Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Guide to Computer Forensics and Investigations Fourth Edition
Dale Stobaugh, Supervisor txdps.state.tx.us Ken Crawford Jennifer LandVeronica Bradshaw Texas Department of Public Safety Crime.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
Understanding Storage Discovering Computers 2012: Chapter
F6-Preparing for forensic Duplication Dr. John P. Abraham Professor UTPA.
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
Computing Fundamentals Module A © CCI Learning Solutions Inc. 1 Unit 1: Recognizing Computers Lesson Topic 1Computers All Around Us 2Elements of a Personal.
Computer Forensics Principles and Practices
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Secondary Storage.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Hardware of Personal Computers
Computers Storage, storage units & accessing R. S., Elektronika,
Storage device.
Chapter 3 Storage Prepared by: Mrs. Hanan AL- Asmari 1.
By Drudeisha Madhub Data Protection Commissioner Date:
COEN 252 Computer Forensics
Guide to Computer Forensics and Investigations, Second Edition
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
Chapter 5: System Software: Operating Systems and Utility Programs.
Computer Systems Peripherals. What is a peripheral? A peripheral is a device which can be attached to a computer processor Peripherals can be internal.
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Bellringer Do you think students should study computers? Why or why not?
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Internal components, Backing Storage, Operating Systems Software
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
CHAPTER 7 Storage Katie Moody Storage Storage holds data, instructions, and information for future use. Every computer uses storage to hold software.
What Is a Computer? How is a computer defined?
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Computing Essentials 2014 Secondary Storage © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized.
Week 1 Review of Computer Concepts. Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer.
Computer Forensics Principles and Practices
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
Guide to Computer Forensics and Investigations Fourth Edition
Storage Devices A storage device is used to store instructions, data, and information when they are not being used in memory – Magnetic disks use magnetic.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Storage Devices 1. Objectives Overview Differentiate between storage devices and storage media Describe the characteristics of an internal hard disk including.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
PDA Forensics Presented by: Yusra Shams. Agenda Purpose Challenges Generic structure of PDA Common Operating Systems Where to look for data Tools available.
Introduction to Computers in General By: Dr. Emelda Ntinglet-Davis Oracle DBA Class.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Electronic Evidence Seizure
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Digital Forensics and Hand Held Devices Robert Trimble COSC
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Chapter 7: Investigating Theft Acts
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Third Edition
CHAPTER 4 Memory System Organization and Architecture
Chapter Seven Types of Storage.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition
By Anwar Campbell.
Presentation transcript:

Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics

© Pearson Education Computer Forensics: Principles and Practices 2 Objectives Recognize and identify types of drives and media storage devices Describe PDA and cellular phone technologies Explain techniques for acquiring and analyzing data from hard drives and other storage media

© Pearson Education Computer Forensics: Principles and Practices 3 Objectives (Cont.) Describe techniques for acquiring and analyzing data from PDAs and cellular phones List and describe tools that can be used to analyze disk images, PDA data, and cellular phone data

© Pearson Education Computer Forensics: Principles and Practices 4 Introduction It is important to understand how the technology works in order to properly gather evidence from the different media devices. This chapter gives you the requisite understanding and then the tools to help in gathering the evidence from those devices.

© Pearson Education Computer Forensics: Principles and Practices 5 Basic Hard Drive Technology Composition of hard drives  Platters  Heads  Cylinders  Sectors Locating hard drive geometry information  Information on label on hard drive contains drive geometry

Internal Hard Disk Details © Pearson Education Computer Forensics: Principles and Practices

Disk Geometry Details © Pearson Education Computer Forensics: Principles and Practices 7

Disk Geometry Details © Pearson Education Computer Forensics: Principles and Practices 8

9 Basic Hard Drive Technology (Cont.) Hard drive standards  ATA (advanced technology attachment)  ATAPI (advanced technology attachment programmable interface)  EIDE  IDE (integrated drive electronics)  PIO (programmable input/output)  UDMA (ultra direct memory access)  ATA speed rating  SATA (serial advanced technology attachment)

© Pearson Education Computer Forensics: Principles and Practices 10 Other Storage Technologies Floppy disks Tape drive technologies  QIC, DAT, DLT ZIP and other high-capacity drives  Optical media structures  Single session vs. multisession CDs  DVDs USB Flash drives

© Pearson Education Computer Forensics: Principles and Practices 11 Personal Digital Assistant Devices (PDAs) Five major PDA operating systems:  BlackBerry  Open Embedded (Linux)  PalmSource (Palm OS)  Symbian (Psion)  Windows Mobile (Pocket PC)

© Pearson Education Computer Forensics: Principles and Practices 12 Cellular Phones  PDA functionality  Text messaging SMS, EMS, MMS, IM  Single photo and/or movie video capable  Phonebook  Call logs  Subscriber identity module  Global positioning systems  Video streaming  Audio players New phones are low-end computers with the following capabilities:

© Pearson Education Computer Forensics: Principles and Practices 13 Drive and Media Analysis Acquiring data from hard drives  Bit-stream transfer  Disk-to-disk imaging

© Pearson Education Computer Forensics: Principles and Practices 14 Drive and Media Analysis (Cont.) Acquiring data from removable media  Document the scene  Use static-proof container and label container with Type of media Where media was found Type of reader required for the media  Transport directly to lab  Do not leave any media in a hot vehicle or environment  Store media in a secure and organized area

© Pearson Education Computer Forensics: Principles and Practices 15 Drive and Media Analysis (Cont.) Acquiring data from removable media (cont.)  Once at the lab, make a working copy of the drive Make sure the media is write-protected Make a hash of the original drive and the duplicate Make a copy of the duplicate to work from Store the original media in a secure location

© Pearson Education Computer Forensics: Principles and Practices 16 Drive and Media Analysis (Cont.) Acquiring data from USB flash drives  Write protect the drive  Software may be needed to write protect  Essentially recognized much like a regular hard drive by the operating system

© Pearson Education Computer Forensics: Principles and Practices 17 In Practice: PDA-Configured iPod Reveals Employee Theft Review of bank fees revealed that Joe had been skimming money Suspicion fell on iPod that Joe had on his desk every day iPod had been partitioned to hold both data and music

© Pearson Education Computer Forensics: Principles and Practices 18 PDA Analysis Guidelines for seizing PDAs:  If already off, do not turn it on  Seal in an envelope before putting it in an evidence bag to restrict access  Attach the power adapter through the evidence bag to maintain the charge  Keep active state if PDA is on when found

© Pearson Education Computer Forensics: Principles and Practices 19 PDA Analysis (Cont.) Guidelines for seizing PDAs (cont.) :  Search should be conducted for associated memory devices  Any power leads, cables, or cradles relating to the PDA should also be seized, as well as manuals  Anyone handling PDAs before their examination should treat them in such a manner that gives the best opportunity for any recovered data to be admissible as evidence in any later proceedings

© Pearson Education Computer Forensics: Principles and Practices 20 PDA Chain of Custody Documentation of the chain of custody should answer the following:  Who collected the device, media, and associated peripherals?  How was the e-evidence collected and where was it located?  Who took possession of it?  How was it stored and protected while in storage?  Who took it out of storage and why?

© Pearson Education Computer Forensics: Principles and Practices 21 Secured PDA Device Ask the suspect what the password is Contact the manufacturer for backdoors or other useful information Search the Internet for known exploits for either a password crack or an exploit that goes around the password Call in PDA professional who specializes in data recovery

© Pearson Education Computer Forensics: Principles and Practices 22 Cellular Phone Analysis Determine which forensic software package will work with the suspect cellular phone Ascertain the connection method Some devices need to have certain protocols in place before acquisition begins Physically connect the cellular phone and the forensic workstation using the appropriate interface

© Pearson Education Computer Forensics: Principles and Practices 23 Cellular Phone Analysis (Cont.) Before proceeding, make sure all equipment and basic data are in place Most software packages are GUI based and provide a wizard Once connected, follow the procedures to obtain a bit-stream copy Search for evidence and generate reports detailing findings

© Pearson Education Computer Forensics: Principles and Practices 24 Disk Image Forensic Tools Guidance software Paraben ® software FTK™ Logicube

© Pearson Education Computer Forensics: Principles and Practices 25 PDA/Cellular Phone Forensic Software Tools for examining PDAs  EnCase and Palm OS software  PDA Seizure  Palm dd (pdd)  POSE (Palm OS Emulator)  PDA memory cards

© Pearson Education Computer Forensics: Principles and Practices 26 PDA/Cellular Phone Forensic Software (Cont.) Tools for examining cellular phones  Bit PM  Cell Seizure  Oxygen PM  Pilot-link  Forensic SIM  SIMCon  SIMIS

© Pearson Education Computer Forensics: Principles and Practices 27 PDA/Cellular Phone Forensic Software (Cont.) Tools for examining both PDAs and cellular phones  Paraben software  Logicube

© Pearson Education Computer Forensics: Principles and Practices 28 Summary You are most likely to encounter media devices such as:  Hard drives  Optical media (CDs)  USB drives  PDAs  Cellular phones

© Pearson Education Computer Forensics: Principles and Practices 29 Summary (Cont.) You learned how data is stored on these devices and methods for acquiring the data General guidelines for data acquisition are the same for most devices There are also specific guidelines depending on the type of device

© Pearson Education Computer Forensics: Principles and Practices 30 Summary (Cont.) Guidance, Paraben, AccessData, and Logicube are suppliers of forensic software  Some software is specific to PDAs  Some can be used for several different types of data