Solving Computer Crime: An Introduction to Digital Forensics Golden G. Richard III, Ph.D. Dept. of Computer Science Gulf Coast Computer Forensics Laboratory.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
Computer Forensics.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Effective Discovery Techniques In Computer Crime Cases.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Guide to Computer Forensics and Investigations Fourth Edition
File Management Systems
Guide to Computer Forensics and Investigations Fourth Edition
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Technology for Computer Forensics by Alicia Castro.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Operating System & Application Files BACS 371 Computer Forensics.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
COEN 252 Computer Forensics
OS and Application Files BACS 371 Computer Forensics.
Capturing Computer Evidence Extracting Information.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Introduction to Computer Forensics and Hashing 1.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Text2PTO: Modernizing Patent Application Filing A Proposal for Submitting Text Applications to the USPTO.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Creighton Barrett Dalhousie University Archives
Computer Forensics 1 1.
Computer Forensics Discovery and recovery of digital evidence
URL: CS 491 -Digital Forensics URL:
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Exam Information CSI5107 Network Security.
COMP1321 Digital Infrastructures
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Presentation transcript:

Solving Computer Crime: An Introduction to Digital Forensics Golden G. Richard III, Ph.D. Dept. of Computer Science Gulf Coast Computer Forensics Laboratory (GCCFL)‏

Digital Forensics Definition: “Tools and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices.” Devices include computers, PDAs, cellular phones, videogame consoles…

Examples of Digital Evidence Computers increasingly involved in criminal and corporate investigations Digital evidence may play a supporting role or be the “smoking gun” –Harassment or threats –Blackmail –Illegal transmission of internal corporate documents Meeting points/times for drug deals Suicide letters Technical data for bomb making Image or digital video files (esp., child pornography)‏ Evidence of inappropriate use of computer resources or attacks –Use of a machine as a spam generator –Use of a machine to distribute illegally copied software

Major Issues Identification of potential digital evidence –Where might the evidence be? Which devices did the suspect use? Preservation of evidence –On the crime scene… –First, stabilize evidence…prevent loss and contamination –If possible, make identical copies of evidence for examination Careful extraction and examination of evidence Presentation –“The FAT was fubared, but using a hex editor I changed the first byte of directory entry 13 from 0xEF to 0x08 to restore ‘HITLIST.DOC’…” –“The suspect attempted to hide the Microsoft Word document ‘HITLIST.DOC’ but I was able to recover it without tampering with the file contents.” Legal: Investigatory needs meet privacy

Preservation of Evidence: Hardly trivial… Living room Basement/closet wireless connection “Dear Susan, It’s not your fault… Just pull the plug? Move the mouse for a quick peek? Tripwires tick…tick…tick… Volatile computing

Preservation: Imaging When making copies of media to be investigated, must prevent accidental modification or destruction of evidence! Write blockers: Use them. Always. dd under Linux DOS boot floppies Proprietary imaging solutions Drivelock write blocker

Extraction and Examination Know where evidence can be found Understand techniques used to hide or “destroy” digital data Toolbox of techniques to discover hidden data and recover “destroyed” data Cope with HUGE quantities of digital data… Ignore the irrelevant and target the relevant

Where’s the evidence? Undeleted files, expect some names to be incorrect Deleted files Windows registry Print spool files Hibernation files Temp files (all those.TMP files!)‏ Slack space Swap files Browser caches Alternate partitions On a variety of removable media (floppies, ZIP, Jazz, tapes, …)‏

Fallacy vs. Fact in Digital Forensics Many digital forensics tools and techniques are quite complex… Very difficult to cover in a short lecture To illustrate investigative procedures for digital forensics, a fact vs. fallacy approach Fallacy: User attempting to hide evidence believes one thing… Fact: But in fact… Look at a few fact vs. fallacy scenarios… Then, one more advanced topic

Fallacy: File was deleted, it’s gone! Users often mistake normal deletion of files for “secure” deletion Deleted files recoverable using forensics tools Why? Filesystem makes a small change in its bookkeeping info to mark a file as deleted Data associated with file is NOT erased Example: FAT32 (Windows), first character of filename is changed to 0xEF in directory entry to “delete” file Forensics software changes one character in directory entry, file reappears To prevent recovery, must perform secure overwrite of the file or physically destroy the media

Fallacy: I renamed the file, I’m safe! “childporn.jpg”  “winword.exe” Renaming files is an ineffective defense against digital forensics investigation Technique # 1: –Most file types (e.g., JPEG image) have a structure that can be recognized directly, regardless of the filename a user chooses –e.g., JPEG files contain 0x4a or 0x in the first block of the file Technique # 2: –Cryptographic hashing provides a mechanism for “fingerprinting” files –File contents is matched quickly, regardless of name –Hashes equivalent, file contents equivalent –Think: fingerprints don’t care about hair color…

Aside: Hashing Typical algorithms: SHA-1, MD5 Example: C:> md5sum golden.jpg b28f08b004a7251a418e089ef3bb7409 *golden.jpg C:> rename golden.jpg winword.exe C:> md5sum winword.exe b28f08b004a7251a418e089ef3bb7409 *winword.exe Can automate checking of hashes Huge dictionaries exist with hashes for known files: …and known child pornography files Can quickly disregard known files and target the interesting stuff

Fallacy: I format-ed the drive, whew! Formatting a drive does not prevent recovery of digital evidence In fact, format typically overwrites less than 1% of drive contents Why does it take so long? Format is reading disk blocks to determine if bad blocks exist Format wipes out directories, so names of files are lost A lot of the data can still be recovered by sifting through data that remains after the format operation For example, file carving tools reconstruct files by examining the initial and terminal bytes of the file See digital forensics Technique # 1 under file renaming fallacy

Fallacy: Media mutilation == Miller time! Example # 1: Cutting a floppy into pieces Example # 2: Opening a hard drive, removing the platters, throwing them into the trash Unless the damage is extreme, mutilation of magnetic media is insufficient to prevent recovery Media can be reassembled and partial recovery performed Even strong magnetic fields are insufficient… Older “military grade” degausser for erasing hard drives was so strong that it bent the platters inside the drive Your bulk tape eraser isn’t going to do the job To destroy data: multiple overwrites (software) or complete destruction of hardware

That’s One Big Degausser!

Fallacy: I used Web-based … Fallacy: Use of web-based rather than storing messages directly on a computer is safer (in terms of thwarting recovery attempts)‏ It’s not. Even if you never download the and immediately delete all messages on the server! Recently viewed web pages are stored in web browser’s cache Cache is often in a hard-to-find place… Internet Explorer  Tools  Internet Options  Delete Files clears the cache in IE See slide on recovery of deleted files for futility quotient Files stored in browser cache are not securely deleted when the cache is cleared Browser cache mining tools bring recently viewed web pages, including web-based messages, back to life in a flash

Recovery of web-based s

Fallacy: Application uninstalls are easy… Illegal application installed… Fear ensues… Application is uninstalled… (Am I safe?)‏ …application files can still be undeleted, proving application was installed Further steps to obscure installation: Securely overwrite application files Now am I safe? Nope. Remnants of installation can likely still be found in the Windows registry Basically, if a user installs software and wants to permanently eradicate any traces, must securely erase the entire drive or destroy the hardware

Fallacy: I encrypted my files… On encrypted file systems, if file is ever printed and spool directory isn’t encrypted, fragments may be left behind On some systems (e.g., Windows 2000), a “recovery agent” is able to read all encrypted files For Windows 2000, this is the administrator account, thus just need to break administrator password Problem: keys for truly secure encryption schemes are long Search for slips of paper Search for unencrypted password lists Search PDAs, phones, and organizers for passwords and encryption keys Software or hardware keystroke loggers Van Eck radiation If the file can’t be decrypted, the name of the file may still be useful in prosecution

Beowulf, Slayer of Poorly Chosen Passwords… How good are your passwords?

Steganography “Techniques for hiding information within other information” Historical –Tattoos –Text on wood under wax layer on a wax tablet –“Invisible” ink (e.g., writing with lemon juice)‏ Modern –Much more sophisticated –Employ powerful encryption techniques –Hide documents w/in an image, video, or audio file –Hidden documents can be harmless, or child pornography, bomb plans, …

Stego (2) ‏

Stego (3) ‏

Stego (4) ‏ Slipped inside the 2 nd cactus picture by “jphide”… Embedding in this case is not obvious (visually)…and image w/ embedded Golden is actually smaller (in bytes) than original Statistical analysis by “stegdetect” guesses correctly that something is hidden. But jphide uses Blowfish to scramble the order of embedded data, so successful extraction is very unlikely unless the password is known.

Core Igniter Stego (5) ‏ This “bomb” diagram, however, is not detected inside the cactus picture…

Bluepipe: On the Spot Digital Forensics

Legal Issues Investigative needs vs. the right to privacy Search warrant laws, e.g., Fourth Amendment to the U.S. Constitution Wiretap laws Chain of custody Admissibility of evidence in court: Daubert –Essentially: Has theory or technique in question been tested? Is error rate known? Widespread acceptance within a relevant scientific community? Patriot Act –Greatly expands governmental powers in terms of searching, wiretap w/o prior notification

The Other Side: Privacy We’ve concentrated on the cool technology, but… The existence of sophisticated digital forensics techniques is a great enabler for fascism Actively fight laws that don’t appropriately balance privacy with need for investigation Secure file deletion software Overwriting files with zeros is good enough unless a tunneling electron microscope is available… Volatile computing Physical destruction of media –Grind the media into powder –Vats of acid or molten steel

Resources Books –Digital Evidence and Computer Crime (E. Casey, Academic Press)‏ –Computer Forensics and Privacy (M. Caloyannides, Artech House)‏ Websites – Lots of references related to digital forensics, including a link to an interesting e-journal… (International Journal of Digital Evidence) – tons of stuff, including a bunch of online papers – Huge collection of forensics-related software Commercial digital forensics software –Encase –FTK (Forensics Tool Kit) –ILook (law enforcement only)‏ –WinHex

Presentation available: Office: Math 346 ?