By Sarah Brule COMP 1631, Winter 2011 February 2nd, 2011.

Slides:



Advertisements
Similar presentations
Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
2 Language of Computer Crime Investigation
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Effective Discovery Techniques In Computer Crime Cases.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
TC2-Computer Literacy Mr. Sencer February 8, 2010.
Chapter Introduction to Computers and Programming 1.
Chapter 7 Working with Files.
Digital Forensics Survey of Information Assurance.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Licitware a forensic software tool designed to investigate computer crimes.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
Chapter 1: Introduction to Computers and Programming.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1: Introduction to Computers and Programming.
Digital Crime Scene Investigative Process
Digital Planet: Tomorrow’s Technology and You
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Reliability and Recovery CS Introduction to Operating Systems.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Computer Security Fundamentals by Chuck Easttom Chapter 14 Introduction to Forensics.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Processing Hardware, Software. Hardware Hardware Processing is performed by a computer ’ s central processing unit and is measured by the clock speed.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics and Hand Held Devices Robert Trimble COSC
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Models of Models: Digital Forensics and Domain-Specific Languages
Creighton Barrett Dalhousie University Archives
Chapter 7: Investigating Theft Acts
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Presentation transcript:

By Sarah Brule COMP 1631, Winter 2011 February 2nd, 2011

 Digital forensics is the examination, analysis and recovery of digital devices such as floppy disks, flash drives, hardrives as evidence during criminal investigation  It is often used for computer crimes or other crime scenes where a computer may of been used.

 What most people don’t know is a deleted item is only marked, it is still in the memory in form of “slack space” which is leftover bits of old files that can be re-located and put back together.  Digital forensics can be used for other crimes, in order to confirm alibis and statements, to identify motives and other relevant information needed to solve a crime.

Initially, investigators will look for more obvious things such as:  Signs of intrusion - Such as hidden files, directories, logs  Graphic images - Web history, image files  Personal Information - , documents * After reconstruction, it will also be possible to find deleted items that were stored in the slack space of the data storage

 First step is to figure out what information may be relevant. It must be in its unaltered state.  The investigator must then make a duplicate image of the information needed and use a write blocking tool in order to prevent any alteration of the original.

Analysis and imaging  Analysis is the process of using scientific methods of obtaining the information from the digital device in order to reconstruct the evidence.  During analysis, the duplicate is used in order to preserve any data from original form so not to contaminate the evidence.  Types of analysis are :  Text analysis  Image analysis  Video analysis  Executable analysis  File clustering / classification  Password Cracking

 A bitstream is a time series of bits. These are found in computing devices and are used to create files when stored in data storage  During analysis, the investigator must use a bit stream download in order to copy the files, instead of just copy and paste, in order to preserve the slack space as well as the file.  One change in the bit stream could alter the information that is being reconstructed.

 Reconstruction of data is the rebuilding deleted, damaged and lost files in order to find the evidence that is needed.  It can be found in one of three places:  Slack space  Virtual memory  Encrypted Files  The investigator must prove that the information revealed by reconstruction is relevant or inconsistent by using algorithm functions.

 In order for investigators to recover deleted files, they must use a data-recovery software.  It is almost impossible to delete all forms of data off a computer or other digital device. Even a destructive system restore will leave some files deep in the hardrive.  Formatting does not destroy any files, it just makes the files “hidden”.  The only way to be 100% certain that the files are deleted is to do a forensic wipe-out of your hardrive.

 The B-Method was created in It is a very convenient way to find data inconsistencies in digital evidence. Instead of language like in Java, C++, etc. B uses something called Abstract Machine Notation(AMN) which is a very complex language using calculus and complex algorithms  The B-Method uses complex algorithm functions in order to tell you how the system works. Using algorithm functions, You can find out what always holds true in a system and what is inconsistent.  This is very popular in the forensics field because you can manipulate your program to find information that was made up to seem “normal” in a system.

 The steps to using the B- Method is to first create a program using algorithm language to specify the properties that always hold true in a system. Once that is done, investigators will then write a program concerning the evidential data in order to find inconsistencies in the system.  The program is there to analyse files stored in the memory but also any inconsistency in the absence of files that seems that they should be there, and where the timestamps on certain logs don’t match up with anything. These tend to be harder to do without algorithmic functions.  Sample of the B-method  “MACHINE FTPServer  DEFINITIONS  MODIFY == 1;  DELETE == 2;  FILESLOT == N ;  TIMESTAMP == N ;  EVENT == N ;  LAST_INDEX(X,Y,Z) == max(dom(log {(XαYαZ)}))  CONSTANTS max_log_size  PROPERTIES max_log_size ∈ N1  VARIABLES fileStore, clk, log  INVARIANT  fileStore ∈ FILESLOT TIMESTAMP ∧  clk ∈ N ∧  log ∈ seq(TIMESTAMP×EVENT×FILESLOT) ∧  /* Property 0 */  ( ∀ (slot,mtime,dtime).(slot ∈ TIMESTAMP ∧ mtime ∈ TIMESTAMP ∧ dtime ∈ TIMESTAMP ∧  (mtime,MODIFY,slot) ∈ ran(log) ∧  ∀ otime.(otime ∈ TIMESTAMP ∧ (otime,MODIFY,slot) ∈ ran(log) ⇒ mtime≥otime) ∧  dtime>mtime ∧ (dtime,DELETE,slot) ∉ ran(log)  ⇒ fileStore(slot) = mtime)) ∧  /* Property 1 */  ( ∀ (slotX,slotY).((slotX ∈ dom(fileStore) ∧ (fileStore(slotX),MODIFY,slotX) ∈ ran(log) ∧ slotY ∈  dom(fileStore) ∧ (fileStore(slotY),MODIFY,slotY) ∈ ran(log) ∧ (slotX ≠ slotY)) ⇒  (LAST_INDEX(fileStore(slotX),MODIFY,slotX) < LAST_INDEX(fileStore(slotY),MODIFY,slotY)  ⇒ fileStore(slotX) ≤ fileStore(slotY)))) ∧  ( ∀ (slotX,slotY).((slotX ∈ dom(fileStore) ∧.” ( Gladyshev, Pavel, 20)

 Digital forensics can be branched off into 4 different categories  Computer Forensics  Mobile Device forensics  Network Forensics  Database Forensics

 Computer forensics is one of the 4 branches from digital forensics. It is often associated with computer crimes. It is used to explain the current state of a computing device  It deals with information in computers, embedded systems and static memory. Computer forensics deals with a broad range of information from computer logs and actual files, to lost and deleted files.

 Mobile device forensics deals with the recovery of information off mobile devices such as cell phones and PDA’s.  The difference between computer and mobile forensics is the investigator will be searching for simple forms of communication (SMS or ) information instead of deleted files.  Mobile device forensics also helps in locating people, as well as information.

 Network Forensics: Network forensics is the analysis of networks. Investigators often search for signs of intrusion and illegal trafficking. It is used to gather data and information.  Database Forensics : Database forensics is the study of database information.  Investigators use log-files and ram-data to help recover relevant information in a crime.

 “Bit stream." Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc. 22 July January 31st,  Carrier, Brian. “Defining Digital Forensic Examination & Analysis Tools.” Google January 31st,  Carrier, Brian. “A Crash Course in Digital Forensics.” Google Docs. Basis Technology Corporation, June 14, center/forensics/crash-course-in-digital-forensics.pdf. February 1st, center/forensics/crash-course-in-digital-forensics.pdf  " Digital forensics." Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc. 22 July January 30th,  Gladyshev, Pavel. “Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method.” Formal Forensics. Vol. 6 Issue 2. International Journal of Digital Evidence, February 2 nd,  Gleason, BJ. “Digital Forensics.” Google Docs. N.p, N.d. February 1st,