39
National District Attorneys Association National Center for Prosecution of Child Abuse Computer Forensics for Prosecutors January 17-18, 2012 Bismarck, North Dakota Detective Micah Smith Linn County Sheriff’s Office 1 Special Thanks To Lt. Josh Moulin, Southern Oregon High Tech Crimes Task Force Lt. Joseph Rampolla, Park Ridge (NJ) Police Department Richard Kaplan, Computer Forensic Specialist, USDOJ CEOS For their willingness to collaborate and share ideas in the digital world 2 Objectives Be able to identify sources of technical investigations Understand common terms related to computer hardware Understand how the Internet works and how IP addresses are assigned Understand how data is written, stored and deleted from storage devices 3 Objectives Understand commonly used computer forensics terms, hardware and software Understand the importance of computer forensics examinations, and how they are completed Be able to understand content of a computer forensics report 4

Computer Forensics for Prosecutors

  • Upload
    lynga

  • View
    232

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Computer Forensics for Prosecutors

National District Attorneys AssociationNational Center for Prosecution of Child Abuse

Computer Forensics for Prosecutors

January 17-18, 2012 ● Bismarck, North Dakota

Detective Micah SmithLinn County Sheriff’s Office

1

Special Thanks To

• Lt. Josh Moulin, Southern Oregon High Tech Crimes Task Force

• Lt. Joseph Rampolla, Park Ridge (NJ) Police Department

• Richard Kaplan, Computer Forensic Specialist, USDOJ CEOS

• For their willingness to collaborate and share ideas in the digital world

2

Objectives

• Be able to identify sources of technical investigations

• Understand common terms related to computer hardware

• Understand how the Internet works and how IP addresses are assigned

• Understand how data is written, stored and deleted from storage devices

3

Objectives

• Understand commonly used computer forensics terms, hardware and software

• Understand the importance of computer forensics examinations, and how they are completed

• Be able to understand content of a computer forensics report

4

Page 2: Computer Forensics for Prosecutors

Sources of Investigations

• Walk-in complaints from citizens

• CyberTips from The National Center for Missing and Exploited Children - passed on from ICAC Task Force

• Referrals from other Law Enforcement Agencies

• Child Protection System undercover operations

5

Computer Forensics Defined

• “Pertaining to the Law”

• Coined in 1991 in the first training session held by the IACIS in Portland

• Described as the autopsy of a computer hard disk drive

6

Computer Forensics defined:

Collection,

Preservation,

Examination,

Documentation, and

Presentation

…of computer related evidence.

7

Digital Evidence can be:• The Fruits of the Crime• The Instrumentality• the Evidence

Your Electronic Crime Scene just changed...again!

Examination and Documentation

8

Page 3: Computer Forensics for Prosecutors

Where is the Crime Scene?

Perpetrator’s

System

Electronic Crime

Scene

Cyberspace

Victim’s

System

9

What type of examination is needed?

• Tier 1 - On-scene preview of digital evidence• Seizure of evidence, documentation, interviews

• Encryption, P2P evidence, wireless/storage,

• RAM capture, Forensic Scan, zSearch

• Tier 2 - Evidentiary Forensic Analysis• Acquisition, analysis for indictment and plea agreements

• Case-specific forensic analysis

• Evidence to corroborate statements, CVIP submission

10

What type of examination is needed?

• Tier 3 - Requests from DA/Defense• Analysis to answer concerns and requests of DA

• Analysis offered to Defense to exculpate their client

• Opportunity to close door on defenses, move plea forward

• Tier 4 - Trial Prep Forensics and Analysis• Includes all seized digital evidence for case

• Defeating known/plausible defenses, complete analysis report, preparation of demonstrative evidence, meeting with DA, prep of expert witness questions/testimony

11

Basics to Understand

• Common types of digital storage media

• How data is stored

• Hashing, how it works, and why it is important

12

Page 4: Computer Forensics for Prosecutors

Identifying Digital Evidence

13 14

Computer Forensics defined:

Collection,

Preservation,

Examination,

Documentation, and

Presentation

…of computer related evidence.

15

Digital Evidence

What does it look like?! USB Drives! Memory Cards! External Hard Drives! Computers! Mobile Devices! GPS Devices! Cloud Storage! RAM / CPU

16

Page 5: Computer Forensics for Prosecutors

Digital & Electronic Evidence: RAM / CPU

17

Digital & Electronic Evidence: RAM / CPU

18

Wireless Devices

• Be prepared to investigate wireless devices

• Understand how your own devices may interact wirelessly with suspect devices

• Wireless devices can contain evidence of crimes

• Evidence on wireless devices is generally volatile, and gone once power is lost

19 20

Page 6: Computer Forensics for Prosecutors

Evidence of Wireless Devices

21

Understanding Data

22

Data Sizes

• Bit (b) is a single zero or one

• Byte (B) is eight bits in sequence together

• Kilobytes (KB) is 1024 bytes, sometimes shown as 1000 bytes

• Megabytes (MB) is 1,048,576 bytes, sometimes shown as a million bytes

• Gigabytes (GB) is 1,073,741,824 bytes, sometimes shows as a billion bytes

• Terabytes (TB) is 1,099,511,627,776 bytes, sometimes shown as a trillion bytes

23

How Data is Written• Data is written and read in 1’s

and 0’s on the drive

• The hard drive is equipped with platters which spin at generally 7200 or 10000 rpm

• Mechanical arms move back and forth over the platters while they spin and write or retrieve data

• The data is written as the mechanical arm changes the magnetic coating on the platter’s surface as either + or – (a 1 or 0)

24

Page 7: Computer Forensics for Prosecutors

Hard Drive Terminology

• Data$is$stored$on$the$surface$of$a$pla2er$in$sectors$and$tracks.$$Tracks$are$concentric$circles$and$sectors$are$pie6shaped$wedges$on$the$track:

25

Sectors and Clusters

• A sector contains a fixed number of bytes – typically 512 bytes. Sectors are grouped together to form clusters

• Performing a high-level format prepares the hard drive for data by writing the file storage structure

26

How Digital Data is Stored

• Data is written in binary code, or 1’s and 0’s

• These 1’s and 0’s are grouped together in block of 8 and called bytes

• For example a sequence of “1010011” represents the letter “S”. The sequence ”1001111” is the letter “O”

27

Understanding Unallocated Space

• Allocated Space: Physical space on the hard drive that has been assigned and is being used by the file system at a specific moment in time. This includes:

• Visible files

• Hidden files

• Slack space

28

Page 8: Computer Forensics for Prosecutors

Slack Space

• File slack can be an excellent source of evidence

• Computers write data one sector at a time but must allocate a minimum number of sectors for each file. These sectors are allocated even if you don’t use them

• It’s like a video tape… If you say that a video tape can only have one show on it at a time, you would allocate a 2 hour video tape per show. Now if you record a ½ hour program, you still have 1½ hours of tape left

29

Slack Space

• If there was a program on the tape before you recorded the new ½ hour show, you would see it at the end minus the first ½ hour. This is slack space.

½ hour program

1½ hour of old program

------------------------ SLACK ------------------------

30

Slack Space Recovery

• Often if data resides in slack space it can be forensically recovered

• Evidence from slack space will normally not have dates/times associated with it because that information may have been overwritten

• It is possible to get enough of a document or image to prosecute an individual

31

Partial File Recovery - Slack Space32

Page 9: Computer Forensics for Prosecutors

Understanding Unallocated Space

• Unallocated Space = Physical space on the hard drive that has not been assigned by the file system at a specific moment in time and is considered available for use. This includes:

• Deleted files

• Space that has not been assigned to a file

33

How Files are Deleted• When a user deletes a file the computer does

absolutely nothing with the file’s data itself

• Depending on the file system that the hard drive is formatted to, some things are handled differently

• Regardless of the file system, the data still remains and the computer sees the space where that file resides as “available for use”

• Until something else is placed in its spot on the drive, the file will remain and can be recovered with forensic methods

34

Methods Impacting Deleted Files

• Running system utilities such as defrag can rearrange data and overwrite unallocated space and slack space

• Using secure erase features such as Norton secure erase or other third party applications that are designed to “shred” data

• Although this class is primarily about Windows computers, it should be noted that Mac computers have functionality built in to securely erase data

35

Hashing and Forensics

36

Page 10: Computer Forensics for Prosecutors

Terminology - Forensic Image

• It is no longer recommended to call forensic images a “mirrored image”

• Mirroring would imply that the duplicate looks exactly like the original. Although the content is the same it looks nothing like the original

• “Forensic Image” is the most appropriate and recommended.

37

Hashing

• Hashing is a very important tool for forensics

• Hashing is like a digital fingerprint for a file. It is mathematically derived from the contents of the item being hashed

• The odds of two files with different content sharing the same MD5 hash value is more than 1 in 340 undecillion (or 1 followed by 36 zeros)

38

Hashing

• Hashing is used in forensics for many things:

• Known File Filters

• Narrow search scope

• Exclude items to be searched

• Find known images of child pornography

• Compare files to determine if they have been altered

• Ensure the integrity of a forensic image process

39

Hashing• There are several algorithms such as MD5 (Message

Digest 5), SHA1 (Secure Hash Algorithm), and others

• MD5 is a 128 bit 32 character algorithm and is the most commonly used hashing algorithm

• There are other hashing algorithms available for encryption, however forensics primarily focuses on MD5 and SHA1

• Hashing is used in many other areas such as download confirmation and encryption

40

Page 11: Computer Forensics for Prosecutors

What Affects a Hash Value

• Any change to the content of the file

• One pixel in a picture

• Add/remove one character in a document

• Changing the filename or file extension will have no affect on the hash value

• Sophisticated CP traders modify files to change hashes, and avoid detection

41

Tier 1 - On-scene Preview

How to collect:

"On-Site Preview

"On-Site Acquisition

"RAM Acquisition and Analysis

"Seizure of Computer and Associated Items

42

WARNING!!!

#Document all actions surrounding manipulation of system:

! Seizure! Live Preview - Findings, exported files, reports! Live Acquisition! Automated Acquisition and Field Search

43

On-Site Preview & Acquisition:

"Bootable CDs# ImageScan, Helix, Trinux, BartPE,

ForwardDiscovery, Knoppix, WinEN, etc."USB/Other

#e-fense “Live Response”, Forensic Dossier, Solo3, Logicube, Forensic Scan, FieldAgent, zSearch

"Acquisition and Analysis#MacLockPick#FTK Imager#EnCase Portable

Tier 1 - On-scene Preview

44

Page 12: Computer Forensics for Prosecutors

MacLockPick

#USB Auto-performing system scan#Retrieves “state of machine” information

! Passwords, logs, registry entries, documents, pictures, etc.

#Forensically sound, X-platform#First-responder deployable

#$399 for LE

45

EnCase Portable

#USB auto-performing data collection#Integrates with EnCase Forensics#Hash, search & copy#Image entire drive

! All attached drives

#$748.50 LE

46

zSearch

#Free product by SA Eric Zimmerman! FBI - Salt Lake City, UT! Distribution - eric[at]feeble-industries.com

! Plug-in live triage via USB! Virtualization, encryption, mass storage, P2P,

Gigatribe, picture & video preview, password gathering, and MORE!

#FREE!!!47

47

Random Access Memory Analysis:

"Data is traditionally lost - no more!"Contains Computer’s recent activity

# Images, documents, web pages, videos, etc#Passwords (BitLocker, KeyChain, Crypto)

"Large amount of evidentiary data#RAM sizes up to > 32GB of information

"Captured forensically, saved to image file for analysis (data carving)

Tier 1 - Collection and Preservation

48

Page 13: Computer Forensics for Prosecutors

Tier 1 - Defeating Passwords

If password protected:! On-scene analysis information! RAM Analysis! Social engineering! Known backdoors! Internet! Computer or BIOS manufacturer! Passwords extracted from removable

media! Brute force attacks! Specialized Software! Court Order / Immunity

49

Tier 1 - Collection and Preservation

How to Seize Digital Evidence:

"If needed, call for assistance"Determine legal authority"Document and Photograph#Area, screen, cables, etc

"If “off” --> leave “off”"If “on” --> that changes things

50

If it is “on” then:

"Is there encryption in use?" Windows Vista & 7" Mac Leopard & Snow Leopard" Preview search using DOD-ICE CryptHunter

"Are there programs open?" TrueCrypt, BestCrypt, PGP

"Can it be shutdown properly?

"Don’t hesitate to call for help

Tier 1 - Collection and Preservation

51

Working around Encryption:

"“Known” backdoors"RAM Analysis"Written notes"Corporate assistance"Legal process/demand"Co-defendant plea agreements

Tier 1 - Collection and Preservation

52

Page 14: Computer Forensics for Prosecutors

What to collect:

"Hard Drive/Media Only#Not best for running systems#Fine for loose digital media

"Tower/Media Only#Best option

"Computer and All Peripherals*

Tier 1 - Collection and Preservation

53

! Monitor! Keyboard! Mouse! Speakers! Printer! Scanner

! Web Camera! Microphone! External Drives! Manuals! Notes! Other Media

Computer and All Associated Items:

Tier 1 - Collection and Preservation

54

Marking The Computer and Associated Items:! Photographs are the BEST

documentation! Evidence Numbers! Label all Connections to Re-Assemble in

Court if Required! Tape over Power, etc. if going to another

agency…

Tier 1 - Collection and Preservation

55

Transporting the System and Media:! Comfortable temperature! Avoid car seats if possible (bouncy) –

floorboards are more stable! Avoid using police radio in transport

vehicle if possible

Tier 1 - Collection and Preservation

56

Page 15: Computer Forensics for Prosecutors

Storing the System and Media:! Clean, dry, secure area with reasonable

temperature! Avoid moving shelves! Avoid areas with magnetic storage! Avoid areas with police radio transmitters! Consider Anti-static bags, boxes, temp and

static controlled storage room

Tier 1 - Collection and Preservation

57

#Each case’s variables will dictate the path of the computer forensic examination

#No two exams will be the same

#No two reports will be the same

58

Ponder this...

58

Forensic Examination: $Know Your Scope

$ Search Warrant – Affidavit$ Type of Crime Being Investigated$ Articulate Authority

#Multi-Disciplinary Legal Auth.# Prosecutors should review/approve

SW, Aff, Subpoenas, etc

Ponder this...

59

Forensic Examination Equipment and Media:

$Secure, robust, dedicated$Forensically Sterile Media

$ Wiped & Verified

$Licensed Software$Tested write-block devices

Ponder this...

60

Page 16: Computer Forensics for Prosecutors

Tier 2 - Evidentiary Forensic Analysis

AcquisitionAuthentication

analysis

for indictment and plea agreementsCase-specific analysis and examination

Evidence to corroborate statementsCVIP submission

61

Tier 2 - Examination and Documentation

Forensic Documentation: $Status of Computer

$ Operating system, users, ownership, media size, internet…

$Seized/Searched$ Item by Item$ Evidence? Contraband? 3rd Party?

#Methodology of examination

62

6363

6464

Page 17: Computer Forensics for Prosecutors

6565

Examine the BIOS settings:!Date and Time settings

"Compare to known time – note findings

!Boot Order (CD, HDD, Etc.)"Important for Network other direct acquisitions

Tier 2 - Evidentiary Forensic Analysis

66

6768

68

Page 18: Computer Forensics for Prosecutors

Image Acquisition:•Do NOT allow the hard drive to

enter the boot process

•Can Change THOUSANDS of Files and attributes

•But - if it does happen, DOCUMENT IT.

Tier 2 - Evidentiary Forensic Analysis

69

$Note digital media’s capacity and geometry and compare to later findings

$Obtain data from digital media using forensic methods$ Write Blockers$ Live / Network Acquisitions, Etc. $ Smeared images*

Tier 2 - Evidentiary Forensic Analysis

70

Bit Image / Forensic Image: $Physical or Logical acquisition$Acquired & Verified by HASH$Separate from other cases

$ Different Machine, Drive, Folder

$Must Include Slack, Erased, Unallocated, Pagefile, Etc.

$Archived – Reload if Required

Tier 2 - Evidentiary Forensic Analysis

7172

72

Page 19: Computer Forensics for Prosecutors

File DBitstream copy

File D

File D

Standard (logical) copy

File D

Physical vs. Logical

73

Bit Image: $Physical or Logical acquisition$Acquired & Verified by HASH$Separate from other cases

$ Different Machine, Drive, Folder

$Must Include Slack, Erased, Unallocated, Pagefile, Etc.

$Archived – Reload if Required

Tier 2 - Evidentiary Forensic Analysis

74

Page ____ of ____ 1. INCIDENT NUMBER

07-17765 2. OTHER NUMBER

Linn County Sheriff’s Office

Narrative Report

Form H

7. INCIDENT TYPE

DEATH INVESTIGATION 8. REPORTED DATE

10-13-07 9. REPORTED TIME

1726 10. OCCURRED DATE

01-25-07 to 10-13-07 11. OCCURRED TIME

Unknown 12. FOLLOW-UP DATE

071311 13. FOLLOW-UP TIME

1120

REPORTING DEPUTY / RADIO #

Detective Micah W. Smith / 770 DPSST #

42020 SHIFT

Detectives ASSIGNMENT

177 SUPER APP DATE/INITIALS

DATA

LCSO Revised Date: 04/15/2009

data on the source drive. Once the drive was connected properly, I opened FTK Imager (Version 3.0.0.1443)

from the AccessData Corporation. Using FTK Imager, I hashed the contents of evidence item DB14 as a

connected physical device connected to my computer forensics workstation, through the write-block device.

The results of that hash process were presented to me on the screen at the completion of the process. I took a

screen capture of the results, documented below as Figure 1.

Figure 1

Then, also using FTK Imager, I created an exact duplicate of the contents of DB14, called a forensic

image file, which comprises a bit-for-bit copy of the contents of DB14. FTK Imager makes an exact duplicate,

verified by matching hash value, of the suspect computer media and saves the forensic image file. Further

analysis of the evidence is then conducted using the forensic image file created by FTK without modifying or

destroying the original computer media. At the completion of the acquisition process results are presented to

the examiner on the screen. I took a screen capture of those results, which stated the acquisition process

completed with a verified matching hash value, and no errors or bad sectors. This information is also written to

an acquisition file accompanying the forensic image file. Refer to Figure 2 and the Acquisition Report below.

Pre-Acquisition Hash75

Page ____ of ____ 1. INCIDENT NUMBER

07-17765 2. OTHER NUMBER

Linn County Sheriff’s Office

Narrative Report

Form H

7. INCIDENT TYPE

DEATH INVESTIGATION 8. REPORTED DATE

10-13-07 9. REPORTED TIME

1726 10. OCCURRED DATE

01-25-07 to 10-13-07 11. OCCURRED TIME

Unknown 12. FOLLOW-UP DATE

071311 13. FOLLOW-UP TIME

1120

REPORTING DEPUTY / RADIO #

Detective Micah W. Smith / 770 DPSST #

42020 SHIFT

Detectives ASSIGNMENT

177 SUPER APP DATE/INITIALS

DATA

LCSO Revised Date: 04/15/2009

Figure 2

Acquisition Report for DB14: Created By AccessData® FTK® Imager 3.0.0.1443 101008 Case Information: Acquired using: ADI3.0.0.1443 Case Number: 07-17665 - Homicide - Mills Evidence Number: DB14 Unique description: Motorola SD Adapter containing 256MB MicroSD Card Examiner: Micah W. Smith Notes: Acquired 071311. Adapter lock active. Write-block in place.

Acquisition Hash & Verification

76

Page 20: Computer Forensics for Prosecutors

Page ____ of ____ 1. INCIDENT NUMBER

07-17765 2. OTHER NUMBER

Linn County Sheriff’s Office

Narrative Report

Form H

7. INCIDENT TYPE

DEATH INVESTIGATION 8. REPORTED DATE

10-13-07 9. REPORTED TIME

1726 10. OCCURRED DATE

01-25-07 to 10-13-07 11. OCCURRED TIME

Unknown 12. FOLLOW-UP DATE

071311 13. FOLLOW-UP TIME

1120

REPORTING DEPUTY / RADIO #

Detective Micah W. Smith / 770 DPSST #

42020 SHIFT

Detectives ASSIGNMENT

177 SUPER APP DATE/INITIALS

DATA

LCSO Revised Date: 04/15/2009

Figure 3

The forensic image file for evidence item DB14, along with the other forensic image files related to this

investigation, were all copied to the defense-provided external hard drive related to discovery for this case. I

then returned the drive to Detective Beth Miller, for production to the defense council.

This report may not be inclusive of all potential evidence contained on the computer media referenced in

this report. Any additional forensic analysis conducted on the referenced computer media will be documented

in future reports.

ACTION RECOMMENDED: Investigation continuing.

Post-Acquisition Hash77

Forensic Image: $Physical or Logical acquisition$Acquired & Verified by HASH$Separate from other cases

$ Different Machine, Drive, Folder

$Must Include Slack, Erased, Unallocated, Pagefile, Etc.

$Archived – Reload if Required

Tier 2 - Evidentiary Forensic Analysis

78

7979

8080

Page 21: Computer Forensics for Prosecutors

Bit Image: $Physical or Logical acquisition$Acquired & Verified by HASH$Separate from other cases

$ Different Machine, Drive, Folder

$Must Include Slack, Erased, Unallocated, Pagefile, Etc.

$Archived – Reload if Required

Tier 2 - Evidentiary Forensic Analysis

81

Analogy

# Slack Space: It’s like a video tape… If you say that a video tape can only have one show on it at a time, you would allocate a 2 hour video tape per show. Now if you record a ½ hour program, you still have 1½ hours of tape left

82

------------------------ SLACK ------------------------

½ hour program

1½ hour of old program

82

Bit Image: $Physical or Logical acquisition$Acquired & Verified by HASH$Separate from other cases

$ Different Machine, Drive, Folder

$Must Include Slack, Erased, Unallocated, Pagefile, Etc.

$Archived – Reload if Required

Tier 2 - Evidentiary Forensic Analysis

83

$Forensic Write-block Devices$ Hardware vs. Software$ Verified (and Validated?)

$Tableau$FastBloc$Voom Technologies$Logicube

Tier 2 - Evidentiary Forensic Analysis

84

Page 22: Computer Forensics for Prosecutors

8585

8686

8787

8888

Page 23: Computer Forensics for Prosecutors

8989

9090

9191

Forensic Examination: $ Index, Hash, Categorize files

present! Hash Set analysis! Known files comparison

$Document Registry, LNK files.$ As appropriate for your case

Tier 2 - Evidentiary Forensic Analysis

92

Page 24: Computer Forensics for Prosecutors

HASH Sets

#Collections of File Identification Information HASHes used during forensic investigations:! National Software Reference Library

" www.nsrl.nist.gov! DHS-ICE HASH

" Contact a Special Agent! HashKeeper

" www.usdoj.gov/ndic/domex/hashkeeper.htm! AccessData Known Files Filter

" www.AccessData.com/downloads.html! Beyond FairPlay Tools (Forensic Scan, Media Library, etc)! Operation Round-Up hash sets! Case-specific hash values (from other seized evidence or UC Ops)

93

Traditional Hash Analysis

#Hashes of “known” files compared against hashes of files on suspect media! Hash analysis is based on binary content of file, rather than visual

examination! Not effective against deleted files, Unallocated, slack space, unused

disk area

This enables us to identify over 100 occurrences of

target files without looking at one

single file! Image Courtesy: Simon Key, CEIC 2011 File Block Hash Map Analysis CEIC 2011 - V6 Screenshots.ppt.

94

File Block Hash Analysis

#Simon Key ~ Guidance Software (EnCase)! Block-based hash analysis works by calculating a

hash value for each block of the target file that would be allocated a sector or cluster to store its data.

! A map of each block is generated, with the corresponding hash of each block. This is then fed to EnCase, and a search for the block-based hashes begins.

! **Must have full version of target file sought

Image Courtesy: Simon Key, CEIC 2011 File Block Hash Map Analysis CEIC 2011 - V6 Screenshots.ppt.

95

Partial File Recovery

9696

Page 25: Computer Forensics for Prosecutors

!We can rebuild partially recovered files (based on the hash map from good file)

!Render partial files as playable/viewable

Partial File Recovery

97

Forensic Examination: ! Document Registry Artifacts

! MRUs, WinRAR, Jump Lists

$Document LNK files.$ Show path to other devices$ Folder structure$ Access

Tier 2 - Evidentiary Forensic Analysis

98

©2007 Microsoft Corporation � All Rights ReservedLAW$ENFORCEMENT$SENSITIVE$INFORMATION$� DO$NOT$SHARE$THESE$MATERIALS©2007 Microsoft Corporation � All Rights ReservedLAW$ENFORCEMENT$SENSITIVE$INFORMATION$� DO$NOT$SHARE$THESE$MATERIALS

New File System Features � Jump Lists

� Jump Lists - You can think of Jump Lists as miniature Start menus for program icons on the Taskbar. Each Jump List can contain tasks, links to recent and frequently used documents, and links to pinned documents.

99 100

Page 26: Computer Forensics for Prosecutors

101 102

103

Forensic Examination: $View Pictures, Movies, Docs

$ View in Native Format $ View Forensically

$ EXIF Data for Pictures$ Hidden Text, Updates/Changes

$ Notes, Properties, Etc.

Tier 2 - Evidentiary Forensic Analysis

104

Page 27: Computer Forensics for Prosecutors

105 106

EXIF/MetaData:

$Can be modified by programs$Can be ‘cleaned’ or ‘stripped’

away during up/download$Good corroborative evidence

Tier 2 - Evidentiary Forensic Analysis

107

“Case Specific” Data : $ Instant Messages

$ View in Native Format $ LE or Commercial Decryption

$ View Forensically$ Plain Text$ Not Saved – Search UC for SN

Tier 2 - Evidentiary Forensic Analysis

108

Page 28: Computer Forensics for Prosecutors

109109

110110

“Case Specific” Data : $File Sharing Programs (KaZaa,

LimeWire, BearShare, Etc.)$ View in Native Format

$ LE or Commercial Decoder$ View Forensically

$ Database or Spreadsheet Formats$ Additional Information in Slack Space

Tier 2 - Evidentiary Forensic Analysis

111112

112

Page 29: Computer Forensics for Prosecutors

113113 114

Examination and Documentation

“Case Specific” Data : $Embedded Data

$ View in Native Format $ Email attachments, Word, PPT

$ View Forensically$ Encoding format, link to other files,

notable differences to like files,

115116

116

Page 30: Computer Forensics for Prosecutors

117117

“Case Specific” Data : $E-Mail Messages

$ View in Native Application $ Thunderbird, Outlook, Lotus Notes, Etc.

$ View Forensically$ EnCase, FTK, ILook, Paraben, Etc.$ Other Programs or Raw Data$ Interim Changes/Embedded Data

Tier 2 - Evidentiary Forensic Analysis

118

119119

120120

Page 31: Computer Forensics for Prosecutors

121121

AcquisitionAuthentication

Analysis

Answer concerns & questions of DA

Analysis of artifacts at request of Defense

Exculpatory evidence specific search/analysis

Investigate suggested defenses (from D)

Tier 3 - Requests from DA & Defense

122

AcquisitionAuthentication

Analysis

Includes all seized digital evidence for case

Defeating known/plausible defenses

complete analysis report

preparation of demonstrative evidence

meeting with DA

prep of expert witness questions/testimony

Tier 4 - Trial Forensics Examination

123

Forensic Examination: $Run Searches &/or Scripts

$ Document search keywords & why$ Careful of script pitfalls$ Test/Authenticate Search String$ Headers – Not Extensions$ Case Names (Victim, Suspect, Etc.)$ Case Terminology (R@ygold…)

Tier 4 - Trial Forensics Examination

124

Page 32: Computer Forensics for Prosecutors

125125 126

127127

128128

Page 33: Computer Forensics for Prosecutors

129129

Forensic Examination: $Examine Erased/Recent Files

$ Sort by status “Deleted”$ Sort by Dates/Times

$ Most Recent$ Close Proximity to Crime, Etc.

$ Info/Recycle Bin

Tier 4 - Trial Forensics Examination

130

131131

Forensic Examination: $Examine for Cloud/Network

Storage$ File sync software

"File versions & comparisons$ Online backup solutions$ Push services to mobile/cloud$ Stored shared user list

Tier 4 - Trial Forensics Examination

132

Page 34: Computer Forensics for Prosecutors

133133

134134

135135

Forensic Examination: $Examine Internet History

$ Registry for TypedURLs$ Saved forms, pwds, cookies$ Visited sites, first and last visit,

count, info up/downloaded$ Comb through HTML files

$ EnCase, FTK, Net Analysis, etc

Tier 4 - Trial Forensics Examination

136

Page 35: Computer Forensics for Prosecutors

137138

138

139139

Forensic Examination: $Check for Virus, Trojans, Etc.

$ Emulated Disk for Scan $ Scripts for Virus Signatures

$ If Found – Obtain More Info…$ Virus Company Web Sites, Etc.$ Research Capabilities, Etc. $ Log files from computer$ Statements of suspect RE: viruses

Tier 4 - Trial Forensics Examination

140

Page 36: Computer Forensics for Prosecutors

141141

142142

Mobile Devices

Gathering Data from Device: $ Hand-Jamming$ Examination & Analysis$ Extraction & Analysis$ Cloning, Examination & Analysis$ Flasher Box Extraction & Analysis

Some information in following slides taken from Purdue University’s Purdue Phone Phorensics (P3) project at www.MobileForensicsWorld.com/p3

143

Mobile Devices

Seizure Documentation: $Location were device found

$ Condition when located (on/off)$ Chain of Custody$ Physical issues/description$ Photograph and document

manipulation

144

Page 37: Computer Forensics for Prosecutors

Mobile Devices

Device Shielding/Isolation: $Jamming/Spoofing signal

$ Vio of Comm. Act 1934 (FCC)

$Radio sheilding bag/container$Airplane Mode$Turning off device$Network Service Provider (NSP)

$ Court Orders & Assistance

145146

146

147

Mobile Devices

Document w/o Modifying:

$ Make, Model, Model #$ Vendor Logo$ Style (Flip/Slider/Clam Shell/Form Factor)$ External Memory Present (Type, Capacity)$ Digital Camera (Forward/Rear Facing)$ Compliance Label (ESN/MEID or IMEI & SIM)$ Battery present/not present$ Damage - Condition

148

Page 38: Computer Forensics for Prosecutors

Mobile Devices

Examination & Analysis:$ Subscriber Identity Module

$ Possibly clone SIM for analysis$ External Memory Cards

$ Same as Digital Media (Forensics)$ Data carve deleted data

$ Examination, extraction and analysis of data on physical handset

149

Mobile Devices

Gathering Data:$ Ideally through:

$ Cable connected - most secure$ InfraRed (IrDA) - less secure$ BlueTooth (BT) - least secure

$ All may result in changed data or state of phone from original seizure

150

Mobile Devices

Gathering Data:$ Integrated Tools

$ UFED, Secure View, Device Seizure, BitPim, MOBILedit!,etc

$ SIM Tools$ SIMCon, SIMSeizure, SIMDetective, etc

$ Hex Dump Tools$ Cell Phone Analyzer, HeXRY, etc

$ Screen Capture Tools$ Digital Camera (Duh!), Fernico ZRT, Project-a-Phone, etc

$ Manufacturer Specific Tools

151

Mobile Devices

Evidence Analysis:$ Through Automated Tools or Raw Analysis:

$ Text (Short Msg Service)$ MMS (Multimedia Msg Service)$ Contacts / Address Book$ Call Logs$ Web History$ Email$ App Data

152

Page 39: Computer Forensics for Prosecutors

Mobile Devices

Considerations:$ Can we “forensically” analyze a phone or

other mobile device?$ Can’t separate storage from device$ Often, access only provided areas of phone

$ Do we need to perform “forensics” on mobile devices?$ If we document our actions, is that

sufficient?$ **Most evolving area of forensics

153

Forensic Principle

Always Show Unbiased Methodology and emphasize the

evidence that relates to the current charges – incriminating

or exculpatory

154

Consider Possible Defenses and attempt to prove or disprove

them with your evidence

Forensic Principle

155

Instructor Information

Detective Micah SmithLinn County Sheriff’s Office

Computer Crimes and Computer Forensics

Voice: 541-812-9200Email: [email protected]

156