50
Lars Daniel, EnCE Digital Forensic Examiner Digital Forensics for Attorneys Part 1 Overview of Digital Forensics

Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Lars Daniel, EnCEDigital Forensic Examiner

Digital Forensics for Attorneys ‐ Part 1

Overview of Digital Forensics

Page 2: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

About Your Presenter

• EnCase Certified Examiner  (EnCE).• Co‐author of “Digital Forensics For Legal Professionals” 

(September 15, 2011 Syngress Publishing).• Over 200 hours of digital forensics training.• Testified as an expert witness twice in North Carolina • Worked on over 300 cases.• Spoke at CEIC 2011 (The Computer Enterprise and 

I ti ti C f ) O li G i F iInvestigations Conference) on Online Gaming Forensics.  

Page 3: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Forensics For Attorneys

Part IPart I• Overview of Digital Forensics

– Types of Digital Evidenceyp g– Acquisition (Collection) and Preservation

Part 2 • Experts, Evidence and Analysis

– Understand Forensic Experts vs. Computer Experts– Digital evidence: discovery and usageDigital evidence: discovery and usage– Overview of Digital Forensics – Analysis– Challenging Digital Evidence

Page 4: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

In The Beginning…

Page 5: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 6: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 7: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 8: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 9: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital FootprintsDigital Footprints

Digital evidence in f80% of cases

5+ billion cell phone psubscriptions

By 2013 there will be over 1 trillion devices connected to the Internet

Page 10: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Some Basics

Page 11: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Common MistakesCommon Mistakes

Calling these monitors, CPUs, Hard Drives, etc.

Page 12: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

CPUCPU

• CPU – Central Processing Unit– Only performs calculations.– Stores nothing.g– The “brain” of the computer.

Page 13: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Inside The ComputerInside The Computer

• RAM – Random Access MemoryO l t i d t hil th– Only contains data while the computer is turned on.

– Temporary processing storage only used while operating the computer.

– Is cleared when the computer pshuts down or re‐starts.

Page 14: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Inside The Computer

• The Hard Drive stores the evidence...

Page 15: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Inside The ComputerInside The Computer

• Hard drives today can store several hundred thousandHard drives today can store several hundred thousand– Documents– Pictures– Music files– Movies– Passwords– Emails

b– Web Pages

Page 16: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Th h d d iThese are hard drives too.

Page 17: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Evidence

Page 18: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital EvidenceDigital Evidence

Page 19: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Evidence

Page 20: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Overview

• Digital Forensics – Four Primary Areas of Focus• Acquisition (Collection)

• Obtaining the original evidence items• Obtaining the original evidence items• Making forensic copies of original evidence

• Preservation• Protecting the original evidence items

• AnalysisFi di id• Finding evidence

• Presentation• Reporting findings and testimonyp g g y

Page 21: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Forensics Foundations

The foundation of digital forensics is the ability to collect, preserve and recover data in a forensically sound manner.

Forensic Processes and Tools must be:1. Predictable2. Repeatable3. Verifiable

Forensic Documentation must include:Unbroken Chain of CustodyDocumentation of all actions taken

Page 22: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Forensics – The Sub‐Disciplines

• Computer ForensicsComputer Forensics• Computers and Data Storage Devices

• Typical Case Types: All• Social Media Forensics

• Facebook, Twitter, Chat, MySpace, Internet Presence on Blogs, Message Boardsg

• Typical Case Types: Infidelity, Libel and Slander, Employee Wrongdoing

• Email ForensicsEmail Forensics• Back tracking emails• Email recovery

• Typical Case Types: Murder, Rape, Infidelity, Sexual Harassment, Child Pornography

Page 23: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Forensics – The Sub‐Disciplines

• Peer to Peer ForensicsPeer to Peer Forensics• File sharing via Limewire, BitTorrent, others

• Typical Case Types: Child Pornography, Copyright Violations, Data Th ftTheft

• Cell Phone Forensics• Call logs, contacts, text messages, pictures, movies, geo‐location

• Typical Case Types: Murder, Sexting, Infidelity, Rape, Kidnapping, Drugs

• Cellular Evidence Forensics• Cell phone record analysis, Cell phone ping analysis, Cell tower mapping

• Typical Case Types: Murder, Kidnapping, Drugs

Page 24: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Digital Forensics – The Sub Disciplines

• Digital Video and Image ForensicsDigital Video and Image Forensics• Security Video, Camera Video, Pictures

• Typical Case Types: Murder, Theft, Employee Misconduct, W f l D thWrongful Death

• Audio Forensics• Police Interviews, Police Radio Recordings, Wiretaps

• Typical Case Types: Murder, Conspiracy, Wrongful Death• GPS (Global Positioning Systems)

• Data from GPS units Logs from GPS tracking House Arrest• Data from GPS units, Logs from GPS tracking, House Arrest• Typical Case Types: Murder, Parole Violations, Kidnapping

Page 25: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Acquiring (Collecting) and Handling  Digital Evidence

Digital forensics requires forensically sound acquisitions.

Defensible PracticesProper Chain of CustodyProper Chain of CustodyVerification of evidenceProper documentation

Page 26: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Acquisition (Collection)Acquisition (Collection)

First contact with the original evidenceFirst contact with the original evidence.• Most critical time for protecting the originals.• Most likely time for police or others to damage or changeMost likely time for police or others to damage or change evidence.

• General rules MUST be followed to preserve and protect evidence during this critical first response period.

• First point in establishing chain of custody.

Polices for Law Enforcement are published by the National Institute for JusticeInstitute for Justice

Page 27: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

A i iti (C ll ti )Acquisition (Collection)

Fi d h ld b i d h dl hi f– First responders should be trained to handle this type of evidence.

– Digital evidence is fragileDigital evidence is fragile.– Digital evidence is easily altered if not handled properly.– Simply turning a computer on or operating the computer p y g p p g pchanges and damages evidence.

Page 28: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

What Is Forensically Sound?

Page 29: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

This is Not Forensically Sound

Page 30: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 31: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

This is Forensically Sound

Page 32: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 33: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 34: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Verification Must Be Done

Page 35: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Organization of Logical Data on a Hard Drive

Page 36: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Logical Acquisition (Norton Ghost, computer backups, simply copying)

Does not get deleted filesI NOT l t f iIs NOT a complete forensic copyIs NOT collected in a verifiable forensic formatDoes not use forensic collection toolsSubject to contaminationNot Repeatable, Not Verifiable

Page 37: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 38: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Physical Acquisition

• A complete “mirror image” of the physical storage media, also referred to as a bit‐stream copya bit‐stream copy.

• Gets everything, including deleted data and unallocated space• Collected in forensic format that is easily verifiable• Meets the standards for original evidence• Supports full chain of custody• Cannot be contaminated• Cannot be contaminated.

Page 39: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 40: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Two Types of Deleted Data

Page 41: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 42: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must
Page 43: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Preservation

• Once digital evidence is seized it must be handled carefully to• Once digital evidence is seized it must be handled carefully to preserve and protect the evidence.– Everything should be tagged.– No one should operate or preview any evidence on writable media without proper tools and training.Forensically sound copies of all original evidence must be made before– Forensically sound copies of all original evidence must be made before analysis.

– Records must be kept.

Page 44: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Fragile Nature of Digital Evidence

• The simple act of turning a computer on can destroy or change critical evidence and render that evidence useless. 

– Maryland State Police ‐ Criminal Enforcement Command ‐Computer Crimes Unit

• Even the normal operation of the computer can destroy computer evidence that might be lurking in unallocated space, file slack, or in the Windows swap file. 

– Computer Forensics, Computer Crime Scene Investigation, 2nd Ed. John R. Vacca

Page 45: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Fragile Nature of Digital Evidence

• The next 3 slides demonstrate what happens when you operate a computer.– Evidence is modified.– Evidence is destroyed.

Source: Preservation of Fragile Digital Evidence by First Responders Special Agent Jesse Kornblum Air Force Office of Special InvestigationsSource: Preservation of Fragile ‐ Digital Evidence by First Responders ‐ Special Agent Jesse Kornblum ‐Air Force Office of Special Investigations

Page 46: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Files In Original Condition

Page 47: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Files After Opening and Viewing

The last accessed date and time changes any time a file is opened and viewed while the computer is in operation.p p

Page 48: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Files After Saving

The last written date and time changes any time a file is saved or copied while the computer is in 

operation.

Page 49: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Other Digital Evidence

• Global Position Systems (GPS) Units (location data)• Vehicle Black Boxes (trucking industry)• iPods – (employee theft)• Digital Cameras – (sex crimes)• Security Cameras – (robberies, wrongful death)• Audio Recordings (wrongful death, terrorism, murder, 

defendant interviews)Game Consoles (murder)• Game Consoles (murder)

• Security Systems (murder)• Back up Tapes (data recovery fraud)• Back up Tapes (data recovery, fraud)

Page 50: Digital Forensics for Attorneys Part 1winfredbar.org/images/Digital_Forensics_For... · DDigitaligital Footprints Digital evidence in ... • Once digital evidence is seized it must

Questions?Questions?Contact Information:Contact Information:

Email: [email protected]: www.guardiandf.comBlog: www.exforensis.comPhone: 919‐868‐6281Phone: 919 868 6281

Coming soon:liAttorney Resource Center Online

www.attorneyresourcecenteronline.com

Book: Digital Forensics for Legal ProfessionalsMay 2011, Syngress PublishingL E D i l d L E D i lLarry E. Daniel and Lars E. Daniel