What is Forensic Computing - University of South Australia

Download Report

Transcript What is Forensic Computing - University of South Australia

What is Forensic Computing
COMP 4027
Forensic Computing: Tools and Techniques
Helen Ashman
What is Forensics?
• Forensic Science
– The application of science to those criminal and civil
laws that are enforced by police agencies in a criminal
justice system (Saferstein, 2004)
• Think like Sherlock Holmes!!
History & Development of Forensic
Science
• Francis Galton (1822-1911)
– First definitive study of fingerprints
• Sir Arthur Conan Doyle (1887)
– Sherlock Holmes mysteries
• Leone Lattes (1887-1954)
– Discovered blood groupings (A,B,AB, & O)
• Calvin Goddard (1891-1955)
– Firearms and bullet comparison
• Albert Osborn (1858-1946)
– Developed principles of document examination
• Hans Gross (1847-1915)
– First treatise on using scientific disciplines in criminal
investigations.
History & Development of Forensic
Science
• Edmond Locard (1877-1966)
Principle of Exchange
“..when a person commits a crime something is always
left at the scene of the crime that was not present
when the person arrived.”
The purpose of an investigation is to locate identify and
preserve evidence-data on which a judgment or
conclusion can be based.
• FBI (1932)
National Lab to provide forensic services to all law
enforcement agencies in the country
Boundaries
We can identify what and when something
happened, but not necessarily who perpetrated
the crime.
Terminology
• Forensic Computing
– Computer Forensics
– Network Forensics
•
•
•
•
Electronic Evidence
Electronic Forensics
Digital Forensics
Digital Forensic Science
• These terms are used interchangeably
• We use Digital Forensics broadly to included
investigation of all devices and the other terms in a
more specific sense
• Sometimes ‘Forensics’ replaced by Criminalistics
What is Digital Forensics?
• Kruse and Heiser.
– Computer Forensics
• “Preservation, identification, extraction, documentation,
and interpretation of computer data”
• John Daniele (Technical Security & Intelligence
Inc.)
– “Computer Forensics is the collection of techniques,
processes and procedures used to preserve, extract,
analyze and present electronic evidence within
criminal or civil court.”
What is Digital Forensics?
• Steve Hailey (CyberSecurity Institute)
– “The preservation, identification, extraction,
interpretation, and documentation of computer
evidence, to include the rules of evidence, legal
processes, integrity of evidence, factual reporting of
the information found, and providing expert opinion in
a court of law or other legal proceeding as to what was
found.”
What is Digital Forensics?
• Australian definition
• Computer forensics is the application of
computer science to the process of collecting
digital evidence from electronic storage media in
such a way as to preserve the state of the original
item. This must be done according to the
established rules of gathering evidence that will
be presented to a court of law.
• McKemmish (1999) states that the process of
computer forensics can be broken down into the
four key areas of identification, preservation,
analysis and presentation.
McKemmish definition (1)
1. Identification:
• Identification consists of locating the electronic
devices that may contain evidence. In order to
locate the information the examiner must have
some idea of what they are looking for and how
it is stored. By correctly identifying relevant
devices at the outset of an investigation the time
taken to complete the forensic process can be
greatly reduced.
McKemmish definition (2)
2.
•
Preservation:
Preservation of evidence is vital for a successful case to
be made in a court of law. There must be a guarantee that
all precautions have been made to ensure evidence has
not been tampered with or accidentally eliminated. Digital
evidence is more susceptible to accidental change than
physical evidence, so special purpose tools are required to
be used. These tools must be tested and validated to
lessen the chance of contamination of the digital crime
scene.
McKemmish definition (3)
3. Analysis:
• Analysis of the evidence is necessary to bring it
into a state that is meaningful to humans.
4. Presentation:
• This is the final stage of the computer forensics
process where the evidence is presented to a
court of law. This stage demands that
procedures for the forensic process and policies
regarding the evidence have been properly
followed and documented as required.
The Field
•
•
•
•
Results derived from sound evidentiary practices
The Expertise test – Court decision
Methodology test – Repeatable & Verifiable
Technology Test – Keeping up to date
RULE 1
Minimal Handling of the Original
The application of computer forensic processes during
the examination of original data shall be kept to an
absolute minimum
RULE 2
Account for any change
Where changes occur during a forensic examination,
the nature, extent and reason for such change
should be properly accounted for.
RULE 3
Comply with the rules of evidence
The application or development of forensic tools and
techniques should be undertaken with regard to the
relevant rules of evidence.
RULE 4
Don’t Exceed your Knowledge
The forensic computer specialist should not
undertake an examination that is beyond their
current level of knowledge and skill.
Where will it take us?
•
•
•
•
Identifying What, When, and How
Preservation of variety of media
Data Recovery
New methods / New technologies
Range of Skills
Range of Skills
Digital Forensic Science
“The use of scientifically derived and proven methods
toward the preservation, collection, validation,
identification, analysis, interpretation,
documentation and presentation of digital evidence
derived from digital sources for the purpose of
facilitating or furthering the reconstruction of
events found to be criminal, or helping to anticipate
unauthorized actions shown to be disruptive to
planned operations.”
Source: (2001). Digital Forensic Research Workshop
(DFRWS)
A taxonomy of Forensic Computing
– What do we need to know?
•
The taxonomy proposed by Broucek and Turner (2001)
suggests that FC includes
• Computer Science: Operating Systems and Application
Software, Systems Programming and Programming
Languages, Computer Security, Computer Law (national
and international), Criminal, Civil and Soft Law
• Information Systems: Systems Management and
Policies, User Education and Training
• Social Science: Socio-political issues (privacy,
encryption, surveillance), Activism, Hacktivism,
Cyberterrorism and Cyber-warfare, Socio-psychological
impacts of computing
Other Forensic Science Services
• Forensic Pathology
– Sudden unnatural or violent deaths
• Forensic Anthropology
– Identification of human skeletal remains
• Forensic Entomology
– Insects
• Forensic Psychiatry
• Forensic Psychology
• Forensic Odontology
– Dental
• Forensic Engineering
Digital Forensic Communities
• There at least 3 distinct communities within
Digital Forensics
– Law Enforcement
– Military
– Business & Industry
• Possibly a 4th – Academia
Reasons for Digital forensic
analysis
Area
Primary
Objective
Secondary
Objective
Environment
Law
Enforcement
Prosecution
Business and
Industry
Availability
Prosecution
Real time
Military IW
or IO
Continuity
Prosecution
Real time
After the fact
Cybercrime
• Popularly presented as
– Hackers cracking web sites
– Criminals looking for
• Bank account numbers
• Credit card numbers
• Trade secrets
– For financial gain
– Top secret military information
Cybercrime
• The more mundane reality
– The adoption of technology has been taken up
by criminals too
• Accounting information
• Client information
• etc
– Criminals include
•
•
•
•
Drug distributors
Prostitution rings
Illegal gambling
and many others
Cybercrime
• Computers can be used
– As a repository for information
– As a tool for committing a crime
– As a tool for organising crime
• Networked PC (LAN or modem)
– Information could be stored remotely
– Criminal activity can be committed anywhere in the world
(Stoll, 1991)
• Difficult to investigate
• Attractive to those who want to be remote from the
crime scene
Case Studies
• Enron
– The Andersen partner in charge of the Enron account
allegedly ordered 1000s of e-mail messages deleted from
staff computers
– Computer forensics specialists were called in to retrieve
e-mail messages from:
•
•
•
•
•
•
Servers
Backup tapes
Hard drives
Disk caches
E-mail archives (Lotus Notes was used)
File slack
– 1 in 10 people throw nothing away
– The receivers can also be targeted
Case Studies
• A client suspected possible Internet
misuse.
• Covert examination of more than 60
machines uncovered a trail of misuse
• One employee was successfully
convicted on child pornography charges
• A number of disciplinary cases for
downloading pornographic images were
also made
Case Studies
• Examination of an employee’s
computer revealed they had been
downloading client information in
order to start a rival business
• Savings in the region of US $ 10
million as a result of two days’
investigation
Case Studies
• An insurance company contested a
claim for £100,000 for loss of all
data from a company’s central
computer
• The computer was allegedly
flattened by a large industrial magnet
• Extensive damage was made to the
casing and mother board
• Hard disk when examined was
undamaged and all data was
recovered
Case Studies
• A large corporation had paid a
considerable sum for a state of the art
computer running on a mirrored RAID
array
• They could not get the system to work
and the supplier refused to help
• Investigation revealed that no operating
system files were present on the hard disk
and what had been delivered would never
work
Computer Forensics
What kind of questions can computer evidence help to
answer?
•
•
•
•
•
•
•
•
•
Where were you at 4 pm on the 6th July 1999?
Did anyone tamper with this file? Who could it have been?
Is this software on the suspect’s computer stolen?
Has this suspect been downloading files with illegal content,
e.g. pornography?
Have you been attempting to hack into the website of the
National Security Agency?
Did you intentionally introduce a computer virus into this
network?
Have you been wasting time playing games at work?
Did you threaten this colleague using email messages?
Are you involved in this well-known drug money laundering
gang?
Computer Forensics
Besides criminal cases, where is computer forensic analysis
used?
• insurance investigations
• “whistle-blowers”
• commercial transactions
• disputed contracts
• Lawsuits
• Customs
• Tax Office
• any disputed event...
Computer Evidence
So where do you get “computer
evidence”?
•
•
•
•
•
•
•
•
•
•
•
local diskettes, hard disk
temporary storage, system files
paper
snoop it off the network
sniff it off the victim’s computer
daily audit and activity logs
housekeeping files
Windows cache files
deleted files
file slack - wasted space on the disk
“shadow files” and many more...
Search and Seizure
How police carry out “search and seizure” of
computer evidence
• Isolate the device from any network (pull the
plug)
• Connect a streaming device
• Create a secure tamper-proof copy of the entire
drive, e.g. a CD
• All evidence will be produced from the copy,
not from the suspect’s disks
Evidence
• We need to know:
– Where the evidence is
– What the evidence means
– How to put it together
Aim in collecting evidence
• Collect and analyse evidence to form one or more
chronological sequences of events that fit the
evidence
– There may be more than one!
• Can’t always be conclusive as system/network
evidence is circumstantial in nature
• It is a feedback loop
– Analysis leads to more evidence which feeds
analysis…
Sources of Evidence
• Three basic sources:
– Users
– Systems (including backups)
– Networks/communications
• Basically we rely on logs and remnants
recovered from a compromised system
Sources of Evidence
• Users
– First hand observations
• Systems
– Log files!
– Intruder remnants (processes, files etc)
• Networks/communications
–
–
–
–
Network Logs
Firewall logs
Modem banks/telephone logs
Network transaction auditing
Chain Of Custody
• Who has had access to the evidence?
• What procedures did they follow in working
with the evidence?
• How can we show that our analysis is based on
copies that are identical to the original evidence?
• Answer: documentation, checksums, timestamps
Evidence Preservation
• Make a copy
– Generate checksums of original, copy
– Verify accuracy of copy through checksum
• Document
– Who collected it from where, how, when, maybe
why
• Give a copy (or the original) to the
custodian
– Custodian gives copies to others
– Document chain of custody
– Fewer custodians is better – fewer to testify that
way
Collect Volatile Evidence
• “Volatile evidence” is evidence that will
disappear soon, such as information about active
network connections, or the current contents of
volatile memory.
• Contrast this with the contents of a disk or tape.
Collect Volatile Evidence
• From Farmer & Venema –
http://www.porcupine.org
–
–
–
–
–
–
Registers, peripheral memory, caches...
Memory (virtual, physical)
Network state
Running processes
Disks, floppies, tapes
CD/ROM, printouts.
Document
The Scene
Collect
Volatiles?
NO
NO
Record
Volatiles
YES
Power
Off
What Was
The point?

YES
Image
Drives?
Being Safe?
NO
Investigate
online, run
“last”, etc.
YES
Make
Images
Back @ lab, Analyse
Copies, Reconstruct
Computers, Analyse
“artifacts”
Challenges
Eric Holder, Deputy Attorney General of the United
States Subcommittee on Crime of the House
Committee on the Judiciary and the
Subcommittee on Criminal Oversight of the
Senate Committee on the Judiciary:
• Technical challenges that hinder law
enforcement’s ability to find and prosecute
criminals operating online;
• Legal challenges resulting from laws and legal
tools needed to investigate cybercrime lagging
behind technological, structural, social changes;
• and resource challenges to ensure we have
satisfied critical investigative and prosecutorial
needs at all levels of government.
Challenges
NIJ 2001 Study
• There is near-term window of opportunity for
law enforcement to gain a foothold in containing
electronic crimes.
• Most State and local law enforcement agencies
report that they lack adequate training,
equipment and staff to meet their present and
future needs to combat electronic crime.
• Greater awareness of electronic crime should be
promoted for all stakeholders, including
prosecutors, judges, academia, industry, and the
general public.
General Challenges
• Computer forensics is in its infancy
• Different from other forensic sciences as the
media that is examined and the tools/techniques
for the examiner are products of a market-driven
private sector .
• No real basic theoretical background upon which
to conduct empirical hypothesis testing
• No true professional designations
• Proper training lacking ****
• At least 3 different “communities” with different
demands
• Still more of an art than a true science
Specific Challenges
•
•
•
•
No International Definitions of Computer Crime
No International agreements on extraditions
Multitude of OS platforms and file systems
Incredibly large storage capacity needed
– Terabytes of data
Specific Challenges
• Small footprint storage devices
– Compact flash
– Memory sticks
– Thumb drives
•
•
•
•
•
Networked environments
RAID systems
Grid computing
Embedded processors
??
Specific Challenges
• Where is the “crime scene?”
• What constitutes evidence??
• What are we looking for??