Chap 3.2 ComputerForensics
Chap 3.2 ComputerForensics
Dr.K.Suresh Babu
Professor Of CSE
University College of Engineering Science & Technology
JNT University Hyderabad
Computer Crime
Computer crime is any criminal offense, activity or
issue that involves computers
(http://www.forensics.nl).
Computer misuse tends to fall into two categories:
Computer is used to commit a crime
Computer itself is a target of a crime.
Computer is the victim.
Computer is Used to
Commit a Crime
Computer is used in illegal activities: child
pornography, threatening letters, e-mail spam or
harassment, extortion, fraud and theft of
intellectual property, embezzlement – all these
crimes leave digital tracks.
Investigation into these types of crimes include
searching computers that are suspected of being
involved in illegal activities
Analysis of gigabytes of data looking for specific
keywords, examining log files to see what
happened at certain times
Computer Security Incident
Unauthorized or unlawful intrusions into
computing systems
Scanning a system - the systematic probing of
ports to see which ones are open
Denial–of–Service (DoS) attack - any attack
designed to disrupt the ability of authorized users to
access data.
Malicious Code – any program or procedure that
makes unauthorized modifications or triggers
unauthorized actions (virus, worm, Trojan horse)
Computer Forensics
Computer Forensic Analysis
Electronic Discovery
Electronic Evidence Discovery
Digital Discovery
Data Recovery
Data Discovery
Computer Analysis
Computer Examination
Definitions
Computer Forensics involves the preservation,
identification, extraction, documentation and
interpretation of computer data
Computer Forensics is the application of science and
engineering to the legal problem of digital evidence. It is a
synthesis of science and law.
Computer Forensics, still a rather new discipline in
computer security, focuses on finding digital evidence
after a computer security incident has occurred
(http://www.forensics.nl)
Definitions
Computer Forensics is the process of methodologically
examining computer media (hard discs, diskettes, tapes,
etc.) for evidence.
Computer Evidence is often transparently created by the
operating system (OS) without the knowledge of the
computer user. The information may be hidden from
view. To find it, special forensic software tools and
techniques are required.
Computer Forensics is about evidence from computers
that is sufficiently reliable to stand up in court and be
convincing
Methodology
Treat every case as if it will end up in the court
Forensics Methodology :
Acquire the evidence without altering or damaging
the origin
Authenticate that your recovered evidence is the
same as the originally seized data
Analyze the data without modifying it
There are essentially three phases for recovering evidence
from a computer system or storage medium. Those phases
are: (1) acquire, (2) analyze, and (3) report
(http://www.forensics.nl).
The Goal
The goal of computer
forensics is to do a structured
investigation and find out
exactly what happened on a
digital system, and who was
responsible for it.
(http://www.forensics.nl)
The Goals of Incident Response
Criminal Prosecutors
Rely on evidence obtained from a computer to prosecute
suspects and use as evidence
Civil Litigations
Personal and business data discovered on a computer can be
used in fraud, divorce, harassment, or discrimination cases
Insurance Companies
Evidence discovered on computer can be
used to mollify costs (fraud, worker’s
compensation, arson, etc)
Private Corporations
Obtained evidence from employee computers can
be used as evidence in harassment, fraud, and embezzlement
cases
Who Uses Computer Forensics? (cont)
Content
Comparison again known data
Transaction sequencing
Extraction of data
Recovering deleted data files
Format conversion
Keyword searching
Decrypting passwords
Analyzing and comparing limited source code
Steps Of Computer Forensics
Presentation
This step involves the presentation of evidence discovered in a
manner which is understood by lawyers, non-technically
staff/management, and suitable as evidence as determined by
United States and internal laws
Handling Evidence
Admissibility of Evidence
Legal rules which determine whether potential evidence can be
considered by a court
Must be obtained in a manner which ensures the authenticity and
validity and that no tampering had taken place
No possible evidence is damaged, destroyed, or
otherwise compromised by the procedures used to
search the computer
Preventing viruses from being introduced to a computer
during the analysis process
Extracted / relevant evidence is properly handled and
protected from later mechanical
or electromagnetic damage
Handling Evidence (cont)
Non-Volatile Information
This includes information, configuration settings, system files
and registry settings that are available after reboot
Accessed through drive mappings from system
This information should investigated and reviewed from a
backup copy
Computer Forensic Requirements
Hardware
Familiarity with all internal and external devices/components of a
computer
Thorough understanding of hard drives and settings
Understanding motherboards and the various chipsets used
Power connections
Memory
BIOS
Understanding how the BIOS works
Familiarity with the various settings and limitations of the BIOS
Computer Forensic Requirements (cont)
Operation Systems
Windows 3.1/95/98/ME/NT/2000/2003/XP
DOS
UNIX
LINUX
VAX/VMS
Software
Familiarity with most popular software packages
such as Office
Forensic Tools
Familiarity with computer forensic techniques and the software
packages that could be used
Anti-Forensics
Computer Forensics
Criminal Civil
Acquisition FRYE Federal Rules of Civil Procedure Expert Witness
Analysis FRE 702 Sedona Friend of the Court
Examination Daubert/Kumho Rowe Technical Expert
Report
49
Digital Forensic Science
• Digital Forensic Science (DFS):
50
Communities
There at least 3 distinct communities within
Digital Forensics
Law Enforcement
Military
Business & Industry
Possibly a 4th – Academia
51
Digital Forensic Science
52
Community Objectives
53
Cyber Forensics
• Includes:
• Networks (Network Forensics)
• Small Scale Digital Devices
• Storage Media (Computer forensics)
• Code Analysis
54
Cyber Forensics
The scientific examination and analysis of
digital evidence in such a way that the
information can be used as evidence in a
court of law.
55
Cyber Forensic Activities
57
Context of Cyber Forensics
•Homeland Security
•Information Security
•Corporate Espionage
•White Collar Crime
Digital Forensics
•Child Pornography
Cyber Forensics
•Traditional Crime
•Incident Response
•Employee Monitoring
•Privacy Issues
•????
58
Cyber Crime
1970’s
Legislation
LE Investigative
1980’s
Units
International LE
Meeting
1990’s
1st International
Conference on
CE
IOCE Formed
IOCE &
A Brief Timeline
SWGDE
RCFL in USA
2000
COE
Convention on
2001
Cyber Crime
DFRWS
ASCLD/LAB-
2003
DE USA
ISO 17025
Journals
Conferences
AAFS
2008
Subsection?
Crime Scenes
60
Digital Crime Scene
Digital Evidence
Digital data that establish that a crime has been
committed, can provide a link between a crime and
its victim, or can provide a link between a crime and
the perpetrator (Carrier & Spafford, 2003)
Digital Crime Scene
The electronic environment where digital evidence
can potentially exist (Rogers, 2005)
Primary & Secondary Digital Scene(s) as well
61
Forensic Principles
Digital/ Electronic evidence is extremely volatile!
Once the evidence is contaminated it cannot be de-
contaminated!
The courts acceptance is based on the best
evidence principle
With computer data, printouts or other output readable
by sight, and bit stream copies adhere to this principle.
Chain of Custody is crucial
62
Cyber Forensic Principles
The 6 Principles are:
1. When dealing with digital evidence, all of the general forensic and
procedural principles must be applied.
2. Upon seizing digital evidence, actions taken should not change that
evidence.
3. When it is necessary for a person to access original digital evidence,
that person should be trained for the purpose.
4. All activity relating to the seizure, access, storage or transfer of
digital evidence must be fully documented, preserved and available
for review.
5. An Individual is responsible for all actions taken with respect to digital
evidence whilst the digital evidence is in their possession.
6. Any agency, which is responsible for seizing, accessing, storing or
transferring digital evidence is responsible for compliance with these
principles.
63
Process/Phases
Identification
Collection
Bag & Tag
Preservation
Examination
Analysis
Presentation/Report
64
Identification
65
Devices Identification
66
Identification
67
Collection
68
69
Collection: Documentation
70
Collection: Documentation
71
Collection: Documentation
72
Collection: Imaging
Rule of Thumb: make 2 copies and don’t
work from the original (if possible)
A file copy does not recover all data areas
of the device for examination
Working from a duplicate image
Preserves the original evidence
Prevents inadvertent alteration of original
evidence during examination
Allows recreation of the duplicate image if
necessary
73
Collection: Imaging
Digital evidence can be duplicated with no
degradation from copy to copy
This is not the case with most other forms of
evidence
74
Collection: Imaging
Write blockers
Software
Hardware
Hardware write blockers are becoming the industry
standard
USB, SATA, IDE, SCSI, SIM, Memory Cards
Not BIOS dependent
But still verify prior to usage!
75
Collection: Imaging
Forensic Copies (Bitstream)
Bit for Bit copying captures all the data on the copied
media including hidden and residual data (e.g., slack
space, swap, residue, unused space, deleted files etc.)
Often the “smoking gun” is found in the residual
data.
Imaging from a disk (drive) to a file is becoming
the norm
Multiple cases stored on same media
No risk of data leakage from underlying media
Remember avoid working for original
Use a write blocker even when examining a copy!
76
Imaging: Authenticity & Integrity
77
Examination
Higher level look at the file system representation of the
data on the media
Verify integrity of image
MD5, SHA1 etc.
Recover deleted files & folders
Determine keyword list
What are you searching for
Determine time lines
What is the timezone setting of the suspect system
What time frame is of importance
Graphical representation is very useful
78
Examination
79
Issues
lack of certification for tools
Lack of standards
lack of certification for professionals
lack of understanding by Judiciary
lack of curriculum accreditation
Rapid changes in technology!
Immature Scientific Discipline
80
Careers
One of the fastest
growing job
markets!
81
Paths to Careers in CF
Certifications
Associate Degree
Bachelor Degree
Post Grad Certificate
Masters
Doctorate
82
Job Functions
CF Technician
CF Investigator
CF Analyst/Examiner (lab)
CF Lab Director
CF Scientist
83
Professional Opportunities
Law Enforcement
Private Sector
Intelligence Community
Military
Academia
84