Computer Forensics Discovery and recovery of digital evidence

Slides:



Advertisements
Similar presentations
Intro to WinHex CSC 414.
Advertisements

E-Discovery in Government Investigations and Criminal Law JOLT Symposium February 22,
COEN 252 Computer Forensics
Evidence Collection & Admissibility Computer Forensics BACS 371.
Guide to Computer Forensics and Investigations, Second Edition
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
BACS 371 Computer Forensics
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Computer Forensics CS 407 MW 10:30 – 12:30 Texts: File System Forensic Analysis, Brian Carrier Windows Forensics Analysis, 2 nd editiion, Harlan Carvey.
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
Digital Crime Scene Investigative Process
Two competing options: (1) Military tribunals / commissions Most recently, created by Executive Order in Nov 2001 Secretary of Defense ordered to establish.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Lecture 11: Law and Ethics
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Evidence Handling If the evidence is there the case is yours to lose.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Showing the Developer Tab. Windows vs Mac This is one of the places where the Mac and Windows procedures are different. We’ll look at the Windows method.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Organizing Your Computer: How to Use Files & Folders Cyberspace Explorations November 17, 2004.
Any criminal action perpetrated primarily through the use of a computer.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Case Brief Gregory Morton William Campbell Dave Wildner.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Forensic Computer Techniques
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
Forensic and Investigative Accounting
Getting Started with Adobe Photoshop CS6
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Chapter 13 The IT Professional
Configuring Windows 10 for Your Studio
Computer Forensics 1 1.
Introduction to Computer Forensics
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Exam Information CSI5107 Network Security.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
On-Site Investigations
Presentation transcript:

Computer Forensics Discovery and recovery of digital evidence Usually post facto Sometimes real time Types of forensic investigations Liturgical Going to court Crimes, etc. Non-Liturgical Administrative adjudication Industry

Skills and Knowledge Be aware of the many types of digital devices and their components and potential contents Develop a Web behavior profile Learn how to seize a computer and other devices Proper handling of digital evidence How to search a computer for evidence Analyze a phishing scam Become more knowledgeable about the digital/information world 06/11/2018

Purpose Prove or disprove criminal activity Prove or disprove policy violation Prove or disprove malicious behavior to or by the computer/user If the evidence is there, the case is yours to lose with very little effort.

Legal and Ethical Issues Computer Forensic Exams are Illegal. Without the cover of Law 4th Amendment You will learn dual use technology. All tools can be used to commit crime All procedures can be used to hide crime It is unethical to breach some ones expectation of privacy. 06/11/2018

Responsibilities Evidence Respect for suspects privacy and rights All of it Emphasis on exculpatory Respect for suspects privacy and rights Beware of collateral damage Be very very careful if you demonstrate what you can do.

Privacy Issues Rights of the suspect Liabilities of the investigator Public versus private storage of information Expectation of privacy

Evidence Forensics is all about evidence. Something that tends to prove or disprove the existence of an alleged fact. Federal Rules of Evidence govern proceedings in the courts of the United States. 06/11/2018

Evidence Admissible Reliable Authentic Complete Believable must be legally obtained and relevant Reliable has not been tainted (changed) since acquisition Authentic the real thing, not a replica Complete includes any exculpatory evidence Believable lawyers, judge & jury can understand it 06/11/2018

Evidence Admissible Reliable Authentic Complete Believable Search Warrant, Wire Tap, NSL Reliable Chain of custody, protected, properly handled Not tainted, not changed, MD5 Authentic Computer data is different Complete Must search entire hard disk Believable Impossible for geeks

Conviction Must Prove: Actus Reaus - The criminal act Mens Rea - The criminal intent 06/11/2018

Intro to WinHex WinHex – A hexadecimal editor for Windows A general purpose forensic analysis tool we will use for this course. Excellent professional grade tool. You can download a trial version. It has limited capability But you can do a lot with it. Then complete your assignments in the lab. The license is good for a limited time.

WinHex Main Screen

Open a File

Navigate to the Desired File

Select and Open What have we done?

WinHex Display of file WinHex displays the entire contents of the file. Extreme left is the offset (position) relative to the beginning of the file. In this display the position is in hexadecimal. We will change this in a little bit. The central panel is the data display in hexadecimal. The far right panel is an attempt to display the file contents in characters, i.e. ASCII characters.

Offset Change Select General Options from the Options menu.

General Options We are interested in offsets. Unselect Hexadecimal offsets.

Magic

View as Text Only

Text

Open an Image File Find an image somewhere Maybe an image from a camera or cell phone Open in WinHex To close right click on tab Choose Close - all gone

Open an Image

Actual Image Data

MAC Information All files carry information about the file itself Metadata This info is contained in the file or in the directory MAC Create time Modify time Access time This information is very important to case development.

MAC & Evidence The MAC time info is changed when the file is opened, viewed or changed. Consequently, when a drive is opened it is changed. Be very careful when handling digital evidence.

MAC Data

More Metadata Pictures from cameras have it Called EXIF data

Exif Data

Exif Cont’d

Search File for Text Offset in decimal, go find the text.

Find Text Position  Go To Offset Type in desired offset. Select OK

JPEG Found JPEG

Physical Media vs. Logical Drives Raw memory No structure No contents – only a stream of data Logical Drives Structured File system Files

Tools Menu

Physical Opened Not Terribly Useful

Opening whatever is on the Drive

Closer Check the Windows Explorer box.

Now We can See Stuff

Double Click on a File Beginning of file.

Cruising Through Deleted Files - Dimmed Interesting $$$

A Closer Look Maybe we have a business!

Computer Forensics Be careful You are Law Enforcement Protect all parties Evidence must be Admissable Reliable Authentic Complete Believable

Lab Play with WinHex Open a device Open a file Open an image Explore Like this presentation