Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.

Slides:



Advertisements
Similar presentations
Watching the Detectives Forensic Information in Digital Objects (FIDO)
Advertisements

The Windows File System and Windows Explorer To move around the file system and examine your files or get to one you want (say, to modify, delete or copy.
GETTING BITS OFF DISKS Using Open Source Tools to Prepare Born-Digital Materials for Long-Term Preservation and Access To connect to the audio portion.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Digital Record Management (HyperKYC) By. A Financial Institution or Stock Broker has many lines of services that it offers to its clients like share trading,
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
OPEN SOURCE TOOLS Dr. Abraham Professor UTPA. Open Source Freely redistributable Provides access to source code End user may modify source code.
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Return to the Office 2007 web page Lesson 3: Managing Computer Files.
Guide to Computer Forensics and Investigations Fourth Edition
IT Infrastructure: Software September 18, LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating.
Computer & Network Forensics
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
With Microsoft Office 2007 Introductory© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Office 2007 Introductory.
1 SOFTWARE TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 2, Thursday 1/18/2007)
C81MPR Practical Methods File Handling for Practicals Jonathan Stirk & Danielle Ropar.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Capturing Computer Evidence Extracting Information.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
SOFTWARE.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
Untitled (Hidden Track): Born Digital Content Preservation Service at UIUC Tracy Popp, MS LIS, CAS Digital Preservation Coordinator University Library.
Tutorial 11 Installing, Updating, and Configuring Software
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Basic Computer Components. What’s inside your computer?
Digital Crime Scene Investigative Process
Software.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CE Operating Systems Lecture 17 File systems – interface and implementation.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael JonesDigital Forensic Investigations2.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
Chapter 2 – Introduction to Windows Operating System II Manipulating Windows GUI 1CMPF112 Computing Skills for Engineers.
Systems Administration (Windows) BIT3111 – Lecture 5 (Introduction to Windows OS)
bitcurator-access-webtools Quick Start Guide
Nat 4/5 Computing Science Software
Creighton Barrett Dalhousie University Archives
SOFTWARE TECHNOLOGIES
Topics in Born Digital Archiving
Guide to Computer Forensics and Investigations Fifth Edition
Knut Kröger & Reiner Creutzburg
File Management.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
HC Hyper-V Module GUI Portal VPS Templates Web Console
IT Infrastructure: Software
Types of Software.
Operating System Fundamentals
COMP1321 Digital Infrastructures
Digital Forensics CJ
bitcurator-access-webtools Quick Start Guide
Software - Operating Systems
Forensic Recovery of Evidence Device (FRED)
Presentation transcript:

Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011

Data handling workflow Obtain data from depositor / donor Examine the acquired data to locate user generated content Appraise data to select data of potential value to the institution Transfer selected data into digital repository for curation & preservation

Acquisition

Data Acquisition Methods Act of obtaining copy of digital data from depositor media and transferring into a managed environment for subsequent analysis: 1.File copy: Files are copied/moved from the donor’s media to AIM-owned storage, e.g. FTP, DVD-R, hard disk 2.Disk clone: Bit copy of files on source disk copied to mirror disk 3.Disk image: Bit copy of disk is created and stored as a file on other media. Different Hardware Different Media

Decision tree for choosing capture method

Analysis

7 Data held on a digital media Content held on digital media serves many purposes: Operating system files, e.g. Windows has 30,000+ after fresh install Software: Applications, utilities, games, etc. Log data: Windows Registry, browser cache, cookies, temp files User-generated content: Documents, images, sound, s, etc. Different data layers available: 1.Active data: Information readily available as normally seen by an OS 2.Inactive/residual data: Information that has been deleted or modified Deleted files located in unallocated space that have yet to be overwritten (retrieved using undelete application) Data fragments that contains information from a partially deleted file (retrieved through carving) Inactive data useful, but need to consider ethical issues

1. Analysis techniques for active data Common techniques: Navigate directory structure to get a ‘feel’ for data files held on disk Search by: File name, e.g. *report* File type, e.g. *.doc, *.pdf, etc. Creation/modification date Content type, e.g. word usage File size Additional parameters configurable Windows search easy to perform, but does not identify everything – investigation process can leave artefacts, e.g. thumbs.db behind

1. OSForensic Search UI for active files Sort by: Name, Folder, Size Type, Creation date, Modification date, Hash set, Foreground colour, Background colour

10 2. Recovering deleted files Data files deleted by user continue to exist on disk! filename is changed and occupied space is simply labelled as ‘unallocated’, i.e. available for use. May be recovered if the space has not been reallocated to new data. However, likelihood of retrieving entire file decreases with usage of disk. Recovering partial/complete files Recoverable using Undelete\File recovery software to search unallocated space and relabel found files as available. Recovering Data Fragments Fragments of files may be recovered using Data carving technique - raw bits of disk analysed to identify recognisable patterns that may indicate a data file, e.g. header/footer, semantic information. Carving software designed to take a linear approach to locating data files – ineffective on fragmented disks Creates Franken-Files! – incomplete files, large files containing info from multiple sources, extracts embedded images from Powerpoints, etc Img source:

2. OSForensic Deleted File UI 99-50% complete content Data carving identifies data fragments, but frequently wrong about file type

3. Keyword Search Scan the content of a disk, including all s, documents and other text content, to locate a particular search term. Commonly used by police to identify illegal content, e.g. bank numbers, telephone numbers, drug references, etc. Archival use: Does the disk contain reference to topic X? What trends may be identified in use of concept – when did term appear and disappear?

4. Analysis of research behaviour Hard disk contain large amount of other information: Web sites visited/bookmarked for research Chat logs indicating discussion with colleagues Other digital media that may have been used to store data This may be useful for understanding researcher work process, but be wary of the ethical issues

Decision tree for choosing appropriate analysis method

Forensic Hardware 1) Desktop PC Intel Pentium Dual Core E5800 CPU (3.20Ghz) 2GB DDR 500GB HD Super multi DVD-RW (2) USB Write Blocker Prevents OS writing to connected devices (4) Kryoflux USB Floppy disk controller to enable attachment of disparate disk devices & forensic imaging (3) Drive enclosure Enables connection of internal ATA/SATA disks via USB

16 Thank You! Gareth Knight Centre for e-Research, King’s College Questions