COS/PSA 413 Day 5. Agenda Questions? Assignment 1 Corrected –3 A’s, 5 B’s & 1 C –Answers on next slide Assignment 2 Due Assignment 3 posted Quiz 1 on.

Slides:



Advertisements
Similar presentations
COEN 252 Computer Forensics
Advertisements

Guide to Computer Forensics and Investigations Fifth Edition
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
COS 413 Day 13. Agenda Questions? Assignment 4 Due Assignment 5 posted –Due Oct 21 Capstone proposal Due Oct 17 Lab 5 on Oct 15 in N105 –Hands-on Projects.
COS/PSA 413 Day 5. Agenda Questions? Assignment 1 due –Not corrected-still missing one submission Assignment 2 posted –Case project 2-1 on page 72 and.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 corrected –Everyone failed this assignment! –Read the questions! Provide answers to THIS case not generic.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations, Second Edition
By Drudeisha Madhub Data Protection Commissioner Date:
Data Acquisition Chao-Hsien Chu, Ph.D.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Digital Crime Scene Investigative Process
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Forensics Principles and Practices
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 4 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 3 Data Acquisition Guide to Computer Forensics and Investigations Fifth Edition All slides copyright Cengage Learning with additional info from.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Third Edition
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 3 Data Acquisition.
1 Guide to Computer Forensics and Investigations Sixth Edition Chapter 4 Processing Crime and Incident Scenes.
Presentation transcript:

COS/PSA 413 Day 5

Agenda Questions? Assignment 1 Corrected –3 A’s, 5 B’s & 1 C –Answers on next slide Assignment 2 Due Assignment 3 posted Quiz 1 on September 26 –Chaps 1-5, Open book, Open notes –20 M/C and 5 essays Lab 2 –Write-ups due September 3:35 Finish Discussion on Data Acquisition and begin discussion on Processing Crime and incident Scenes

Assignment –Two maine statues Title 17-A subsections 432 & 433 There are more but these are the original -> Ach0sec0.htmlhttp://janus.state.me.us/legis/statutes/17-A/title17- Ach0sec0.html – Cases Maine public broadcasting hack 1-3 –Illegla Downloading (yes) and bandwidth (No) Guide to Computer Forensics and Investigations3

Chapter 4 Data Acquisition Guide to Computer Forensics and Investigations Third Edition

Guide to Computer Forensics and Investigations5 Validating Data Acquisitions Most critical aspect of computer forensics Requires using a hashing algorithm utility Validation techniques –CRC-32, MD5, and SHA-1 to SHA-512

Guide to Computer Forensics and Investigations6 Linux Validation Methods Validating dd acquired data –You can use md5sum or sha1sum utilities –md5sum or sha1sum utilities should be run on all suspect disks and volumes or segmented volumes Validating dcfldd acquired data –Use the hash option to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512 –hashlog option outputs hash results to a text file that can be stored with the image files –vf (verify file) option compares the image file to the original medium

Guide to Computer Forensics and Investigations7 Windows Validation Methods Windows has no built-in hashing algorithm tools for computer forensics –Third-party utilities can be used Commercial computer forensics programs also have built-in validation features –Each program has its own validation technique Raw format image files don’t contain metadata –Separate manual validation is recommended for all raw acquisitions

Guide to Computer Forensics and Investigations8 Performing RAID Data Acquisitions Size is the biggest concern –Many RAID systems now have terabytes of data

Guide to Computer Forensics and Investigations9 Understanding RAID Redundant array of independent (formerly “inexpensive”) disks (RAID) –Computer configuration involving two or more disks –Originally developed as a data-redundancy measure RAID 0 –Provides rapid access and increased storage –Lack of redundancy RAID 1 –Designed for data recovery –More expensive than RAID 0

Guide to Computer Forensics and Investigations10 Understanding RAID (continued) RAID 2 –Similar to RAID 1 –Data is written to a disk on a bit level –Has better data integrity checking than RAID 0 –Slower than RAID 0 RAID 3 –Uses data stripping and dedicated parity RAID 4 –Data is written in blocks

Guide to Computer Forensics and Investigations11 Understanding RAID (continued)

Guide to Computer Forensics and Investigations12 Understanding RAID (continued)

Guide to Computer Forensics and Investigations13 Understanding RAID (continued)

Guide to Computer Forensics and Investigations14 Understanding RAID (continued) RAID 5 –Similar to RAIDs 0 and 3 –Places parity recovery data on each disk RAID 6 –Redundant parity on each disk RAID 10, or mirrored striping –Also known as RAID 1+0 –Combination of RAID 1 and RAID 0

Guide to Computer Forensics and Investigations15 Understanding RAID (continued)

Guide to Computer Forensics and Investigations16 Acquiring RAID Disks Concerns –How much data storage is needed? –What type of RAID is used? –Do you have the right acquisition tool? –Can the tool read a forensically copied RAID image? –Can the tool read split data saves of each RAID disk? Older hardware-firmware RAID systems can be a challenge when you’re making an image

Guide to Computer Forensics and Investigations17 Acquiring RAID Disks (continued) Vendors offering RAID acquisition functions –Technologies Pathways ProDiscover –Guidance Software EnCase –X-Ways Forensics –Runtime Software –R-Tools Technologies Occasionally, a RAID system is too large for a static acquisition –Retrieve only the data relevant to the investigation with the sparse or logical acquisition method

Guide to Computer Forensics and Investigations18 Using Remote Network Acquisition Tools You can remotely connect to a suspect computer via a network connection and copy data from it Remote acquisition tools vary in configurations and capabilities Drawbacks –LAN’s data transfer speeds and routing table conflicts could cause problems –Gaining the permissions needed to access more secure subnets –Heavy traffic could cause delays and errors

Guide to Computer Forensics and Investigations19 Remote Acquisition with ProDiscover With ProDiscover Investigator you can: –Preview a suspect’s drive remotely while it’s in use –Perform a live acquisition –Encrypt the connection –Copy the suspect computer’s RAM –Use the optional stealth mode ProDiscover Incident Response additional functions –Capture volatile system state information –Analyze current running processes

Guide to Computer Forensics and Investigations20 Remote Acquisition with ProDiscover (continued) ProDiscover Incident Response additional functions (continued) –Locate unseen files and processes –Remotely view and listen to IP ports –Run hash comparisons –Create a hash inventory of all files remotely PDServer remote agent –ProDiscover utility for remote access –Needs to be loaded on the suspect

Guide to Computer Forensics and Investigations21 Remote Acquisition with ProDiscover (continued) PDServer installation modes –Trusted CD –Preinstallation –Pushing out and running remotely PDServer can run in a stealth mode –Can change process name to appear as OS function

Guide to Computer Forensics and Investigations22 Remote Acquisition with ProDiscover (continued) Remote connection security features –Password Protection –Encryption –Secure Communication Protocol –Write Protected Trusted Binaries –Digital Signatures

Guide to Computer Forensics and Investigations23 Remote Acquisition with EnCase Enterprise Remote acquisition features –Remote data acquisition of a computer’s media and RAM data –Integration with intrusion detection system (IDS) tools –Options to create an image of data from one or more systems –Preview of systems –A wide range of file system formats –RAID support for both hardware and software

Guide to Computer Forensics and Investigations24 Remote Acquisition with R-Tools R- Studio R-Tools suite of software is designed for data recovery Remote connection uses Triple Data Encryption Standard (3DES) encryption Creates raw format acquisitions Supports various file systems

Guide to Computer Forensics and Investigations25 Remote Acquisition with Runtime Software Utilities –DiskExplorer for FAT –DiskExplorer for NTFS –HDHOST Features for acquisition –Create a raw format image file –Segment the raw format or compressed image –Access network computers’ drives

Guide to Computer Forensics and Investigations26 Using Other Forensics-Acquisition Tools Tools –SnapBack DatArrest –SafeBack –DIBS USA RAID –ILook Investigator IXimager –Vogon International SDi32 –ASRData SMART –Australian Department of Defence PyFlag

Guide to Computer Forensics and Investigations27 SnapBack DatArrest Columbia Data Products Old MS-DOS tool Can make an image on three ways –Disk to SCSI drive –Disk to network drive –Disk to disk Fits on a forensic boot floppy SnapCopy adjusts disk geometry

Guide to Computer Forensics and Investigations28 NTI SafeBack Reliable MS-DOS tool Small enough to fit on a forensic boot floppy Performs an SHA-256 calculation per sector copied Creates a log file

Guide to Computer Forensics and Investigations29 NTI SafeBack (continued) Functions –Disk-to-image copy (image can be on tape) –Disk-to-disk copy (adjusts target geometry) Parallel port laplink can be used –Copies a partition to an image file –Compresses image files

Guide to Computer Forensics and Investigations30 DIBS USA RAID Rapid Action Imaging Device (RAID) –Makes forensically sound disk copies –Portable computer system designed to make disk-to- disk images –Copied disk can then be attached to a write-blocker device

Guide to Computer Forensics and Investigations31 ILook Investigator IXimager Iximager –Runs from a bootable floppy or CD –Designed to work only with ILook Investigator –Can acquire single drives and RAID drives

Guide to Computer Forensics and Investigations32 Vogon International SDi32 Creates a raw format image of a drive Write-blocker is needed when using this tool Password Cracker POD –Device that removes the password on a drive’s firmware card

Guide to Computer Forensics and Investigations33 ASRData SMART Linux forensics analysis tool that can make image files of a suspect drive Capabilities –Robust data reading of bad sectors on drives –Mounting suspect drives in write-protected mode –Mounting target drives in read/write mode –Optional compression schemes

Guide to Computer Forensics and Investigations34 Australian Department of Defence PyFlag PyFlag tool –Intended as a network forensics analysis tool –Can create proprietary format Expert Witness image files –Uses sgzip and gzip in Linux

Guide to Computer Forensics and Investigations35 Summary Data acquisition methods –Disk-to-image file –Disk-to-disk copy –Logical disk-to-disk or disk-to-data file –Sparse data copy Several tools available –Lossless compression is acceptable Plan your digital evidence contingencies Write-blocking devices or utilities must be used with GUI acquisition tools

Guide to Computer Forensics and Investigations36 Summary (continued) Always validate acquisition A Linux Live CD, such as Helix, provides many useful tools for computer forensics acquisitions Preferred Linux acquisition tool is dcfldd (not dd) Use a physical write-blocker device for acquisitions To acquire RAID disks, determine the type of RAID –And then which acquisition tool to use

Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Third Edition

Guide to Computer Forensics and Investigations38 Objectives Explain the rules for digital evidence Describe how to collect evidence at private-sector incident scenes Explain guidelines for processing law enforcement crime scenes List the steps in preparing for an evidence search Describe how to secure a computer incident or crime scene

Guide to Computer Forensics and Investigations39 Objectives (continued) Explain guidelines for seizing digital evidence at the scene List procedures for storing digital evidence Explain how to obtain a digital hash Review a case to identify requirements and plan your investigation

Guide to Computer Forensics and Investigations40 Identifying Digital Evidence Digital evidence –Can be any information stored or transmitted in digital form U.S. courts accept digital evidence as physical evidence –Digital data is a tangible object Some require that all digital evidence be printed out to be presented in court

Guide to Computer Forensics and Investigations41 Identifying Digital Evidence (continued) General tasks investigators perform when working with digital evidence: –Identify digital information or artifacts that can be used as evidence –Collect, preserve, and document evidence –Analyze, identify, and organize evidence –Rebuild evidence or repeat a situation to verify that the results can be reproduced reliably Collecting computers and processing a criminal or incident scene must be done systematically

Guide to Computer Forensics and Investigations42 Understanding Rules of Evidence Consistent practices help verify your work and enhance your credibility Comply with your state’s rules of evidence or with the Federal Rules of Evidence Evidence admitted in a criminal case can be used in a civil suit, and vice versa Keep current on the latest rulings and directives on collecting, processing, storing, and admitting digital evidence

Guide to Computer Forensics and Investigations43 Understanding Rules of Evidence (continued) Data you discover from a forensic examination falls under your state’s rules of evidence –Or the Federal Rules of Evidence Digital evidence is unlike other physical evidence because it can be changed more easily –The only way to detect these changes is to compare the original data with a duplicate Most federal courts have interpreted computer records as hearsay evidence –Hearsay is secondhand or indirect evidence

Guide to Computer Forensics and Investigations44 Understanding Rules of Evidence (continued) Business-record exception –Allows “records of regularly conducted activity,” such as business memos, reports, records, or data compilations Generally, computer records are considered admissible if they qualify as a business record Computer records are usually divided into: –Computer-generated records –Computer-stored records

Guide to Computer Forensics and Investigations45 Understanding Rules of Evidence (continued) Computer records must be shown to be authentic and trustworthy –To be admitted into court Computer-generated records are considered authentic –If the program that created the output is functioning correctly Collecting evidence according to the proper steps of evidence control helps ensure that the computer evidence is authentic

Guide to Computer Forensics and Investigations46 Understanding Rules of Evidence (continued) When attorneys challenge digital evidence –Often they raise the issue of whether computer- generated records were altered Or damaged after they were created One test to prove that computer-stored records are authentic is to demonstrate that a specific person created the records –The author of a Microsoft Word document can be identified by using file metadata

Guide to Computer Forensics and Investigations47

Guide to Computer Forensics and Investigations48

Guide to Computer Forensics and Investigations49 Understanding Rules of Evidence (continued) The process of establishing digital evidence’s trustworthiness originated with written documents and the best evidence rule Best evidence rule states: –To prove the content of a written document, recording, or photograph, ordinarily the original writing, recording, or photograph is required Federal Rules of Evidence –Allow a duplicate instead of originals when it is produced by the same impression as the original

Guide to Computer Forensics and Investigations50 Understanding Rules of Evidence (continued) As long as bit-stream copies of data are created and maintained properly –The copies can be admitted in court, although they aren’t considered best evidence

Guide to Computer Forensics and Investigations51 Collecting Evidence in Private-Sector Incident Scenes Private-sector organizations include: –Businesses and government agencies that aren’t involved in law enforcement Agencies must comply with state public disclosure and federal Freedom of Information Act (FOIA) laws –And make certain documents available as public records FOIA allows citizens to request copies of public documents created by federal agencies

Guide to Computer Forensics and Investigations52 Collecting Evidence in Private-Sector Incident Scenes (continued) A special category of private-sector businesses includes ISPs and other communication companies ISPs can investigate computer abuse committed by their employees, but not by customers –Except for activities that are deemed to create an emergency situation Investigating and controlling computer incident scenes in the corporate environment –Much easier than in the criminal environment –Incident scene is often a workplace

Guide to Computer Forensics and Investigations53 Collecting Evidence in Private-Sector Incident Scenes (continued) Typically, businesses have inventory databases of computer hardware and software –Help identify the computer forensics tools needed to analyze a policy violation And the best way to conduct the analysis Corporate policy statement about misuse of computing assets –Allows corporate investigators to conduct covert surveillance with little or no cause –And access company systems without a warrant

Guide to Computer Forensics and Investigations54 Collecting Evidence in Private-Sector Incident Scenes (continued) Companies should display a warning banner or publish a policy –Stating that they reserve the right to inspect computing assets at will Corporate investigators should know under what circumstances they can examine an employee’s computer –Every organization must have a well-defined process describing when an investigation can be initiated

Guide to Computer Forensics and Investigations55 Collecting Evidence in Private-Sector Incident Scenes (continued) If a corporate investigator finds that an employee is committing or has committed a crime –Employer can file a criminal complaint with the police Employers are usually interested in enforcing company policy –Not seeking out and prosecuting employees Corporate investigators are, therefore, primarily concerned with protecting company assets

Guide to Computer Forensics and Investigations56 Collecting Evidence in Private-Sector Incident Scenes (continued) If you discover evidence of a crime during a company policy investigation –Determine whether the incident meets the elements of criminal law –Inform management of the incident –Stop your investigation to make sure you don’t violate Fourth Amendment restrictions on obtaining evidence –Work with the corporate attorney to write an affidavit confirming your findings

Guide to Computer Forensics and Investigations57 Processing Law Enforcement Crime Scenes You must be familiar with criminal rules of search and seizure You should also understand how a search warrant works and what to do when you process one Law enforcement officer may search for and seize criminal evidence only with probable cause –Facts or circumstances that lead a reasonable person to believe a crime has been committed or is about to be committed

Guide to Computer Forensics and Investigations58 Processing Law Enforcement Crime Scenes (continued) With probable cause, a police officer can obtain a search warrant from a judge –That authorizes a search and seizure of specific evidence related to the criminal complaint The Fourth Amendment states that only warrants “particularly describing the place to be searched, and the persons or things to be seized” can be issued

Guide to Computer Forensics and Investigations59

Guide to Computer Forensics and Investigations60 Understanding Concepts and Terms Used in Warrants Innocent information –Unrelated information –Often included with the evidence you’re trying to recover Judges often issue a limiting phrase to the warrant –Allows the police to separate innocent information from evidence

Guide to Computer Forensics and Investigations61 Understanding Concepts and Terms Used in Warrants (continued) Plain view doctrine –Objects falling in plain view of an officer who has the right to be in position to have that view Are subject to seizure without a warrant and may be introduced in evidence “Knock and announce” –With few exceptions, warrants require that officers knock and announce their identity When executing a warrant

Guide to Computer Forensics and Investigations62 Preparing for a Search Preparing for a computer search and seizure –Probably the most important step in computing investigations To perform these tasks –You might need to get answers from the victim and an informant Who could be a police detective assigned to the case, a law enforcement witness, or a manager or coworker of the person of interest to the investigation

Guide to Computer Forensics and Investigations63 Identifying the Nature of the Case When you’re assigned a computing investigation case –Start by identifying the nature of the case Including whether it involves the private or public sector The nature of the case dictates how you proceed –And what types of assets or resources you need to use in the investigation

Guide to Computer Forensics and Investigations64 Identifying the Type of Computing System For law enforcement –This step might be difficult because the crime scene isn’t controlled If you can identify the computing system –Estimate the size of the drive on the suspect’s computer And how many computers to process at the scene Determine which OSs and hardware are involved

Guide to Computer Forensics and Investigations65 Determining Whether You Can Seize a Computer The type of case and location of the evidence –Determine whether you can remove computers Law enforcement investigators need a warrant to remove computers from a crime scene –And transport them to a lab If removing the computers will irreparably harm a business –The computers should not be taken offsite

Guide to Computer Forensics and Investigations66 Determining Whether You Can Seize a Computer (continued) An additional complication is files stored offsite that are accessed remotely If you aren’t allowed to take the computers to your lab –Determine the resources you need to acquire digital evidence and which tools can speed data acquisition

Guide to Computer Forensics and Investigations67 Obtaining a Detailed Description of the Location Get as much information as you can Identify potential hazards –Interact with your HAZMAT team HAZMAT guidelines –Put the target drive in a special HAZMAT bag –HAZMAT technician can decontaminate the bag –Check for high temperatures

Guide to Computer Forensics and Investigations68 Determining Who Is in Charge Corporate computing investigations –Require only one person to respond Law enforcement agencies –Handle large-scale investigations –Designate lead investigators

Guide to Computer Forensics and Investigations69 Using Additional Technical Expertise Look for specialists –OSs –RAID servers –Databases Finding the right person can be a challenge Educate specialists in investigative techniques –Prevent evidence damage

Guide to Computer Forensics and Investigations70 Determining the Tools You Need Prepare tools using incident and crime scene information Initial-response field kit –Lightweight –Easy to transport Extensive-response field kit –Includes all tools you can afford

Guide to Computer Forensics and Investigations71

Guide to Computer Forensics and Investigations72

Guide to Computer Forensics and Investigations73

Guide to Computer Forensics and Investigations74 Preparing the Investigation Team Review facts, plans, and objectives with the investigation team you have assembled Goals of scene processing –Collect evidence –Secure evidence Slow response can cause digital evidence to be lost

Guide to Computer Forensics and Investigations75 Securing a Computer Incident or Crime Scene Goals –Preserve the evidence –Keep information confidential Define a secure perimeter –Use yellow barrier tape –Legal authority Professional curiosity can destroy evidence –Involves police officers and other professionals who aren’t part of the crime scene processing team

Guide to Computer Forensics and Investigations76 Seizing Digital Evidence at the Scene Law enforcement can seize evidence –With a proper warrant Corporate investigators rarely can seize evidence When seizing computer evidence in criminal investigations –Follow U.S. DoJ standards for seizing digital data Civil investigations follow same rules –Require less documentation though Consult with your attorney for extra guidelines

Guide to Computer Forensics and Investigations77 Preparing to Acquire Digital Evidence The evidence you acquire at the scene depends on the nature of the case –And the alleged crime or violation Ask your supervisor or senior forensics examiner in your organization the following questions: –Do you need to take the entire computer and all peripherals and media in the immediate area? –How are you going to protect the computer and media while transporting them to your lab? –Is the computer powered on when you arrive?

Guide to Computer Forensics and Investigations78 Preparing to Acquire Digital Evidence (continued) Ask your supervisor or senior forensics examiner in your organization the following questions (continued): –Is the suspect you’re investigating in the immediate area of the computer? –Is it possible the suspect damaged or destroyed the computer, peripherals, or media? –Will you have to separate the suspect from the computer?

Guide to Computer Forensics and Investigations79 Processing an Incident or Crime Scene Guidelines –Keep a journal to document your activities –Secure the scene Be professional and courteous with onlookers Remove people who are not part of the investigation –Take video and still recordings of the area around the computer Pay attention to details –Sketch the incident or crime scene –Check computers as soon as possible

Guide to Computer Forensics and Investigations80 Processing an Incident or Crime Scene (continued) Guidelines (continued) –Don’t cut electrical power to a running system unless it’s an older Windows 9x or MS-DOS system –Save data from current applications as safely as possible –Record all active windows or shell sessions –Make notes of everything you do when copying data from a live suspect computer –Close applications and shut down the computer

Guide to Computer Forensics and Investigations81 Processing an Incident or Crime Scene (continued) Guidelines (continued) –Bag and tag the evidence, following these steps: Assign one person to collect and log all evidence Tag all evidence you collect with the current date and time, serial numbers or unique features, make and model, and the name of the person who collected it Maintain two separate logs of collected evidence Maintain constant control of the collected evidence and the crime or incident scene

Guide to Computer Forensics and Investigations82 Processing an Incident or Crime Scene (continued) Guidelines (continued) –Look for information related to the investigation Passwords, passphrases, PINs, bank accounts –Collect documentation and media related to the investigation Hardware, software, backup media, documentation, manuals

Guide to Computer Forensics and Investigations83 Processing Data Centers with RAID Systems Sparse acquisition –Technique for extracting evidence from large systems –Extracts only data related to evidence for your case from allocated files And minimizes how much data you need to analyze Drawback of this technique –It doesn’t recover data in free or slack space

Guide to Computer Forensics and Investigations84 Using a Technical Advisor Technical advisor –Can help you list the tools you need to process the incident or crime scene –Person guiding you about where to locate data and helping you extract log records Or other evidence from large RAID servers –Can help create the search warrant by itemizing what you need for the warrant

Guide to Computer Forensics and Investigations85 Using a Technical Advisor (continued) Responsibilities –Know aspects of the seized system –Direct investigator handling sensitive material –Help secure the scene –Help document the planning strategy –Conduct ad hoc trainings –Document activities

Guide to Computer Forensics and Investigations86 Documenting Evidence in the Lab Record your activities and findings as you work –Maintain a journal to record the steps you take as you process evidence Goal is to be able to reproduce the same results –When you or another investigator repeat the steps you took to collect evidence A journal serves as a reference that documents the methods you used to process digital evidence

Guide to Computer Forensics and Investigations87 Processing and Handling Digital Evidence Maintain the integrity of digital evidence in the lab –As you do when collecting it in the field Steps to create image files: –Copy all image files to a large drive –Start your forensics tool to analyze the evidence –Run an MD5 or SHA-1 hashing algorithm on the image files to get a digital hash –Secure the original media in an evidence locker

Guide to Computer Forensics and Investigations88 Storing Digital Evidence The media you use to store digital evidence usually depends on how long you need to keep it CD-Rs or DVDs –The ideal media –Capacity: up to 17 GB –Lifespan: 2 to 5 years Magnetic tapes –Capacity: 40 to 72 GB –Lifespan: 30 years –Costs: drive: $400 to $800; tape: $40

Guide to Computer Forensics and Investigations89 Storing Digital Evidence (continued)

Guide to Computer Forensics and Investigations90 Evidence Retention and Media Storage Needs To help maintain the chain of custody for digital evidence –Restrict access to lab and evidence storage area Lab should have a sign-in roster for all visitors –Maintain logs for a period based on legal requirements You might need to retain evidence indefinitely –Check with your local prosecuting attorney’s office or state laws to make sure you’re in compliance

Guide to Computer Forensics and Investigations91 Evidence Retention and Media Storage Needs (continued)

Guide to Computer Forensics and Investigations92 Documenting Evidence Create or use an evidence custody form An evidence custody form serves the following functions: –Identifies the evidence –Identifies who has handled the evidence –Lists dates and times the evidence was handled You can add more information to your form –Such as a section listing MD5 and SHA-1 hash values

Guide to Computer Forensics and Investigations93 Documenting Evidence (continued) Include any detailed information you might need to reference Evidence bags also include labels or evidence forms you can use to document your evidence

Guide to Computer Forensics and Investigations94 Obtaining a Digital Hash Cyclic Redundancy Check (CRC) –Mathematical algorithm that determines whether a file’s contents have changed –Most recent version is CRC-32 –Not considered a forensic hashing algorithm Message Digest 5 (MD5) –Mathematical formula that translates a file into a hexadecimal code value, or a hash value –If a bit or byte in the file changes, it alters the digital hash

Guide to Computer Forensics and Investigations95 Obtaining a Digital Hash (continued) Three rules for forensic hashes: –You can’t predict the hash value of a file or device –No two hash values can be the same –If anything changes in the file or device, the hash value must change Secure Hash Algorithm version 1 (SHA-1) –A newer hashing algorithm –Developed by the National Institute of Standards and Technology (NIST)

Guide to Computer Forensics and Investigations96 Obtaining a Digital Hash (continued) In both MD5 and SHA-1, collisions have occurred Most computer forensics hashing needs can be satisfied with a nonkeyed hash set –A unique hash number generated by a software tool, such as the Linux md5sum command Keyed hash set –Created by an encryption utility’s secret key You can use the MD5 function in FTK Imager to obtain the digital signature of a file –Or an entire drive

Guide to Computer Forensics and Investigations97 Obtaining a Digital Hash (continued)

Guide to Computer Forensics and Investigations98 Reviewing a Case General tasks you perform in any computer forensics case: –Identify the case requirements –Plan your investigation –Conduct the investigation –Complete the case report –Critique the case

Guide to Computer Forensics and Investigations99 Sample Civil Investigation Most cases in the corporate environment are considered low-level investigations –Or noncriminal cases Common activities and practices –Recover specific evidence Suspect’s Outlook folder (PST file) –Covert surveillance Its use must be well defined in the company policy Risk of civil or criminal liability –Sniffing tools for data transmissions

Guide to Computer Forensics and Investigations100 Sample Criminal Investigation Computer crimes examples –Fraud –Check fraud –Homicides Need a warrant to start seizing evidence –Limit searching area

Guide to Computer Forensics and Investigations101 Sample Criminal Investigation (continued)

Guide to Computer Forensics and Investigations102 Reviewing Background Information for a Case Company called Superior Bicycles –Specializes in creating new and inventive modes of human-driven transportation Two employees, Chris Murphy and Nau Tjeriko, have been missing for several days A USB thumb drive has been recovered from Chris’s office with evidence that he had been conducting a side business using company computers

Guide to Computer Forensics and Investigations103 Identifying the Case Requirements Identify requirements such as: –Nature of the case –Suspect’s name –Suspect’s activity –Suspect’s hardware and software specifications

Guide to Computer Forensics and Investigations104 Planning Your Investigation List what you can assume or know –Several incidents may or may not be related –Suspect’s computer can contain information about the case –If someone else has used suspect’s computer Make an image of suspect’s computer disk drive Analyze forensics copy

Guide to Computer Forensics and Investigations105 Conducting the Investigation: Acquiring Evidence with AccessData FTK Functions –Extract the image from a bit-stream image file –Analyze the image

Guide to Computer Forensics and Investigations106

Guide to Computer Forensics and Investigations107 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations108

Guide to Computer Forensics and Investigations109

Guide to Computer Forensics and Investigations110 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations111

Guide to Computer Forensics and Investigations112 Conducting the Investigation: Acquiring Evidence with AccessData FTK (continued)

Guide to Computer Forensics and Investigations113 Summary Digital evidence is anything stored or transmitted on electronic or optical media Private sector –Contained and controlled area Publish right to inspect computer assets policy Private and public sectors follow same computing investigation rules Criminal cases –Require warrants

Guide to Computer Forensics and Investigations114 Summary (continued) Protect your safety and health as well as the integrity of the evidence Follow guidelines when processing an incident or crime scene –Security perimeter –Video recording As you collect digital evidence, guard against physically destroying or contaminating it Forensic hash values verify that data or storage media have not been altered

Guide to Computer Forensics and Investigations115 Summary (continued) To analyze computer forensics data, learn to use more than one vendor tool You must handle all evidence the same way every time you handle it After you determine that an incident scene has digital evidence, identify the digital information or artifacts that can be used as evidence