storage; (5) Remote logs; (6) Physical configuration; (7) Archival media β€” most stable. Collecting disk data before RAM may mean losing critical evidence about running processes, malware, and network connections.
What must a Digital Forensic Report contain? +
A court-ready Digital Forensic Report must contain: (1) Details of the reporting agency; (2) Case identifier; (3) Forensic examiner identity and qualifications; (4) Identity of the submitter; (5) Date of evidence receipt; (6) Device details β€” serial number, make, model; (7) Tools and versions used; (8) Step-by-step description of examination procedures; (9) Chain of custody documentation; (10) Findings β€” chat messages, browser history, call logs, deleted files; (11) Images captured during examination; (12) Analysis interpretation; (13) Clear conclusions. The report must be reproducible by another competent examiner using the same methods.
What is the difference between Examination and Analysis in the forensic process? +
Examination refers to the extraction and recovery of data from digital media β€” finding specific files, recovering deleted data, accessing encrypted content. It is the “what is there” step. Analysis refers to the interpretation of the recovered data and placing it in a logical and useful format β€” how did it get there, where did it come from, and what does it mean? Analysis answers the “why and how” questions. Together, they answer: Who created the data, who edited it, how it was created, and when all this occurred.
What does “Forensically Sound” mean? +
A forensically sound process means the examination was conducted in a manner that: (1) Did not alter the original evidence; (2) Used legally obtained and reputable forensic tools; (3) Created cryptographically verifiable copies of evidence; (4) Documented every step thoroughly; (5) Could be reproduced by another qualified examiner who would reach the same results; (6) Maintained an unbroken Chain of Custody. Evidence collected and analyzed in a forensically sound manner is admissible in court. Evidence that is NOT forensically sound may be rejected by the judge.