The Digital Crime Scene – Search And Preservation


Get the access to all our courses via Subscription



PREVIEW - eForensics Magazine 2021 07 The Digital Crime Scene – Search And Preservation .pdf

Dear Readers,

When we talk about a crime scene, we see frames from Hollywood movies in which Men in Black secure the scene with yellow tape, and technicians in overalls scrape traces from the floor. But what is a digital crime scene? How to secure it so as not to lose evidence? How to obtain this evidence with the use of digital tools? You will find answers to these and other questions in our latest magazine!

The latest edition also covers topics such as:

  • how to define the digital crime scene and collect the evidence?
  • how to use artificial intelligence and machine learning in digital forensics?
    how to conduct a remote investigation, which became extremely popular during the pandemic and could be the future of the industry?
  • how to use open-source tools for forensic image analysis?
  • what are email spoofing methods and how to investigate email fraud?
  • what are the risks of using Photoshop?

Are you intrigued? Don't hesitate any longer and reach for this unique edition full of tools, practical tips, and step-by-step descriptions of the use of forensic techniques.

Check out our Table of Contents below for more information about each article (we included short leads for you). 

We hope that you enjoy reading this issue! As always, huge thanks to all the authors, reviewers, to our amazing proofreaders, and of course you, our readers, for staying with us! :)


Michalina Szpyrka

and the eForensics Magazine Editorial Team 

Download free magazine preview


AIML Data Cyber Attacks Analysis In A Digital World

by Mohith S Yadav

Artificial intelligence (AI) and machine learning (ML) are terms that are causing a stir in the technology world at present, with good reason. They are among the most transformative technologies available to humanity today. However, artificial intelligence has been around for a long time, and Greek myths include stories of mechanical men trying to mimic our behavior. AI and machine learning (ML) are responsible for facial recognition on smartphones, personalized online shopping experiences, virtual assistants at home, and medical diagnosis of diseases. AI and ML help organizations streamline processes, uncover data, and make better business decisions. These technologies are driving the industry forward, helping it function better, and they are becoming an indispensable technology for businesses to maintain a competitive advantage.

The Digital Crime Scene – Search And Preservation

by Daz Menzies

When we think of a crime scene, we often think of the familiar scene from a Hollywood film, with a chalk outline of a body, etc.  When we refer to a ‘crime scene’ in a digital crime, this may not always be an actual location, it could be the device itself.  A digital crime scene can indeed be a ‘location’.  So, for example, the police may attend a domestic address where the inhabitant has been using computers for the purpose of committing illegal activities.  The police will conduct a standard routine of collecting and preserving physical evidence in the form of the digital devices in the property, as well as other items such as notebooks, papers, etc.  A digital crime scene may also be the desk of an individual within a workplace, or it could be a cloud repository used to store illegal data. The differences in these types of ‘crime scenes’ mean that the investigator needs to be prepared for a variety of different types of evidence preservation.  An investigator will be interested in locating evidential materials that can be used in the investigation. This can involve items such as computers, laptops, external hard-drives, USB sticks, mobile phones and numerous other items. Basically, an investigator, when attending the ‘crime-scene’ will be looking for anything that has the capability to store data.  But the investigator should not forget that the evidence may not be in a ‘tangible’ state.  In other words, the investigator cannot touch the device, because it is stored online/in the cloud.

E-mail Spoofing And Forensics Investigation

by Gayathry.S

The world is experiencing a new digital breakthrough, and the dependency on technology, especially on e-mail, is eventually increasing as it has become instrumental. Even though technology can be helpful, it does have its downside. So many crimes are committed through computers and networks, including hacking, identity fraud, ransomware attacks, and phishing. This article mainly focuses on such crime, specifically e-mail spoofing. E-mail attacks are a significant threat nowadays to security and trust. Attackers use e-mail as a source to divulge their details, account number, credit card number, and passwords. Even though there are few protocols and security, e-mail spoofing is still something that cannot be stopped because the information they need is widely available online for free.

Validation Of Console Evidence

by Micaela Gallerini

The first thing to say in order to perform a good recovery of data from consoles is that they are to be considered computers in all respects and must be treated as such. First of all, maximum precision is required to prevent magistrates or judges from counting evidence in court, leaving no room for doubts about the technical work. Many times, I used to film myself from behind; the video must see the operator from behind and the video fully in front of him, so that one cannot think that the technician has manipulated the procedure and his work is clear. The video will be released only in case of doubt of the magistrate or the judge, it is therefore not necessary to insert it immediately in the technical report.

Photoshop's Deadly Consequences

by Nick Barreiro

I love Adobe Photoshop. I use Photoshop every day in my work as a video/image forensic analyst.  It is a fantastic, powerful piece of software, and the undisputed heavyweight champ of digital image editing applications. Like most powerful tools, Photoshop can be used for good and for evil.  We are all familiar with the impact of doctored photographs used for political purposes, and retouched images of supermodels wreaking havoc on young women's self-esteem; however, you have likely never considered the threat posed by the scenario outlined in the following paragraphs. This story illustrates a real and immediate danger to the health of millions of people around the world. 

The Pitfalls in Payments Security Compliance For E-commerce 

by Ahmed Adesanya

The rapid adoption of mobile devices and cloud-based technologies among enterprises of all sizes means that security is now a critical need for all enterprises. Cloud computing has the ability to offer organizations long-term IT savings, reductions in infrastructural costs and pay-for-service models. By moving IT services to the cloud, organizations are more geographically distributed than ever before and the pace of business gets faster every day. Online collaboration has become a business necessity, there is no other way for distributed teams to work as quickly and efficiently as business demands. With virtual, paperless environments becoming more common, simply locking the doors at night no longer protects merchants, banks, customers or the business they conduct. This means that exploitation will change from systems to web. Due to these changes, today’s business needs demand that applications and data not only move across physical and international borders, but also to the cloud and accessible by third parties. This loss of control is significant for security teams that must not only keep data safe, but also comply with the necessary security standards, including the Payment Card Industry Data Security Standard (PCI DSS). The payment card industry (PCI) should recognize that the most effective way to protect customer data is to protect the networks from the point of purchase to the application servers in their networks. The PCI DSS security requirements apply to all system components included in or connected to the cardholder data environment. The cardholder data environment (CDE) is comprised of people, processes and technologies that store, process or transmit cardholder data or sensitive authentication data. “System components” include network devices, servers, computing devices and applications.

Investigating Remotely In The Midst Of The Pandemic: A Case Study

by Shweta A. Chawla

Investigations cannot always follow a prescribed path. Investigators always learn on the job. Some paths followed lead to dead ends, some to new lessons. March 2021, India initiated its second lockdown and companies reverted to complete work-from-home mode. At that time, Lamplighter Co., a manufacturing company situated on the east coast of India, registered a data breach. The breach was detected when a client informed Lampligher that their products were being offered by another company, Epset, at a cheaper cost. Enquiries found that Sam, one of the directors of Epset, was a former employee of Lamplighter. Sam had worked in the IT department of Lamplighter Co. and would not have had access to the industrial drawings and manufacturing processes for the products in the normal course of his work. Further, some of the products being sold by Epset had not been created by Lamplighter Co. while Sam was working there. Sam, however, had resigned from Lamplighter Co. about a year and a half earlier and had been in limited contact with his former colleagues.

Image Overview Of Existing Image Forensics

by Daniele Giomo

In this article, we will make a brief overview of the existing software dedicated to the processing of images for forensic purposes.

Malware attacks

by Longinus Tomochenco

A malware attack is a common cyberattack where malware (normally malicious software) executes unauthorized actions on the victim’s system. The malicious software (a.k.a. virus) encompasses many specific types of attacks such as ransomware, spyware, command and control, and more. Criminal organizations, state actors, and even well-known businesses have been accused of (and, in some cases, caught) deploying malware. Like other types of cyber attacks, some malware attacks end up with mainstream news coverage due to their severe impact. An example of a famous malware attack is the WannaCry ransomeware attack.

From The Diary Of A Digital Forensics Analyst

by Luis Alfonso Núñez Gutiérrez

Dear readers, this is our new series of short columns, telling real stories from the life of a digital forensics specialist.


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023