Digital forensics tools and methodologies in archival repositories

Slides:



Advertisements
Similar presentations
Gretchen Gueguen Digital Archivist April 12, 2012.
Advertisements

Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Watching the Detectives Forensic Information in Digital Objects (FIDO)
GETTING BITS OFF DISKS Using Open Source Tools to Prepare Born-Digital Materials for Long-Term Preservation and Access To connect to the audio portion.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Transformations at GPO: An Update on the Government Printing Office's Future Digital System George Barnum Coalition for Networked Information December.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
COEN 252 Computer Forensics
Hands-on: Capturing an Image with AccessData FTK Imager
Information Technology & Computer Science E-Discovery Lab Identification and Collection Seminar on E-Discovery, February 9th, 2012, College of Information.
July 9, National Software Reference Library Douglas White Information Technology Laboratory July 2004.
Anthony Atkins Digital Library and Archives VirginiaTech ETD Technology for Implementers Presented March 22, 2001 at the 4th International.
Untitled (Hidden Track): Born Digital Content Preservation Service at UIUC Tracy Popp, MS LIS, CAS Digital Preservation Coordinator University Library.
IT Essentials: PC Hardware and Software 1 Chapter 7 Windows NT/2000/XP Operating Systems.
2 © 2004, Cisco Systems, Inc. All rights reserved. IT Essentials I v. 3 Module 6 Windows NT/2000 Operating Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Tutorial 11 Installing, Updating, and Configuring Software
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Copyright 2013 © President & Fellows of Harvard College Digital Forensics at Harvard Business School NE NDSA Lightning Talk, 10 May 2013 Rachel Wise, Baker.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Fundamentals of Administering Windows Server 2008.
Guide to Computer Forensics and Investigations Fourth Edition
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Archivists’ Toolkit: Introduction March 12, 2007 Jody Lloyd Thompson.
Module 1: Installing Microsoft Windows XP Professional.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Microsoft Windows XP Professional MCSE Exam
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Architecture Review 10/11/2004
Understanding and Improving Server Performance
Creighton Barrett Dalhousie University Archives
Create setup scripts simply and easily.
Tools for identifying duplicate files and known software files
The importance of being Connected
An Overview of Data-PASS Shared Catalog
StratusLab Tutorial (Bordeaux, France)
Joseph JaJa, Mike Smorul, and Sangchul Song
Introduction to Computers
Chapter 5 EnCase Concepts.
Knut Kröger & Reiner Creutzburg
Design Unit 26 Design a small or home office network
IT Infrastructure: Software
Cloud computing mechanisms
Digital Forensics Dr. Bhavani Thuraisingham
Digital Forensics CJ
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
PLANNING A SECURE BASELINE INSTALLATION
Data Management Components for a Research Data Archive
IBM Tivoli Storage Manager
IT Management, Simplified
Presentation transcript:

Digital forensics tools and methodologies in archival repositories Creighton Barrett, Dalhousie University Archives Faculty of Computer Science Seminar Series May 16, 2017 – Jacob Slonim Room (430) Goldberg Computer Science Building

Overview Introduction to digital forensics in archival repositories Development of Dalhousie’s digital forensics lab Forensic images Digital forensics tools and workflows Case study: Bill Freedman fonds Research challenges and next steps Digital forensics tools and methodologies in archival repositories

What is digital forensics? Forensic science – recovery and investigation of data found in digital storage devices Primarily used in criminal investigations, corporate investigations (by specially trained professionals) Archives are adopting digital forensics techniques to support acquisition, accessioning, preservation, and access Acquisition Identification Evaluation Admission Source: Infosec Institute, Digital Forensic Models (January 25, 2016): http://resources.infosecinstitute.com/digital-forensics-models/ Digital forensics tools and methodologies in archival repositories

Source: Kam Woods, Preservation, Privacy, and Access: Enhancing Digital Curation Workflows with Forensic Analysis (March 21, 2017): http://wiki.bitcurator.net/downloads/kwoods-unc-digpres-v12.pdf Digital forensics tools and methodologies in archival repositories

Unfamiliar territory for archivists Windows registry analysis Deleted files (slack space / unallocated space) Cached data Encrypted data Passwords Filesystem permissions Distributed systems and data Digital forensics tools and methodologies in archival repositories

Why have a digital forensics lab? Source: Baker, M. (2017, May 2). Disks back from the dead. Nature, 545 (7652), 117–118. https://doi.org/10.1038/545117a Digital forensics tools and methodologies in archival repositories

Why have a digital forensics lab? Archivists are now working with a wide variety of: Digital storage devices Computer file systems, operating systems, and software File formats Digital storage devices are unstable and data is at risk Supports archival mission to preserve authenticity and integrity of records Digital forensics tools and methodologies in archival repositories

How are archives doing digital forensics work? Use write-blockers to create forensic images Adopt forensic software (BitCurator or FTK or EnCase) Incorporate digital forensics tools and techniques into core archival functions New policy decisions (e.g., preserve forensic image or extract files?) Archival functions become blurred (e.g., files can be arranged before they are accessioned) Digital forensics tools and methodologies in archival repositories

Components of forensic workstation Dual Intel Xeon processor 64 GB RAM NVIDIA GeForce GT740 graphics card Tableau T35689iu write-blocker AFT EX-S3 forensic card reader M-DISC triple burner (CD, DVD, Blu-Ray) 4-bay 2.5 inch RAID cage (4 x 500 GB SATA III SSDs (2 x SSDs configured in RAID 0 for database storage) 5-bay RAID cage (4 x 2 TB SAS HDDs configured in RAID 5 and 1 x 250 GB SATA III for OS/apps) Forensic Toolkit (FTK) and BitCurator software Digital forensics tools and methodologies in archival repositories

Timeline at Dalhousie February 2016 – Acquire forensic workstation May – November 2016 – Digital archives collection assessment project: http://hdl.handle.net/10222/72663 January 2017 – Install BitCurator and Forensic Toolkit (FTK) software February 2017 – Advanced computer forensics training May 2017 – Launch digital forensics lab April 2017 – Dal’s first time at BitCurator Users Forum Digital forensics tools and methodologies in archival repositories

Digital forensics tools and methodologies in archival repositories

Forensic images

What is a forensic image? Complete (i.e., bit-level) copy of a hard drive or other digital storage media Includes unallocated space and slack space Includes operating system and file system Includes computer registry files, browser history, and other contextual information about how the computer was used Includes all files on the hard drive Digital forensics tools and methodologies in archival repositories

Overwrite zero with one = more like 0.95 Image source: http://www.pinpointlabs.com/wordpress/tag/unallocated-space/ Overwrite zero with one = more like 0.95 Overwrite one with one = more like 1.05 Normal equipment will read both values as a one Digital forensics equipment makes it possible to determine what data exists in “slack space” and “unallocated space.” Digital forensics tools and methodologies in archival repositories

Preserve data in slack space / unallocated space Image source: Priveon Labs Security Blog: http://blog.priveonlabs.com/sec_blog.php?title=forensic-basics-slack-space&more=1&c=1&tb=1&pb=1 Digital forensics tools and methodologies in archival repositories

Preserve information about the operating system and file system Image source: Power Data Recovery: https://www.powerdatarecovery.com/hard-drive-recovery/volume-not-contain-recognized-file-system.html Digital forensics tools and methodologies in archival repositories

Some differences between forensic and logical images Forensic image Logical image Bit-level copy of entire disk Copy of logical partition or files in a directory Enables registry analysis, password recovery, decryption, etc. Not usually suitable for robust forensic analysis Disk image is size of entire hard drive, regardless of how many files are stored Disk image is size of files copied from logical partition or directory Suitable for law enforcement + digital archives backlog Suitable for packaging known files in a directory Digital forensics tools and methodologies in archival repositories

FTK Imager – Create and verify image Digital forensics tools and methodologies in archival repositories

Digital forensics tools

Digital forensics tools and methodologies in archival repositories

Digital forensics tools and methodologies in archival repositories

Digital forensics tools and methodologies in archival repositories

Image source: KryoFlux: https://kryoflux.com/?page=kf_tech Digital forensics tools and methodologies in archival repositories

Digital forensics tools and methodologies in archival repositories

Forensic Toolkit (FTK) Three components Database (Oracle, PostgreSQL, Microsoft SQL) Graphical user interface (GUI) Known file filter server (contains datasets with hash values for known file types) Indexing, live search, regular expression Oracle “Outside In” technology for previewing most file types Integration with other AccessData products (Registry Viewer and Password Recovery Toolkit) Digital forensics tools and methodologies in archival repositories

FTK – Flag Duplicates Simple process, very time consuming, still a powerful feature Scans entire file and generates MD5 Assigns primary status to first instance of each MD5 Assigns secondary status to subsequent instances of each MD5 Digital forensics tools and methodologies in archival repositories

FTK – Flag Duplicates Digital forensics tools and methodologies in archival repositories 32

FSlint (finds file system “lint”) Duplicates Installed packages Bad names Name clashes Temp files Bad symlinks Bad IDs Empty directories Non stripped binaries Redundant whitespace Digital forensics tools and methodologies in archival repositories

FSlint – Flag Duplicates Multiple scans to maximize efficiency and minimize false positives Filters out files of different sizes Checks to ensure files are not hard-linked Checks first 4k bytes and filters out files with unique MD5 Checks entire file and filters out files with unique MD5 Checks remaining files and filters out files with unique SHA-1 (to avoid MD5 collisions) Image source (BitCurator wiki): https://wiki.bitcurator.net/index.php?title=Identify_and_delete_duplicate_files Digital forensics tools and methodologies in archival repositories

NSRL Reference Data Set (RDS) Image source (NSRL): https://www.nsrl.nist.gov/Documents/Data-Formats-of-the-NSRL-Reference-Data-Set-16.pdf Digital forensics tools and methodologies in archival repositories

NSRL Reference Data Set (RDS) Hashsets and metadata used in file identification Data can be used in third-party digital forensics tools RDS is updated four times each year As of v2.55, RDS is partitioned into four divisions: Modern – applications created in or after 2000 Legacy – applications created in or before 1999 Android – Mobile apps for the Android OS iOS – Mobile apps for iOS Digital forensics tools and methodologies in archival repositories

FTK – Known File Filter (KFF) KFF data – hash values of known files that are compared against files in an FTK case KFF data can come from pre-configured libraries (e.g., NSRL RDS, DHS, ICE, etc.) or custom libraries FTK ships with version of NSRL RDS bifurcated into “Ignore” and “Alert” libraries KFF Server – used to process KFF data against evidence in an FTK case KFF Import Utility – used to import and index KFF data Digital forensics tools and methodologies in archival repositories

FTK – Known File Filter (KFF) Used to eliminate known software and OS files in a forensic case OR highlight presence of “alert” files Used to “profile” someone before getting into case analysis (e.g., can help detect the usage of forensics programs such as drive cleaners) Custom libraries can be used to find known files (especially in IP theft cases) Custom libraries could be used to flag duplicates across multiple acquisitions from same donor Digital forensics tools and methodologies in archival repositories

Other tools to work with NSRL RDS nsrlsvr - https://github.com/rjhansen/nsrlsvr/ Keeps track of 40+ million hash values in an in- memory dataset to facilitate fast user queries Supports custom libraries (“local corpus”) nsrlllokup - https://rjhansen.github.io/nsrllookup/ Command-line application Works with tools like hashdeep: http://md5deep.sourceforge.net/ National Software Reference Library - MD5/SHA1/File Name search - http://nsrl.hashsets.com Digital forensics tools and methodologies in archival repositories

Generated by Forensic Toolkit software Standard Description Comments FTK XML Generated by Forensic Toolkit software Primarily used to store templates, settings, etc. DFXML Digital forensics XML schema Used in BitCurator and SleuthKit but not in FTK PREMIS Data Dictionary for Preservation Metadata International metadata standard to support the preservation of digital objects RAD Rules for Archival Description Canadian standard for archival description EAD Encoded Archival Description XML schema for encoding and exchanging archival descriptions ISAAR (CPF) International Standard for Archival Authority Records International standard for describing corporate bodies, persons, and families EAC Encoded Archival Context XML schema for encoding ISAAR(CPF) records Digital forensics tools and methodologies in archival repositories

Digital forensics workflows

Abstract digital forensics model Identification Preparation Approach Strategy Preservation Collection Examination Analysis Presentation Returning Evidence Source: Infosec Institute, Digital Forensic Models (January 25, 2016): http://resources.infosecinstitute.com/digital-forensics-models/ Digital forensics tools and methodologies in archival repositories

Penn State University workflow Digital forensics tools and methodologies in archival repositories

Dalhousie University workflow (draft) Very premature Does not factor staffing, roles and responsibilities, etc. Relates to other workflows in development (e.g., acquisitions, accessioning) Digital forensics tools and methodologies in archival repositories

Accessioning, appraisal, and processing workflow (draft) Digital forensics tools and methodologies in archival repositories

Forensic imaging workflow (BitCurator) Digital forensics tools and methodologies in archival repositories

Identify privacy concerns (BitCurator) Digital forensics tools and methodologies in archival repositories

Case study: Bill Freedman fonds

Case study: Bill Freedman fonds Overview of the collection Digital forensics Policy, ethics, and legal context Next steps Digital forensics tools and methodologies in archival repositories

Create forensic images Export Hash Convert Preview data Triage Create forensic images Export Hash Convert Digital forensics tools and methodologies in archival repositories

Digital forensics tools and methodologies in archival repositories

Bill Freedman fonds filtered in FTK Description # of files Size Unfiltered All files in case 26,651,084 3,568 GB Primary status Duplicate File indicator IS “Primary” 731,417 83.48 GB Secondary status Duplicate File indicator IS “Secondary” 16,569,218 271.5 GB KFF Ignore Match all files where KFF status IS “Ignore” 2,548,119 44.29 GB No KFF Ignore Match all files where KFF status IS NOT “Ignore” + KFF status IS “Not checked” 24,102,965 3524 GB Primary status + No KFF Ignore Match all files where duplicate file indicator IS “Primary” + KFF status IS NOT “Ignore” 626,351 71.95 GB Actual files + Primary status + No KFF Ignore Match all disk-bound files where duplicate file indicator IS “Primary” + KFF status IS NOT “Ignore” 103,412 61.81 GB Digital forensics tools and methodologies in archival repositories

Policy, ethics, and legal context Recovery of deleted files if they appear to be archival? Decryption of EFS files? Other encryption methods? Use of Password Recovery Toolkit? Use of registry information, browser history, etc. to support archival appraisal? Modifications to standard deed of gift template? Monetary appraisal of born-digital archival material? Digital forensics tools and methodologies in archival repositories

Research challenges and next steps Forensics in a networked environment Development of digital forensics workflow Development of lab manual Data transfer / storage protocols Finish processing Bill Freedman fonds Create forensic images of media identified during Digital Archives Collection Assessment Digital forensics tools and methodologies in archival repositories