Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.

Similar presentations


Presentation on theme: "Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics."— Presentation transcript:

1

2 Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics Charleston, SC / Long Island, NY (866) 301-5331 * www.AbramsForensics.com SCALI Annual Seminar May 8, 2004

3 What is Computer Forensics ? The search for, and the collection of, evidence from computer systems in a standardized and well- documented manner to maintain its admissibility and probative value in a legal proceeding.

4 Computer Forensics is not “ Hacking ” Never use “ Spy-ware ” Never “ hack ” a password Never login to an account unauthorized ( without a warrant or court order ) Keystroke loggers no longer legal All of these violations are now (usually) a felony.The law is in flux, beware! All of these violations are now (usually) a felony. The law is in flux, beware!

5 Computer Forensics is not “ Hacking ” Stick to the evidence left on the hard drive, and you should be on safe legal ground. Provided you have proper consent to search the hard drive.

6 C omponent S teps of C omputer F orensics 1. Make a Forensic Image 2. Create Indexes and setup “ case ” 3. Look for evidence within the image 4. Generate Report (CD-ROM / Written)

7 C omponent S teps of C omputer F orensics Make a Forensic Image  Requires Extensive Knowledge of Computer Hardware and Software, Especially Operating Systems and File Systems.  Requires Special “ Forensics ” Hardware and Software  Requires Knowledge of Proper Evidence Handling.  In Most States Requires a P.I. License, and Consent to Search the Computer.

8 ConsentConsent Who Can Consent to a Search (Spouse, Parent, Business Owner) Get it in Writing (Boilerplate Affidavits)

9 STATE OF SOUTH CAROLINA ) ) COUNTY OF _______________ ) Affidavit of _______________________ Consent given to search a personal computer. PERSONALLY appeared before me the undersigned who duly sworn and says as follows: 1. My Name is _______________________________________. I reside at _____________________________________________________ 2. I have hired Steven M. Abrams, M.S., P.I., to conduct a computer forensics examination of a hard drive from a personal computer, which is in my possession. 3. I have consented to a search by Mr. Abrams of all data contained on the hard drive. 4. I attest that the computer hard drive which I have consented to have searched is marital property; to which I have had unfettered access. 5. I acknowledge that I have been informed that state and federal law requires Mr. Abrams to notify law enforcement authorities of any suspected child pornography or evidence of criminal activity found on a computer during his examination.

10 C omponent S teps of C omputer F orensics Make a Forensic Image Rule #1 – Never Alter the Evidence Media in the Process of making a Forensic Image. This necessitates special hardware and software.

11 C omponent S teps of C omputer F orensics Create Indexes and setup “ case ” Access Data Forensic Toolkit (FTK) dtSearch Engine Based on the dtSearch Engine, requires an index step which can take several hours or days to complete. After which keyword / expression searches are instantaneous.

12 C omponent S teps of C omputer F orensics Create Indexes and setup “ case ” Access Data Forensic Toolkit (FTK)  Implements “ Hashing ” which allows standard system software and duplicate files to be safely ignored, and dangerous files (e.g. Child Porn) to be identified automatically.  FTK Hashing is Based on the Known File Filter (KFF) Engine.

13 HashingHashing A hash value (or simply hash ), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. In Computer Forensics, hashes are used to uniquely identify a specific file. The hash value generated from a file becomes its “ digital fingerprint ”. MD5 and SHA are the two most common hash algorithms used in computer forensics.

14 HashingHashing Hash codes can be used to quickly match files found during your investigations to lists of “ Known Files ” maintained by the Federal Government and Federal Law Enforcement Agencies. These “ Known Files ” can include innocent files, such as components of MS Windows and “ off the shelf ” application software, that can safely be ignored by your investigations. These “ Known Files ” can also include contraband files, such as child pornography and hacker tools, that should be highlighted by your investigations.

15 C omponent S teps of C omputer F orensics Look for evidence within the image  View Graphics, Emails, Documents, etc.  Keyword Searches  Bookmark relevant material for inclusion into report  Good investigation skills needed, must interview the client to get background material needed to focus the CF investigation.

16 C omponent S teps of C omputer F orensics Generate CF Report  Usually in HTML format  Can be printed or on CD-ROM  Basis for Investigation Report, Affidavits, Deposition and Testimony.  CF Report often supplemented with other investigation methods (Online Databases, Email / Phone Interviews)

17 Live FTK Demo Demonstrate Steps of a Computer Forensics Examination

18 Case Histories

19 Case Histories Domestic Relations

20 Pornography Adultery Financial Assets

21 Case Histories Wiretap / E.C.P.A.

22 Case Histories Financial Crimes


Download ppt "Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics."

Similar presentations


Ads by Google