Computer Forensics and Investigations
Computer Forensics and Investigations
Computer Forensics and Investigations
and Investigations
Dean R. Beal
CISA, CFE
What is Fraud?
Any illegal act characterized by deceit,
concealment or violation of trust.
Pressure
Financial or occupational
Rationalization
There is nothing wrong with it
Fraud
Fraud Basics: White-
White-Collar Crime Demographics, Employee Thieves: Who Commits The Most
Most
Fraud?,
Fraud?, http://www.acfe.com/resources/view.asp?ArticleID=502
Why Do People Commit Fraud?
Interviews with persons who committed fraud have shown
that most people do not originally set out to commit fraud.
Dave Coderre, author of The Fraud Toolkit; Fraud Detection: Using Data Analysis Techniques to
Detect Fraud
Fraud and CAATTs and Other BEASTs for Auditors
Auditors
10 - 80 - 10 Law
10% of people will never commit
fraud.
Dave Coderre, author of The Fraud Toolkit; Fraud Detection: Using Data Analysis Techniques to
Detect Fraud
Fraud and CAATTs and Other BEASTs for Auditors
Auditors
Goals of a Fraud Program
Prevention
Detection
Deterrence
The Institute of Internal Auditors (IIA),
International Professional Practices
Framework (IPPF)
Take Away
Opportunities
to Commit Fraud
Prevent
Detection
Tips
Hotline Calls
Risk Assessments
Audits
Continuous
Auditing/Monitoring
Detection
Reality = Reactive
Goal = Proactive
Assessing the Allegation
Management Receives
Management Reviews
Management Assigns
Guidelines
Should exist within department for
outlining steps taken for performing a
forensics investigation
Planning and Starting
the Investigation
Objectivity Concerns
Timing Issues
Game Planning
Keywords
Equipment Needs
Interviews
Computer Forensics
The main goal of computer forensics is
to identify, collect, preserve, and
analyze data in a way that preserves
the integrity of the evidence collected
so it can be used effectively in a legal
case.
Harlan Carvey, WINDOWS FORENSICS ANALYSIS (Burlington, MA: Syngress, 2009), 4,5.
Locards Exchange Principle
If you watch the popular CSI crime
show on TV, youll hear one of the
crime scene investigators refer to
possible transfer.
Harlan Carvey, WINDOWS FORENSICS ANALYSIS (Burlington, MA: Syngress, 2009), 4,5.
Locards Exchange Principle
When we interact with a live system,
whether as the user or as the
investigator, changes will occur on
that system.
ProDiscover
Data Storage
PC Tool Kit
Bit Stream Image
A bit stream image is an
exact duplicate of a
computers hard drive in
which the drive is copied
from one drive to another,
bit by bit.
Dave Kleiman, et al., The Official CHFI Study Guide for Computer Hacking Forensic Investigators
Investigators
(USA: Syngress, Elsevier, 2007), 9.
Bit Stream Image
Bit Means at the Binary Level
01000001 = A
01100001 = a
Everything is Copied
Deleted Files
Fragments of Files
Backup Copy
Backup software can only copy or
compress files that are stored in a
folder or share a known file type.
Bill Nelson, et al., Guide to Computer Forensics and Investigations (Canada: Course Technology,
Thompson Learning, 2004), 50.
Acquiring the Forensics Image
Network
Snapshot
Physical
Static
CIA Triad
Confidentiality
Integrity
Availability
Ed Tittel, et al., CISSP, Certified Information Systems Security Professional, Study Guide (USA:
SYBEX, 2003), 3.
ProDiscover Remote Agent
Can connect to any computer on the
network.
By IP address
By computer name
Install remote agent executable.
Captures image of hard drive over the
network.
Runs in the background as a Service.
User does not know they are being
imaged.
Write Blockers
http://www.forensicpc.com/products.asp?cat=38
Write Blockers
Reads
Reads
Writes
Writes
Suspect
SuspectHard
Hard Hardware
Hardware Forensics
Forensics
ForensicsPC
Forensics PC
Drive
Drive Write
WriteBlocker
Blocker HardDrive
Hard Drive
FireWire
FireWire
or
or USB
USB
IDE/SATA
IDE/SATA USB
USB
FTK
KFF
Key Words
Bookmarks
Graphics
Deleted Files
Metadata
Processing the Forensics Image
Password Protected Files
Encrypted Files
File Slack
Windows Registry
index.dat
index.dat
Regular Expressions
Allows forensics analysts to search
through large quantities of text
information for patterns of data such
as the following:
Boolean Searches
or
and
not
*
?
%
&
Compiling Electronic Evidence
Secured Area
Can be Time Consuming
Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,
Computer Crime & Intellectual Property Section United States Department
Department of Justice,
Justice,
http://www.cybercrime.gov/ssmanual/05ssma.html#A
Rules of Electronic Evidence
Federal Rule of Evidence
901(b)(4) is helpful to
prosecutors who seek to
introduce electronic records
obtained from seized storage
media.
Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,
Computer Crime & Intellectual Property Section United States Department
Department of Justice,
Justice,
http://www.cybercrime.gov/ssmanual/05ssma.html#A
Rules of Electronic Evidence
A prosecutor introducing a hard drive
seized from a defendant's home and
data from that hard drive may employ
a two-step process.
Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,
Computer Crime & Intellectual Property Section United States Department
Department of Justice,
Justice,
http://www.cybercrime.gov/ssmanual/05ssma.html#A
Chain of Custody
A chain of custody is the accurate documentation of
the movement and possession of a piece of evidence,
from the time it is taken into custody until it is
delivered to the court.
Dave Kleiman, et al., The Official CHFI Study Guide for Computer Hacking Forensic Investigators
Investigators
(USA: Syngress, Elsevier, 2007), 9.
Chain of Custody Form
Physical Evidence
Case Number
Investigating Organization
Investigator
Nature of Case
Location Where Evidence was Obtained
Evidence Recovered By
Date and Time
Description of Evidence
Vendor Name
Model Number
Serial Number
Location Where Evidence is Currently Stored
Evidence Processed by Item Number
Disposition of Evidence/Date/Time
Signatures
Bill Nelson, et al., Guide to Computer Forensics and Investigations (Canada: Course Technology,
Thompson Learning, 2004), 37- 37-39.
Chain of Custody Form
Image Evidence
Case Number
Investigating Organization
Investigator
Nature of Case
Image Type
Image Method
Date and Time
Description of Evidence
MD5 Hash Totals
Location Where Evidence is Currently Stored
Disposition of Evidence/Date/Time
Signatures
Rules of Electronic Evidence
Second, prosecutors may consider using the "hash
value" or similar forensic identifier assigned to the
data on the drive to authenticate a copy of that
data as a forensically sound copy of the previously
admitted hard drive.
Searching & Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,
Computer Crime & Intellectual Property Section United States Department
Department of Justice,
Justice,
http://www.cybercrime.gov/ssmanual/05ssma.html#A
Hash Values
Hashes use cryptographic algorithms to
create a message digest of the data and
represent it as a relatively small piece of
data.
The hash can be used to compare a hash of
the original data to the forensic copy.
When the hashes match, it is accepted as
proof that the data is an exact copy.
Dave Kleiman, et al., The Official CHFI Study Guide for Computer Hacking Forensic Investigators
Investigators
(USA: Syngress, Elsevier, 2007), 10.
Hash Values
Original MD5 Hash Value:
6f8e3290e1d4c2043b26552a40e5e038
MD5 Hashes
Image Level
File Level
Metadata
NameValue
Title Computer Forensics and Investigations
Author Dean
Template Satellite Dish
LastAuthor Dean
Revision Number 335
Edit Time 6:41:06 PM
Created 2/6/2010 9:24:32 AM
Last Saved 2/14/2010 8:17:51
PMWord Count1675
AppName Microsoft Office PowerPoint
Other Electronic Evidence
Scope Creep
New Evidence Discovered
Personal or Private Property
Internet/Social Networking
Google Hacking
Other Concerns
Evidence Locker
Hard Drive Storage
Retention
Destruction
Wiping
Wiping
Email
Warning Banners
Real Time
Back-ups
FOCUS
QMF
Adabas
Cognos
Microsoft Access
SQL Server
Image: Louis Davidson, SQL Server 2000 Database Design (Birmingham, UK: Wrox, 2001), 131,331.
Data Analytics
Fixed Length
Variable Length
Delimited
Multiple Record
HL7
EDI
DBF
Image: Louis Davidson, SQL Server 2000 Database Design (Birmingham, UK: Wrox, 2001), 131,331.
Closing the Investigation
Criminal Violations
Corporate Risk and Liability
Policy Violations
Closing the Investigation
Report Preparation
Support the Allegation
data
Reactive is good, proactive is
better
Data Hiding
A sector is the smallest physical storage
unit on the disk.
http://www.ntfs.com/hard-disk-basics.htm#Hard
Data Hiding
http://explorerplusplus.com/blog/54-file-slack
Data Hiding
The Slacker tool is the first tool that allows you to hide
files within the slack space of the NTFS file system.
http://synfulpacket.blogspot.com/2008/11/metasploit-anti-forensics-project-mafia.html
Data Hiding
Data Hiding
Data Hiding
Data Hiding
Data Hiding
Data Hiding
Message in a Bottle #1 Message in a Bottle #2
http://www.dfinews.com/articles.php?pid=865
Whats Ahead
The Cloud
December 15, 2009
http://www.darkreading.com/blog/archives/2009/10/the_future_of_d.html
http://www.darkreading.com/blog/archives/2009/10/the_future_of_d.html
Whats Ahead
The Crime Scene Evidence Youre Ignoring
October 2009
http://www.officer.com/print/Law-
http://www.officer.com/print/Law-Enforcement-
Enforcement-Technology/The-
Technology/The-crime-
crime-scene-
scene-evidence-
evidence-youre-
youre-
ignoring/1$48858