Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
OC RIMS Cyber Safety & Security Incident Response.
Computer Forensics.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Effective Discovery Techniques In Computer Crime Cases.
E-Discovery for System Administrators Russell M. Shumway.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File System Analysis.
Guide to Computer Forensics and Investigations, Second Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
 What is electronic data?  Information stored electronically, e.g. pictures, music, documents, etc.  Where can you store your data?  Cell phones 
By Drudeisha Madhub Data Protection Commissioner Date:
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
17-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein COMPUTER FORENSICS.
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Computer Data Expert The following slides are from a presentation developed to support/explain a Data Forensics expert testimony. Click or hit spacebar.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Creighton Barrett Dalhousie University Archives
Chapter 3 First Response.
Guide to Computer Forensics and Investigations Fifth Edition
Chapter 5 EnCase Concepts.
Computer Forensics Discovery and recovery of digital evidence
Acquisition and Examination of Forensic Evidence
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
COEN 252: Computer Forensics
Digital Forensics Chris Rozic.
COMP1321 Digital Infrastructures
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
Digital Forensics CJ
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Chapter 17 COMPUTER FORENSICS.
Understanding Forensic Images
Solutions to Secure File Deletion
Microsoft Office Illustrated Fundamentals
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police

Overview Definitions Process Common Issues, Strategy & Case Examples

Data Storage Bits, Bytes, Sectors, Clusters, and Slack Space 1 Bits, Bytes, Sectors, Clusters, and Slack Space Bit: Smallest unit of data on a computer (0 or 1) Byte: 8 bits (A = 01000001) Sector: A subdivision of the storage medium, commonly 512 bytes Cluster: A group of sectors (commonly 8)

Simple example A 2048 byte file (a text file with 2048 characters) would take up 4096 bytes of space because that is 1 cluster and a cluster is the smallest amount of data a computer can address This means that the other 2048 bites of that cluster won’t be used and could contain data (called slack space)

Deleted files When you delete a file, operating systems generally delete the reference to the file, but not the file itself. The deleted file can remain on the storage device until the space it occupies is needed for new data.

Overwritten Previously deleted file where operating system has written new data over some or all of the file.

Wipe/Secure Delete Generally done for free space, intentionally overwrites data so that original data isn’t recoverable Secure delete functions do this at the time of deleting Can be used to infer intentional destruction of discovery Generally files are overwritten with a specific character, commonly 0

file carving Identification and extraction of files from unallocated space using file signatures

Partially Overwritten File Active File Deleted File Wiped File 1 1 1

Trash/Recycle Easily recoverable Metadata probably still in tact Unallocated Space Data carving Easily Recoverable Metadata may be gone Overwritten May recover partial file if partially overwritten Secure Delete/Wipe File intentionally overwritten Data gone and not recoverable

Forensic imaging/Forensic image Non-destructive, verifiable, and repeatable exact bit-for-bit duplication of a storage device used for forensic examination. Non-destructive – does not alter anything on the original device Verifiable – uses hash values to confirm exact bit-for-bit match Repeatable – subsequent forensic images will produce the same results

Forensic Process Identification Acquisition Preservation Analysis Reporting

Identification Use knowledge of case to identify or predict types of electronic devices involved, information each device may provide, and rank importance of devices

Acquisition Obtain original electronic items (if possible) Create forensic images of devices (if possible) Critical step because, if not done properly, data can be altered First step in chain of custody

Forensic image vs backup Bit-for-bit copy of drive Entire drive Captures deleted files Non-destructive Verifiable Repeatable Copy of active files User-selected portions of drive May capture files in trash May alter metadata Generally no verification Results may vary with repetition

Preservation Original evidence should be pulled and tagged to prevent changes If parties agree, verified forensic image can be shared with all parties. This is generally done when servers are involved

Analysis Generally performed on forensic image, not on original disk Uses forensically sound software Should be a joint effort between forensic expert and attorney or investigator Triage can help narrow the focus

Reporting Reports include information to show that forensic copies are verified copies Anything provided in report should be able to be replicated by another expert Reporting, at least on the criminal side, is changing a bit (more on that later)

Common issues & Strategy

How long does this take? Time it takes can cause speedy trial issues as well as cost issues Factors influencing time: Amount of data Quality of storage devices Quality of forensic devices Scope of search Priority of case

Triage & Preliminary reports Triage is now commonly used to narrow focus of searches Preliminary reports & products generated automatically by forensic tools can be used to negotiate a deal Full reporting is only used when a trial will happen

Forensic Expert vs. IT Expert Two different skill sets at play Forensic experts don’t need to be IT experts and IT experts don’t need to be forensic experts Forensics is an expensive field to enter, free file recovery tools from the Internet aren’t forensic tools IT professionals aren’t commonly trained on evidentiary issues like chain of custody etc…

juries Forensic experts need to be able to speak to normal humans Many times, the first part of testimony may be something like the beginning of this presentation If two experts get into a battle of technical terms, the jury is guaranteed to get lost An expert who can draw non-technical analogies is golden

Mobile devices Repeatable results? Why not? Flash memory is a chip not a "disk". Limited life of hardware as memory is programmed and erased using electrical currents. Files written to blocks with defined space. Garbage Collection - Background process of duplication of files and deletion of "dead" files maximizing space without user involvement. Wear Leveling "rotating your tires" – User deletion will copy everything in that block to another block. Leaving duplicates behind until the space is needed. 

Wear leveling

The cloud Phones, tablets, computers, appliances, smart home, fitness trackers, any "smart" technology. APPLICATIONS – data is not local The Cloud Act - PL 115-141 (March 23, 2018) Primarily the CLOUD Act amends the Stored Communications Act (SCA) of 1986 to allow federal law enforcement to compel U.S.-based technology companies via warrant or subpoena to provide requested data stored on servers regardless of whether the data are stored in the U.S. or on foreign soil. Preservation orders and notification. Volatile and available during preview. Seize and seek authority to search?

On-site preview Useful and volatile data. ENCRYPTION RAM dump. Known files. Triage what to seize and what can be left behind. Improve workload efficiency at forensic lab. Assist in interview and investigation in real time. Father / son example Destruction of evidence? Search Warrant issues. One warrant or two?