Roles-of-First-Responder-in-computer-forensics

Roles of First Responder in computer forensics

Roles of First Responder in computer forensics in this article explain which of the first responder and there roles  responsibiliteies .

Roles of First Responder

A first responder plays an important role in the computer forensics process because he or she is the first person who arrives at the crime scene for initial investigation. The investigation process starts after collecting all the evidence from the crime scene. If the evidence collected by the first responder is forensically sound, it is easier for the investigation team to find the actual cause of the crime. Therefore, It is important for the first responder to collect proper evidence.

Related Product : Computer Hacking Forensic Investigator

The main responsibilities of first responders are:

  • Identifying the crime scene: After arriving at the crime scene, the first responder identifies the scope of the crime scene and establishes a perimeter. Establishing a perimeter includes a particular area, room, several rooms, or a building depending on the networked computers, After that, the first responder starts listing the computer systems that are involved in the incident from which he or she can collect the evidence.
  • Protecting the crime scene: In a cybercrime case, a search warrant is required for searching and seizing digital/electronic evidence. Therefore, a first responder protects all the computers and electronic devices and waits for the case officer in-charge.
  • Preserving temporary and fragile evidence; In the case of temporary and fragile evidence that could change or disappear, such as monitor/screen information or a running program, the first responder does not wait for the case officer in-charge. He or she takes photographs of all the evidence.
  • Collecting complete information about the incident: For collecting the complete information about the incident, the first responder conducts preliminary interviews of all persons present at the crime scene and asks questions about the incident.
  • Documenting all findings: The first responder starts documenting all information about the collected evidence in the chain of custody document sheet, The chain of custody document sheet contains information such as case number, name of the person who reported the case, address and telephone number, location of the evidence, date/time of collecting the evidence, and a complete description of the item.
  • Packaging and transporting the electronic evidence: After collecting the evidence, the first responder labels all the evidence and places it in evidence storage bags, which protect the evidence from sunlight and high temperature. These bags also block wireless signals so that wireless devices cannot acquire data from the evidence. Then, the first responder transports these packed bags to the forensics laboratory.
  • Gather preliminary information at the scene: At the time of an incident, secure the crime scene and the surrounding area to avoid any tampering of the evidence. Preliminary information at the crime scene provides the basis for the forensics investigation, and helps in finding the evidence easily, if there is no third-party interference at the incident scene.

Preliminary information helps the investigators to verify if the crime had occurred, nature of the incident, mark the perimeter, estimate the case process and expenditure, as well as gather knowledge of the plaintiff.

The preliminary information at the incident scene offers the following details:
  • The type of incident.
  • Reason for the occurrence of the incident.
  • The potential damage due to the incident.
  • Potential evidence from scattered objects outside the attacked system.
  • Details of the person who used the system last before the incident.
  • People who first knew about the incident’s occurrence.

Incident Response: Different Situations

The activity the first responder performs at the incident location has a great impact over the investigation processes and can influence the accuracy or the success of the investigation procedure. Therefore, investigation firms need to be careful while deciding the first response team for an incident.

1. First Response by System Administrators

The system administrator’s role is very important in ensuring network security and maintenance as well as investigation of the security breach. The admin is responsible for monitoring and maintenance of the system and these activities can become the basis for the investigation during the forensic evaluation and administrative actions.

Once a system administrator discovers an incident, he or she must report it according to the current organizational incident reporting procedures. He or she should then not touch the system unless directed to, by either the incident response team or duty manager or one of the forensic analysts assigned to the case.

The system administrator should explain to the investigator the security protocols and procedures followed for using the systems and storage media. The admin might have to appear for the legal proceedings to give explanation about the measures taken during the initial shutdown or isolation of the subject computer.

If you are interested to learn in detail Computer Hacking Forensic Investigator then take training from best institute in mumbai.

2. First Response by Laboratory Forensics staff

First response by laboratory forensic staff involves six stages:
– Securing and evaluating the electronic crime scene

The process protects the crime scene from unauthorized access and keeps the evidence away from harm. First response by laboratory forensic staff in this stage involves the following considerations:

  • Search warrant for search and seizure
  • Planning the search and seizure
  • Conducting the initial search of the scene
  • Health and safety issues

Also Read : Laboratory Accreditation Programs

– Conducting preliminary interviews

This activity helps investigators to identify all personnel, subjects, or others at the crime scene, along with their position at the time of entry and the reason for being at the crime scene. This stage involves:

  • Asking questions
  • Checking the consent issues
  • Witness signatures
  • Initial interviews
– Documenting the electronic crime scene

Documentation of the electronic crime scene is a continuous process during the investigation, making a permanent record of the scene.

This includes:

  • Photographing the scene
  • Sketching the scene
– Collecting and preserving electronic evidence

Electronic evidence is versatile in nature and easily broken.

The staff should be cautious when:

  • Collecting evidence
  • Dealing with powered OFF/ON computers at the time of seizure
  • Seizing portable computers
  • Preserving electronic evidence
– Packaging electronic evidence

At the time of packaging all collected electronic evidence, the staff must document and enlist the evidence, and all containers should be properly labeled to seize evidence.

During packaging:

  • Follow exhibit numbering
  • Fill the panel on the front of evidence bags with the proper details
  • Avoid folding and scratching storage devices
  • Label the containers that hold the evidence in an appropriate way Transporting electronic evidence Investigators should take special precautions for transporting the electronic evidence.
  • Ensure proper transporting procedures are followed to avoid physical damage:
    Ensure proper handling and transportation to the forensics laboratory
    Have a strict chain of custody and keep track of all the forensics processes applied

3. First Responder Common Mistakes

Most of the time when a computer crime incident occurs in the organization, a system or network administrator takes charge as a first responder at the crime scene because many organizations do not appoint a special forensic investigator for such types of incidents. The system or network administrator cannot handle the computer crime security incidents in a proper way because they do not know the first responder procedure or they do not have complete knowledge of forensic investigation.

In such cases, they make the following mistakes:
  • Shutting down or rebooting the victim’s computer: In this case, the system loses the complete volatile data, such as MAC time and log files, shuts down processes running when shutting down and rebooting.
  • Assuming that some components of the victim’s computer may be reliable and usable: In this case, using some commands on the victim’s computer may activate Trojans, malware, and time bombs to delete vital volatile data.
  • Not having access to baseline documentation about the victim’s computer.
  • Not documenting the data collection process.

Questions related to this topic

  1. What are the roles of first responders?
  2. What do first responders do at a crime scene?
  3. Who is responsible for securing a crime scene?
  4. What is cyber forensics PDF?

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment