Intro to Computer Forensics CSC 485/585. Objectives  Understand the roles and responsibilities of a computer forensic examiner.  Understand the “Safety.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
COEN 252 Computer Forensics
E-Discovery for System Administrators Russell M. Shumway.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Principles and Practices
Computer Forensics Principles and Practices
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Applications with Warrants In Mind. The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
By Drudeisha Madhub Data Protection Commissioner Date:
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
* 07/16/96 The production of ESI continues to present challenges in the discovery process even though specific rules have been drafted, commented on, redrafted.
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Policies and Procedures. 2 Introduction In this chapter, you will be introduced to best practices generally accepted guidelines and procedures used by.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Guide to Computer Forensics and Investigations Fourth Edition
© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Evidence Handling If the evidence is there the case is yours to lose.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
AJ 104 Crime Scene Evidence, Experiments, and Models.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Records Management for Paper and ESI Document Retention Policies addressing creation, management and disposition Minimize the risk and exposure Information.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Computer Forensics 1 1.
Forensic Science The Crime Scene.
Computer Forensics Discovery and recovery of digital evidence
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Digital Forensics CJ
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
On-Site Investigations
Presentation transcript:

Intro to Computer Forensics CSC 485/585

Objectives  Understand the roles and responsibilities of a computer forensic examiner.  Understand the “Safety Net” concept.

What is a Computer Forensic Examiner?  A CF examiner is not a computer expert, but rather a specialist in the preservation, recovery and authentication of evidence originating from electronic media. You are a critical member of an investigative team. Exact roles and responsibilities will depend on whether you work in a criminal law enforcement position or as a civil litigation/private examiner. Your roles and responsibilities impact on all stages of an investigation or engagement. The sooner you become involved in the investigation/engagement, the better!

Roles & Responsibilities… in preparation for the seizure of electronic evidence  Recommend and/or assist in securing information from witnesses, informants, complainants, or others, which will help determine the volume, complexity, and role of any computers and/or media you will be seizing.  For LE, assist in the preparation of the Affidavit and Search Warrant.  Ensure proper legal basis for seizure  Acquiring the resources (logistics) which may be necessary to handle the engagement or seizure and secure the anticipated electronic evidence.

Roles & Responsibilities… in seizing electronic evidence  Document all evidence seized  Document all relevant information, including what you did, where, how, and any deviation from standard procedures.  Proper seizure and continuing Chain of Custody  Inventory and secure  Arrange safe transportation and storage of media  Avoid heat and moisture  Magnetic fields  Physical care: Handling, bumping, jiggling  Searching and securing items unique to electronic media  Searching for passwords  Securing and seizing manuals and original software for unique programs  Printer, webcam, scanner, digital camera, iPod, cell phone, etc. (any of which may be relevant to your investigation/engagement)

Roles & Responsibilities… in seizing electronic evidence  Interviewing Subjects, Witnesses, System Administrators, etc.  Determine whether media/systems may be seized and taken back to your forensic lab or if analysis and/or backup is to be done on-site.  Proper accessing of original evidence  The creation of a “Safety Net” (more on this later)  Use standard and tested procedures and tools, when possible and practical.

Roles & Responsibilities… in the analysis of media  ALWAYS protect against changes to the original evidence media.  Make bit-for-bit forensic images (copies) of all original evidence media.  Analyze only a duplicate “working” copy of the original.  Prepare investigative worksheets/documentation  In some cases, restoration of your bit-for-bit forensic image is necessary to perform analysis.  Restore Images to VMWare or other virtual machine  Some proprietary computer systems (i.e. PlayStation 3) require restoration to a duplicate physical hard drive that is re-inserted into the computer in place of the original. Analysis performed by “running” the copy of the original in the original machine.  Review for and recovery of hidden or deleted files, directories, and data.  Review for and recovery of data from unallocated space or previous/lost file systems.  Conduct searches by filename, by file type (using extension and/or file headers), by hash value or by string of characters/bytes.  Overcome encryption and password protected files, directories, drives, etc.

Roles & Responsibilities… in the analysis of media  Preparing reports from accounting, database or other complex programs with proprietary file formats.  Review the boot process for any deviations which may represent overt acts in attempting to destroy or conceal evidence  Reconstruct computer and user activity via “time line” analysis and/or recovery and analysis of Operating System artifacts left by a user’s computer usage.  Identify malware/virus/trojan…or lack thereof.  Maintain investigative documentation and report findings to investigative team.  Authentication of any exhibited evidence items.

 Review exhibits and documentation  Discuss testimony with attorneys  Prepare copies of physical exhibits and media for defense/opposing counsel.  CD/DVD copies, image restoration, make copy of images, etc.  Testify  Emphasize custody control and actions that you took in ensuring the evidence would be preserved in its’ original form.  Maintain your credibility Roles & Responsibilities… in trial prep and testimony

 Cleaning media and systems  Wiping “target” media prior to use  Virus checking any media provided to investigators, prosecutors, defense, etc.  Keeping your systems clean and up-to-date  Calibrating your equipment  Running validation checks to ensure equipment is in proper working order  Continued professional development to keep up-to-date on new technology, new potential computer forensic challenges, and legal developments.  Education of peers and new computer forensic examiners. Additional Responsibilities

The “Safety Net” Concept Procedures and actions taken to insure that Electronic Evidence…  is not altered or destroyed.  is properly preserved and protected.  can be authenticated.  is maintained with a chain of custody.  The “Safety Net” is an broad concept and not a specific list of “Thou Shall” and “Thou shall not.” In computer forensics there are often exceptions to standard policy/procedure…..be able to articulate any deviation from standard policies.

Why the “Safety Net”?  So judicial challenges to the authenticity of evidence may be met.  So that steps taken to recover evidence may be reproduced at a later date – for trial, or by another examiner.  To help protect against examiner liability issues – following proper procedures helps protect you from liability should something go wrong.

Safety Net Procedures  Documentation – be able to recount what you did, how, when, where, with what tools, etc.  Take digital pictures and keep in your case file.  System Checking (BIOS date/time, boot order, attached hardware, configuration, etc.)  Controlled Boot Process  If booting the subject’s computer, use a self-validated control boot disk and procedures…you will learn about this later.  Hardware or Software Disk Write Protection  If removing subject drive(s) from subject computer, ensure media is protected from your OS and any inadvertent writes.  Test and self-validate your hardware or software write blockers before use on original evidence.

Safety Net Procedures (cont.)  Bit-for-bit copy using tested and approved forensic imaging software or devices.  Physical image when possible…not logical image or file copying unless specific reason to do so.  Be able to authenticate all evidence (via hash values, documentation, and your recollection).  Data Transfer and Storage  Protect seized equipment and data from bumping, dropping, extreme heat, moisture and unforeseen circumstances (leaking pipes or A/C dripping on equipment, flooding, etc.)  Maintain Chain-of-Custody!!!  Do NOT leave seized evidence in your car (or elsewhere) unattended after you leave the seizure location…secure it!  Virus Checking  Do not provide virus infected evidence files to investigators, attorneys, or others. You do not want to be responsible for infecting their systems.

Summary Your role is to: 1. Protect the Integrity of the Original Evidence and 2. Authentic any Evidence Originating from an Electronic Source  All of the methodologies, procedures and tools have been designed for the accomplishment of these two basic roles, both of which are the basis for the creation of the “Safety Net” Concept.  It is the training in preservation and authentication of electronic evidence that make you a unique member of the investigative team and teach you to apply physical world safeguards of evidence to a fragile, electronic environment.  Lastly, you must have the credibility necessary for the court to accept a printed document as evidence, where no physical document was seized or received. Testimony must convince the judge and the jury, that the physical representation of this information is complete and accurate. Your actions in EVERYTHING you do will impact on the creditability of your testimony.

Questions ??? …as usual, use the discussion board!