Introduction - Southern Oregon University
Download
Report
Transcript Introduction - Southern Oregon University
Computer Forensics
CS 407
MW 10:30 – 12:30
Texts:
File System Forensic Analysis, Brian Carrier
Windows Forensics Analysis, 2nd editiion, Harlan Carvey
Supplementary Texts:
Digital Evidence and Computer Crime, Eoghan Casey
Guide to Computer Forensics and Investigations, Nelson, et al
Web site: ackler.csrl.sou.edu/
More Texts:
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition,
http://www.ncjrs.gov/pdffiles1/nij/187736.pdf
Forensic Examination of Digital Evidence: A Guide for Law Enforcement Series,
http://www.ncjrs.gov/pdffiles1/nij/199408.pdf
Best Practices for Seizing Electronic Evidence V2
www.fletc.gov/training/programs/legal-division/downloads-articles-and faqs/downloads/other/bestpractices.pdf/view
Advanced Computer Forensics
A New Realm
Responsiblities
Ethical
Legal
Technical
Three Course Sequence
1.
File system Forensics
2.
Network Forensics
3.
Memory Forensics
ACE Certification
Preparation for CCE Certification, ISFCE
Syllabus
Week 1:
Procedural, Legal and Ethical Principals of Computer Forensics
Week 2:
Imaging Hard Drives
Media preparation for cloning, proving it is sterile
Imaging tools
Intro to dd, dcfldd, ddrescue FTK Imager
Write blockers
Tool validation test plans and test reports
Week 3-5:
Hard Drive and File System Structure
Master Boot Record, Partition tables, Directories
FAT, NTFS, ext2, ext3,
IDE, ATAPI, Sata, SCSI Drives, Raid devices
Syllabus
Week 6-7:
Registry Analysis
Registry structure, system information, tracking user activity
MRUs, time lines, USB devices, restore points
FTK’s Registry Viewer, regedit, and regripper
Week 8-9:
Windows File Analysis
Event logs, link files, setup logs, firewall logs
File metadata, $I30 files, prefetch files
Week 10:
File Signature and data carving
File structure and file signatures
“File Extractor Pro”
Computer Forensics
As in all endeavors:
“Blame always falls some where.”
Rule:
“Let it not be in your lap.”
Computer Forensics
Discovery and recovery of digital evidence
Usually post facto
Sometimes real time
Types of forensic investigations
Liturgical
Going to court
Crimes, etc.
Non-Liturgical
Administrative adjudication
Industry
Purpose
Prove or disprove criminal activity
Prove or disprove policy violation
Prove or disprove malicious behavior to or by the
computer/user
If the evidence is there, the case is yours to lose with
very little effort.
Today
Ethical issues
Privacy issues
Evidence
Association of suspect with evidence
Chain of custody
Seizing electronic evidence
Ethical issues
Evidence
All of it
Emphasis on exculpatory
Respect for suspects privacy and rights
Beware of collateral damage
Proper use of dual use technology
All tools can be used to commit crime
All procedures can be used to hide crime
Business Issues
No interruption of business
Know the policies of the business
Sensitive to the business costs during an investigation
Privacy Issues
Rights of the suspect
Liabilities of the investigator
Public versus private storage of information
Expectation of privacy
Search and Seize
With and without a warrant
Not for the computer forensics expert
Residences
Private Sector-workplaces
Public Sector-workplaces
“In plain sight” issues
Subpoenas
Person to testify
Present to the court computers, records, documents
Authentication issues
Record alteration
Usually for computer based business records
Often a snapshot of ongoing record keeping
Search Warrants
Show up and take away
Court approved with probable cause
Good for computers
Records, etc.
Sneak & peek
Compelling reason
Notify within 7 – 45 days
For stored communications and records
Caution: third party information
Electronic Storage
Any temporary or intermediate storage of a wire or
electronic communication incidental to the electronic
transmission of the communications
And backup for the restoration of the electronic
communication service (not for future use)
Wire Communications
Telephone communications mostly
Specifically the communication must contain the
human voice
At any point from the point of origin to the point of reception
Must be on a wire somewhere
Wire communication in “temporary or incidental” electronic
storage is covered by Title III
Causes confusion
Unopened voice mail is covered
Opened voice mail is not
Electronic Communications
Internet communications mostly
Signs, signals, writing, images, sounds, data, or
intelligence transmitted electronically
BUT does not include
Wire or oral communications
Tone-only paging device
Cannot be characterized as containing the human
voice
Communications Intercept
Acquisition contemporaneous with transmission
Content
Addressing information
Electronic surveillance
Pen/Trap Statue
Collection of addressing information for wire and electronic
communications
Title III of the Omnibus Crime Control and Safe Streets
Act of 1968
Collection of content of wire and electronic communications
Pen/Trap Statue
Collection of addressing information
Phone is different from Internet
Application for a Pen/Trap order
Who wants it
Where do they work
State their belief the info is relevant to an ongoing criminal
investigation
Application is easy
Violation is severe
Title III - 1968
Assumption: any interception of private communication
between two parties is illegal.
Title III order is required when
Intercepted communication is protected under Title III
The proposed surveillance is an interception oc
communications
Is there a statutory exception
Title III Wire Taps
Court approved upon probable cause
Feds need DoJ approval
Good for 30 days
Can apply for non-notification
Usually used for “wire communications”
Very dicey area between “wire communication” and
“electronic communication”
Title III - 2001
Voice intercept authorized in computer hacking
investigations
Electronic storage of wire communications is now
covered by same rules as stored electronic
communications (only need a search warrant)
Session times, addresses only requires a subpoena
not a Pen/Trap order
Warrants for e-mail are now nationwide
Title III - Today
NSA surveillance puts all in disarray
NSLs
Specifically enabled in the USA PATRIOT Act
Requires FBI supervisor approval
No judicial oversight
Disclosure is forbidden
Evidence
Demonstrative
Documentary
Testimonial
Circumstantial
Hearsay
Demonstrative Evidence
Physical evidence that one can see and inspect
Does not play a direct part in the incident
Of probative value
Sometimes referred to as real evidence
Documentary Evidence
Evidence supplied by a writing or other document
Must be authenticated to be admissible
Testimonial Evidence
A person’s testimony
Offered to prove the truth of the matter
Hearsay Evidence
“Hearsay is a statement offered in evidence to prove
the truth of the matter asserted” Federal Rules of Evidence, § 801
There are many exceptions to hearsay evidence.
Most forensic evidence must be shown to be excepted
from hearsay
Computer Evidence
Two broad classes
Computer generated records
Computer stored records
Computer data contains potential hearsay evidence
To be admissible, a hearsay exception must be
established
Unless it can be shown that the data are reliable,
trustworthy, material and authentic.
Computer Generated Data
Computer generated records
Data untouched by human hands.
Phone logs
ISP logs
syslogs
The data contains no hearsay evidence
To be admissible, it must be shown that the data are
reliable, trustworthy, material and authentic.
Reliability of the computer programs
Computer Stored Data
Computer stored records
Data potentially contains hearsay
Photo graphs
Results of Excel spreadsheets
A printout of an e-mail is considered to be an original.
However, to connect the e-mail to the defendant one
must tie the computer system to the defendant.
The ISP records of the e-mail server are business
records and only require testimony of the ISP.
Computer Stored Business Records
Business records
Data generated in the usual course of business
Done regularly
A satisfies a hearsay exception.
Evidence
Admissible
Reliable
the real thing, not a replica
Complete
has not been tainted (changed) since acquisition
Authentic
must be legally obtained and relevant
includes any exculpatory evidence
Believable
lawyers, judge & jury can understand it
Chain of Custody
The evidence must be accounted for at all times after
seizure
Very prone to violation with digital evidence
Can’t take it home to work on!
Sometimes it is hard to say where the evidence is.
Fortunately the courts accept hash codes
Not for long
MD5 collisions in less than a minute