computer forensics prsentation

51
Digital Forensics Larry Daniel

Upload: nishit-patel

Post on 10-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 1/51

Digital Forensics

Larry Daniel

Page 2: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 2/51

Introduction

• A recent research report from The Yankee

Group found that 67.6 percent of US householdsin 2002 contained at least one PC

• The investigators foresee three-quarters of all

US households containing PCs by 2007.

Page 3: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 3/51

Introduction

• The UCLA study found that surprising numbers

of households have more than one PC.• In cases where more than one PC is present,

the home computers are often networked.

• As of December of 2005, 71.4% of UShouseholds have computers.

Page 4: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 4/51

Some Famous Criminal Cases

• Scott Peterson

 – Internet history showing searches for dump sites.

• Michelle Theer

 – Email and other documents. (Over 20 thousand

documents)

• Michael Jackson

 – Internet history and Email.

• BTK Killer – Used to trace letter back to church computer.

Page 5: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 5/51

Different Sides – Different Roles

• Prosecution Side

 – Sworn Law Enforcement Officer• Writes Search Warrants

• Receives Evidence Computers, etc.

• Acquires Images, Analyzes Data

• Presents findings to Prosecutors and Detectives

• May not be involved again until arrest is made or case goesto trial.

Page 6: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 6/51

Different Sides – Different Roles

• Defense Side

 – Private Expert• Receives Evidence from Law Enforcement Agency.

• Consults with Attorney on Relevant Facts

• Active Member of Defense Team

• May Review Other Evidence to Enhance Computer Analysis

• May Interview Defendant

• May Work with Other Experts.

Page 7: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 7/51

Some Basics

The basic computer looks like these….

Page 8: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 8/51

Common Misteaks

Calling these monitors, CPUs, Hard Drives, etc.

Page 9: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 9/51

Monitors

• Newer LCD on Left

• Older Analog CRT on Right – Nothing is stored in these. They just make pretty pictures.

Page 10: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 10/51

CPU• CPU – Central

Processing Unit

 – Only performs calculations. – Stores nothing.

 – The “brain” of thecomputer.

Page 11: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 11/51

Inside The Computer

• The Hard Drive stores the evidence…

Page 12: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 12/51

Inside The Computer

• Hard drives can hold thousands of

 – Documents – Pictures

 – Music files

 – Movies

 – Passwords – Emails

Page 13: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 13/51

Inside The Computer

• RAM – Random Access

Memory – Only contains data while

the computer is turned on.

 – Temporary processing

storage only used whileoperating the computer.

 – Is cleared when thecomputer shuts down or re-starts.

Page 14: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 14/51

Introduction

• A Digital, AKA Computer Forensics

investigation, involves four major areas: – Acquisition

• Obtaining the original evidence.

 – Preservation• Protecting the original evidence.

 – Analysis

• Finding relevant evidence.

 – Presentation

• Presenting the evidence in court.

Page 15: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 15/51

 – Encase Forensics Software

• Used by NC SBI, FBI, Air Force OSI, Scotland Yard, USNavy, Fayetteville PD

• Most widely used forensics software in the world.

 – Paraben Email Examiner

• Specially designed to recover email.

Forensics Tools

Page 16: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 16/51

Acquisition

 – First contact with the original evidence.

• Most critical time for protecting the originals.• Most likely time for police or others to damage or change

evidence.

• General rules MUST be followed to preserve and protect

evidence during this critical first response period.• First point in establishing chain of custody.

Page 17: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 17/51

Digital Evidence

• Location not always obvious.

• Easy to conceal.

• Easy to miss.

• Easy to damage.

Page 18: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 18/51

Digital Evidence

CD-ROM Floppy DiskHard Drive

Page 19: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 19/51

Digital Evidence

iPodBlackberryPicture Phones

Page 20: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 20/51

Digital Evidence

Smart MediaDigital CamerasUSB Drives

Page 21: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 21/51

Acquisition

• First responders should be trained to handle this

type of evidence.• Digital evidence is fragile.

• Digital evidence is easily altered if not handled

properly.• Simply turning a computer on or operating the

computer changes and damages evidence.

Page 22: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 22/51

Fragile Nature of Digital Evidence

• "The problem is the uninitiated police officer who will go inand turn on a computer to look to see if it's worthwhile tosend the computer in for examination," said Peter Plummer,assistant attorney general in Michigan's high-tech crime unit .

"When you boot up a computer, several hundred files getchanged, the date of access, and so on," Plummer said."Can you say that computer is still exactly as it was whenthe bad guy had it last?"

Source: AP Article from Computers Today www.technologysu.com – Email Section 

Page 23: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 23/51

Fragile Nature of Digital Evidence

• The nature of computer based evidence makes it

inherently fragile. Data can be erased or changedwithout a trace, impeding an investigator’s job to find thetruth.

• The efforts of first responders are critical to ensure that

the evidence is gathered and preserved in a simple,secure, and forensically sound manner.

Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations 

Page 24: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 24/51

Fragile Nature of Digital Evidence

• Fragile data are those things stored on the hard drive but

that can be easily altered, especially by a first respondertrying to determine if an incident has occurred.

• These could include access dates on files or temporaryfiles. Once these files have been altered by a first

responder, there is no way to recover the original data.

Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations 

Page 25: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 25/51

Fragile Nature of Digital Evidence

• The simple act of turning a computer on can destroy or

change critical evidence and render that evidenceuseless. –  Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

• Even the normal operation of the computer can destroy

computer evidence that might be lurking in unallocatedspace, file slack, or in the Windows swap file. –  Computer Forensics, Computer Crime Scene Investigation, 2 nd Ed. John R. Vacca 

Page 26: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 26/51

Fragile Nature of Digital Evidence

• The next 3 slides demonstrate what happens

when you operate a computer. – Evidence is modified.

 – Evidence is destroyed.

Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations 

Page 27: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 27/51

Files In Original Condition

Page 28: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 28/51

Files After Opening and Viewing

The last accessed date andtime changes any time a fileis opened and viewed while

the computer is inoperation.

Page 29: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 29/51

Files After Saving

The last written date andtime changes any time a fileis saved or copied while the

computer is in operation.

Page 30: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 30/51

Seizing Computer Evidence

General Guidelines

Page 31: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 31/51

General Guidelines for Seizing Computers and Digital Evidence

• Seizing a Stand-Alone Home Computer in a

Residence• If the computer is “powered off”, DO NOT turn it

on.

• If the computer is “powered on”, do not allow thesuspect or any associate to touch it. Offers toshut the computer down may be a ruse to start a

destructive program that may destroy theevidence. This can be done with one keystroke.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 32: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 32/51

General Guidelines for Seizing Computers and Digital Evidence

• Before touching the computer,place an unformatted or blank

floppy disk into the floppy diskdrive(s), document, videotapeand/or photograph thecomputer system, and write

detailed notes about what is onthe computer’s screen.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 33: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 33/51

General Guidelines for Seizing Computers and Digital Evidence

• Photograph the back ofthe computer andeverything that isconnected to it.

• Photograph and label the

back of any computercomponents with existingconnections to thecomputer.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 34: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 34/51

General Guidelines for Seizing Computers and Digital Evidence

• If you have a computer specialist on the scene,

he will have been trained to recognize theoperating system and will know the proper wayto shut down the computer system without

altering files or losing any evidence.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 35: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 35/51

General Guidelines for Seizing Computers and Digital Evidence

• If you do not have a computer specialist on

the scene, the safest way to turn off a Windows98/95/3.1/DOS computer, is to Pull the plug fromthe back of the computer. Pulling the plug couldseverely damage the system; disrupt legitimate

business, and create officer and departmentliability. It is especially important to have aspecialist available when dealing with businesscomputers, networked computers andcomputers based on Macintosh, Windows NT,and Unix/Linux operating systems.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 36: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 36/51

General Guidelines for Seizing Computers and Digital Evidence

• After shutting the computer down and powering

the computer off:• Disconnect all power sources; unplug the powercords from the wall and the back of thecomputer. Notebook computers may need to

have their battery removed.• Place evidence tape over each drive slot, the

power supply connector, and any other opening

into the computer. This should include sealingthe case itself

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 37: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 37/51

General Guidelines for Seizing Computers and Digital Evidence

• Only specially trained and qualified Computer ForensicInvestigators working in a laboratory setting shouldanalyze computers and other forms of digital evidence.

• The simple act of turning a computer on can destroy orchange lritical evidence and render that evidence

useless.• The Maryland State Police Computer Forensics

Laboratory will not routinely accept digital evidence foranalysis if that evidence has been tainted thoughhandling by unqualified personnel.

Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit 

Page 38: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 38/51

Preservation• Once digital evidence is seized it must be

handled carefully to preserve and protect theevidence.

 – Everything should be tagged.

 – No one should operate or preview any evidence onwritable media without proper tools and training.

 – Forensically sound copies of all original evidencemust be made before analysis.

 – Records must be kept.

Page 39: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 39/51

Analysis• Analysis involves recovering and analyzing

evidence for relevance to the case. – Accepted tools should be used.

 – Search and analysis must be within the scope of thewarrant.

 – Bench notes should be kept by the examiner.

Page 40: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 40/51

What are you looking for?• E-Mail

• Pictures• Internet History

• Documents

• Spreadsheets

• Internet Chat Logs

• Financial Data

• PDF Files

• Suspiciously RenamedFiles

• Yahoo Messenger, AOLChat, MSN Messenger,

Internet Relay Chat• Many Others

Page 41: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 41/51

Hiding The Evidence• Deleting Files

• Deleting Internet History• Formatting Drives

• Re-Partitioning Drives

• Physically DestroyingHard Drives and Floppies

• Passwords

• Using On-Line E-Mail

 – Hotmail

 – Yahoo Mail

• IPods and personalstorage devices that can

be overlooked.

Page 42: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 42/51

Recovering The Evidence• Find Deleted Files

• Un-Format Drives• Rebuild Partitions

• Recover Passwords

• Find hidden files and folders.

• Re-construct web pages.

• Locate deleted Email

Page 43: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 43/51

Analysis• Metadata

 – Many types of files contain metadata.• Metadata is information embedded in the file itself thatcontains information about the file.

 – Microsoft Office Documents

• Computer name

• Total Edit Time• Number of editing sessions.

• Where printed.

• Number of times saved.

 – Digital camera pictures.• Make and model of camera

• Dates and times

Page 44: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 44/51

Document Metadata

Page 45: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 45/51

Picture Metadata

f C

Page 46: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 46/51

Internet History – Before Clearing

Internet History After Clearing

Page 47: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 47/51

Internet History – After Clearing

Page 48: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 48/51

Presentation• Court presentation for a jury must be simple and

straightforward. – Timelines

 – Emails

 – Documents – Pictures

Page 49: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 49/51

How Computer Evidence is Used – Verify Alibis

 – Establish Relationships Between Defendant andVictim or Accomplices

 – Establish Documentation of Events

 – Establish Mitigating Circumstances

 – Documents for use by Forensic Psychologists

 – Document Time Lines

Page 50: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 50/51

Discovery• Officer’s investigator’s notes

• Forensic investigator’s bench notes• Search warrant

• Forensically sound copies of all imaged media

• Forensics report

Page 51: Computer Forensics Prsentation

8/8/2019 Computer Forensics Prsentation

http://slidepdf.com/reader/full/computer-forensics-prsentation 51/51

Questions?