29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

A. The Forensic Examiner's costs shall be borne by the Plaintiff.<br />

B. Computer forensic analysis will be performed by ____________ (the<br />

"Forensic Examiner").<br />

C. The Forensic Examiner must agree in writing to be bound by the terms of this<br />

Order prior to the commencement of the work.<br />

D. Within two days of this Order or at such other time agreed to by the parties,<br />

defendants shall make its computer(s) and other electr<strong>on</strong>ic storage devices<br />

available to the Forensic Examiner to enable him to make forensically-sound<br />

images of those devices, as follows:<br />

i. Images of the computer(s) and any other electr<strong>on</strong>ic storage devices<br />

in Defendants' possessi<strong>on</strong>, custody, or c<strong>on</strong>trol shall be made using<br />

hardware and software tools that create a forensically sound, bit-forbit,<br />

mirror image of the original hard drives (e.g., EnCase, FTK<br />

Imager, X-Ways <strong>Forensics</strong> or Linux dd). A bit-stream mirror image<br />

copy of the media item(s) will be captured and will include all file<br />

slack and unallocated space.<br />

ii.<br />

iii.<br />

iv.<br />

The Forensic Examiner should photographically document the make,<br />

model, serial or service tag numbers, peripherals, dates of<br />

manufacture and c<strong>on</strong>diti<strong>on</strong> of the systems and media acquired.<br />

All images and copies of images shall be authenticated by MD5 hash<br />

value comparis<strong>on</strong> to the original hard drive(s).<br />

The forensic images shall be copied and retained by the Forensic<br />

Examiner in strictest c<strong>on</strong>fidence until such time the court or both<br />

parties request the destructi<strong>on</strong> of the forensic image files.<br />

v. Without altering any data, the Forensic Examiner should, as feasible,<br />

determine and document any deviati<strong>on</strong>s of the systems’ clock and<br />

calendar settings.<br />

E. The Forensic Examiner will use best efforts to avoid unnecessarily disrupting<br />

the normal activities or business operati<strong>on</strong>s of the defendants while inspecting,<br />

copying, and imaging the computers and storage devices.<br />

F. The Defendants and their officers, employees and agents shall refrain from<br />

deleting, relocating, defragmenting, overwriting data <strong>on</strong> the subject computers or<br />

otherwise engaging in any form of activity calculated to impair or defeat forensic<br />

acquisiti<strong>on</strong> or examinati<strong>on</strong><br />

<strong>Page</strong> 94

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!