Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />
© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />
A. The Forensic Examiner's costs shall be borne by the Plaintiff.<br />
B. Computer forensic analysis will be performed by ____________ (the<br />
"Forensic Examiner").<br />
C. The Forensic Examiner must agree in writing to be bound by the terms of this<br />
Order prior to the commencement of the work.<br />
D. Within two days of this Order or at such other time agreed to by the parties,<br />
defendants shall make its computer(s) and other electr<strong>on</strong>ic storage devices<br />
available to the Forensic Examiner to enable him to make forensically-sound<br />
images of those devices, as follows:<br />
i. Images of the computer(s) and any other electr<strong>on</strong>ic storage devices<br />
in Defendants' possessi<strong>on</strong>, custody, or c<strong>on</strong>trol shall be made using<br />
hardware and software tools that create a forensically sound, bit-forbit,<br />
mirror image of the original hard drives (e.g., EnCase, FTK<br />
Imager, X-Ways <strong>Forensics</strong> or Linux dd). A bit-stream mirror image<br />
copy of the media item(s) will be captured and will include all file<br />
slack and unallocated space.<br />
ii.<br />
iii.<br />
iv.<br />
The Forensic Examiner should photographically document the make,<br />
model, serial or service tag numbers, peripherals, dates of<br />
manufacture and c<strong>on</strong>diti<strong>on</strong> of the systems and media acquired.<br />
All images and copies of images shall be authenticated by MD5 hash<br />
value comparis<strong>on</strong> to the original hard drive(s).<br />
The forensic images shall be copied and retained by the Forensic<br />
Examiner in strictest c<strong>on</strong>fidence until such time the court or both<br />
parties request the destructi<strong>on</strong> of the forensic image files.<br />
v. Without altering any data, the Forensic Examiner should, as feasible,<br />
determine and document any deviati<strong>on</strong>s of the systems’ clock and<br />
calendar settings.<br />
E. The Forensic Examiner will use best efforts to avoid unnecessarily disrupting<br />
the normal activities or business operati<strong>on</strong>s of the defendants while inspecting,<br />
copying, and imaging the computers and storage devices.<br />
F. The Defendants and their officers, employees and agents shall refrain from<br />
deleting, relocating, defragmenting, overwriting data <strong>on</strong> the subject computers or<br />
otherwise engaging in any form of activity calculated to impair or defeat forensic<br />
acquisiti<strong>on</strong> or examinati<strong>on</strong><br />
<strong>Page</strong> 94