Title | Digital Forensics Intro |
---|---|
Author | Alan Cieślar |
Course | Forensic IT |
Institution | De Montfort University |
Pages | 9 |
File Size | 600.5 KB |
File Type | |
Total Downloads | 68 |
Total Views | 137 |
Introduction into digital forensics and potential applications/cases...
Digital Forensics Useful book to read – Guide to Computer Forensic Investigation; by Bill Nelson, Amelia Phillips, and Christopher Stuart; 4th Edition,;2010 Digital Forensics is “The use of scientifically proven methods to reconstruct past events that assist in criminal investigations by identifying relevant digital evidence.” (Carrier, 2003). – It involves obtaining and analysing digital information for use as evidence in civil, criminal, or discrimination cases – Nature of digital evidence is fragile – It is circumstantial, i.e. requires inference(s) to reach to a logical conclusion(s) – Digital Evidence includes hard disks/drives, mobile devices, CCTV etc. The principles of digital investigation No action (taken by digital investigators) should change data which may subsequently be relied upon in court In circumstances where a person finds it necessary to access original data, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions An audit trail or other record of all processes applied to digital evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to Digital investigations and evidence The focus of a digital investigation is usually some type of digital device that has been involved in an incident or a crime. The digital device was either used to commit a physical crime: E.g. Suspect used the Internet to conduct research about a physical crime The digital device was tangential to the crime: Logs from smart fridge disproving suspect’s alibi
1
The digital device executed an event that violated a policy or law: Attacker gains unauthorized access to a computer User downloads contraband material User sends a threatening email or SMS
When a violation is detected, a digital investigation is started to answer questions such as why the violation occurred etc. Digital investigation is a process where we develop and test hypotheses that answer the questions about digital events This is done using a scientific method where we develop a hypothesis using the evidence that we find We then test the hypothesis by looking for additional evidence that shows the hypothesis is impossible Phases of Investigation Identification, Preservation, Analysis and Presentation Identification Identification is to locate the likely sources of evidence and seize them •
Look for any piece of equipment that can store evidence related to the crime being investigated
•
Collect peripheral hardware that may need examining by digital evidence examiner e.g., printers, scanners, etc.
•
Software: Installation disks
•
Removable media: Look for backups on-site or remote storage facilities. Keep in mind criminals often hide removable media containing incriminating information
•
Documentation related to hardware, software, and removable media
•
Passwords and important phone numbers on or near the computer. Passwords and other useful information may also be obtained through interviews with people involved
•
Trawl garbage for printouts and other evidence related to the computer
•
Photograph evidence in situ, paying attention to serial numbers and wiring to help identify equipment and aid reconstruction. Vivid documentation showing evidence in its original state can be useful for reconstruction of a crime and demonstrating that evidence is authentic. 2
•
Consider removing casing and photographing internal components including closeups of jumper settings and other details
•
Note or photograph the contents of the computer screen.
•
If a program is running that might be destroying data, immediately disconnect power by pulling the cable
•
If a system is on, a judgement must be made as to whether to gather information from the system. Use trusted utilities such as statically compiled executables on a CDROM. Any actions performed on the system must be clearly documented to enable others assess the impact this process had on the system
Preservation Preservation is to preserve the state of the digital crime scene. •
Actions that are taken in this phase vary depending on the legal, business, or operational requirements,
•
The purpose is to reduce the amount of evidence that may be overwritten,
•
This process continues after data acquisition from the system because we need to preserve data for future analysis,
•
Since the goal of this phase is to reduce the amount of evidence that is overwritten, we want to limit the number of processes that can write to the storage devices,
•
For a static acquisition we will terminate all processes by turning the system off and make duplicate copies of all the data.
•
Write blockers can prevent evidence from being overwritten
•
For a live acquisition important data should be copied from the system in case it is overwritten while searching for evidence
•
For example, if you are going to be reading files, then you can save the temporal data for each file so that you have a copy of the last access times before you cause them to be updated
•
When important data are saved during a static or live acquisition, a cryptographic hash (MD5, SHA-1, and SHA-256) should be calculated to later show that the data have not been changed
General preservation guidelines: •
Duplication: Copy important data, put the original in a safe place, and analyze the copy so that you can restore the original if the data is modified, 3
•
Calculate MD5 or SHA hashes of important data so that you can later prove that the data has not been changed,
•
Use a write-blocking device during procedures that could write to the suspect data. Minimize the number of files created during a live analysis because they could overwrite evidence in unallocated space,
•
Be careful when opening files on the suspect system during a live analysis because you could be modifying data, such as the last access time.
•
Label, date, initial all evidence
•
Where possible, copy of digital evidence should be preserved on WORM (Write once read many) storage media suitable for long term storage such as CD
•
Store in sealed envelopes and secure in an evidence room or safe
•
Ensure that the chain of custody is maintained throughout
Chain of custody- answer to the following questions: •
Where, when, how, and by whom was the evidence discovered and collected?
•
Where, when, and by whom was the evidence handled or examined?
•
Who had custody of the evidence, during what period. How was it stored?
•
When the evidence changed custody, when, and how did the transfer occur (include shipping numbers, etc.).
Analysis According to EC-council there are four ways a digital forensics investigator can analyse the evidence: •
Time frame analysis: Determines what file activity occurred on the computer during a particular time and examines various system log files to correlate file system activities with other activities,
•
Data-hiding analysis: Looks for ways that information may be hidden either within the file system or in portion of the disk that are normally inaccessible to standard file system access,
•
Application and file analysis: Look at the contents of files, map files to applications, and maps application activity to file creation and deletion -> e.g., mapping email messages to file attachments.
4
•
Ownership and possession analysis: Can help identify activities tied to a particular login account, such as file deletion, modification, or attempts to change the owner of a particular file
Note: These activities are not mutually exclusive. Each type of analysis will probably be performed during an investigation Physical vs. Logical analysis •
Physical analysis looks at actual disk blocks,
•
Physical analysis can produce information that is not accessible via logical analysis,
•
You can perform keyword searches across physical disk blocks,
•
Extract files from disk using a technique called ‘file carving’,
•
Retrieve free space on the disk
•
Logical analysis examines the data via the file system that has been created on the disk,
•
Logical analysis is useful for retrieving information like filenames and sizes, file types, and other metadata stored concerning the state of the file system (file slack space, unallocated space, etc.)
Presentation Once analysis is completed you will need to write a report •
The final investigative report will be a complete report that is based on all the evidence that has been collected and analysed.
•
You will base your final report on the documentation that you created at each step of the process,
•
Make sure to document each step in your analysis and results, time and date stamping each entry in your log. An entry might look like the following:
27/7/2016 3:00 PM BST. Performed a keyword search on the contents of USB drive ZZZ. Discovered the name of a primary client of QQQ company. Further investigation discovered that the name was in a deleted file labelled thoughts.txt. Contents of the file appear to be a letter to the head of sales of QQQ, introducing the suspect and making an offer to the head of sales concerning supplying contract details for other clients of company QQQ. Analysis of the mail log files indicated that this file was included as an attachment e-mailed to the head of sales five minutes prior to file deletion.
5
Your report must provide a systematic, thorough, and unbiased presentation of your findings.
The structure must be clear and logical Content: Should relate to the issues in the case, Provide evidence of the facts, State the source of the evidence,
The report must be understood by the court. Know your audience. Preparing the scene
Review facts, plans, and objectives with the investigation team you have assembled Slow response can cause digital evidence to be lost Goals Preserve the evidence Keep information confidential Define a secure perimeter Use barrier tape Legal authority Professional curiosity can destroy evidence Involves police officers and other professionals who are not part of the crime scene processing team – Keep them out/controlled
Evidence you acquire depends on the case - Ask: •
Do you need the entire computer and all peripherals and media in the immediate area?
•
How are you protecting the evidence transporting them to your lab?
•
Is the computer powered on when you arrive?
•
Is the suspect you are investigating in the immediate area of the computer?
•
Is it possible the suspect damaged or destroyed anything?
•
Will you have to separate the suspect from the computer?
6
7
8
Summary – In Digital Investigation the process is key. – Four phases: Identification, preservation, analysis, reporting. – All sources of potential evidence should be identified and processed accordingly. – Preserve evidence by making forensic duplicates and working from the duplicates. – The final report must be understandable by your target audience.
9...