24
COMPUTER FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

Embed Size (px)

Citation preview

Page 1: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

COMPUTER FORENSICS

THIS IS NOT “CSI COLORADO SPRINGS”

Frank Gearhart, ISSA Colorado Springs

Page 2: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

TECHNOLOGY + INVESTIGATION + STORYTELLING

• Know the case

• Find the evidence

• Follow the facts

• Create the timeline

• Tell the story

2

Page 3: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

GUIDELINES FOR FORENSIC INVESTIGATORS

• No national standards or licensing

• Can be a forensic examiner, a factual witness, an expert consultant, or an expert witness

• Professional organizations: • Digital Forensics Association • High Technology Crime Investigation Association

3

Page 4: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

TYPES OF DIGITAL FORENSICS CASES

• Corporate: HR violations, fraud, insider threat

• Civil: divorce proceedings, wrongful termination

• Criminal: identity theft, fraud, murder

4

Page 5: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

5

• Know what you are allowed to look for and look at

• Document everything: use photos, notes, labels, evidence bags, etc.

• Use forensically sound tools and documented procedures

• Protect the evidence

• Follow the facts

• Tell the story

GUIDELINES FOR FORENSIC INVESTIGATION

Page 6: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

WORKING WITH FILE SYSTEMS

BOOT PROCESS

FILE SYSTEMS: • Partitions, slack space, etc. • FAT32, NTFS, EXT3

DIRECTORY STRUCTURES:

• Desktops & laptops

• Mobile devices

6

Page 7: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

WORKING WITH EMAIL

Finding & understanding headers

Server logs

Cloud-based vs. server-based email

7

Page 8: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

THE DIGITAL FORENSICS LAB

• Physical security

• Storage of evidence (chain of custody)

• Forensically secure hardware and software

• Sufficiently powerful hardware

• Adequate short & long-term storage

• Audits and positive control

8

Page 9: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

LOGICAL AND PHYSICAL DATA RECOVERY

Consistency checking and zero-knowledge analysis.

Swap parts: circuit board; read/write heads; move disk platters to new, identical drive.

9

Page 10: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

FORENSICS TOOLS

10

• EnCase

• Forensics Toolkit

• OS Forensics

• Kali Linux

• Paraben Email Examiner

• Write blockers

• Hex editors

• Mobile device tools

• Cloud access tools

• Steganography tools

• Free forensics software list: ForensicControl.com

Page 11: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

WORKING WITH LAWYERS

• Educate them on the capabilities and limitations of digital forensics

• Understand the scope of the investigation

• Don’t talk about a specific case without a signed contract

• Minimize written communications to your lawyer (discovery motions)

• Get paid before you testify

• Your loyalty is to the facts

11

Page 12: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

TESTIFYING

• Speak to the jury

• Use visual aids where necessary

• Use everyday language & explain any tech-speak

• Stay within your area of expertise and within the scope of your investigation

• Don’t get rattled

• Opposing counsel is the enemy

12

Page 13: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

THE DAUBERT STANDARD

FOR A FORENSIC PROCESS OR TECHNIQUE TO BE ACCEPTED BY A COURT:

1. It must be generally accepted by relevant experts in the scientific community.

2. It must be published and peer reviewed.

3. It must be testable and tested.

4. Its known or potential error rate is acceptable.

5. It must have been researched independent of the current litigation or testimony.

13

Page 14: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

FEDERAL RULES OF EVIDENCE NO. 702: TESTIMONY BY EXPERT WITNESSES

A witness who is qualified as an expert by knowledge, skill, experience, training, or education may testify in the form of an opinion or otherwise if:

A. The expert’s scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or determine a fact in issue;

B. The testimony is based on sufficient facts or data;

C. The testimony is the product of reliable principles and methods; and

D. The expert has reliably applied the principles and methods to the facts of the case.

14

Page 15: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

IMPACT OF NEW TECHNOLOGIES

CLOUD SERVICES

15

MOBILE COMPUTING

INTERNET OF THINGS

Page 16: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

CLOUD

Multiple jurisdictions

Multiple cloud service providers

Multiple legal & corporate layers

Varying levels of forensic expertise

Forensic soundness of evidence

16

Page 17: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

MOBILE COMPUTING

Rapid changes in operating systems and apps

Relatively few mobile device-capable forensics tools

Whole device encryption

Can provide useful evidence: • Location • Logs • Automatic backups

17

Page 18: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

INTERNET OF THINGS

Billions of devices

Inconsistent standards

Proprietary data formats

Few legal precedents

Few IoT forensics tools

18

Page 19: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

THE CASE OF THE TELLTALE PACEMAKER

Arson & insurance fraud

Data extracted from pacemaker: • Heart rate • Pacer demand • Cardiac rhythms

Story vs. data

19

Page 20: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

DENNIS RADER - THE BTK KILLER

• At least 10 killings between 1974 & 1991 around Wichita, KS

• Resurfaced in 2004 & asked if communication with police via floppy was safe - “Rex, it’ll be okay.”

• Deleted documents & metadata found on floppy sent to police.

20

Page 21: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

FITBIT TELLS THE TALE - RICHARD DABATE

Story: Armed intruder broke into home, tied up husband, and killed wife when she returned from gym. But…

• Distance recorded on wife’s FitBit

• FaceBook postings from wife’s account after her alleged death

21

Page 22: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

DATA TELLS THE TALE - RICHARD DABATE~8:30 ~9:00

8:04 9:23

22

Connie leaves for gym, Richard leaves for work.

Richard returns home to retrieve work laptop & is tied to chair by

intruder.

~9:20

Connie returns home, is killed by intruder in basement. (~125 feet

from garage to basement.)

~10:15

Richard escapes & struggles with intruder, who runs away.

Richard calls 911, reports Connie killed ~1 hour ago by intruder.

Richard sends email to work from home

IP address.

Connie’s FitBit shows activity at

same time kitchen door to garage is

opened.

9:40-9:46

Connie’s FaceBook page updated from

her iPhone using home IP

address.

10:11

Richard hits panic button on

home alarm system & calls

911.

10:05

Connie’s FitBit stops showing

movement.

9:189:18 to 10:05: 1,217 feet recorded on Connie’s FitBit.

22

Page 23: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

SUMMARY

• Follow the facts

• Know your tools

• Know the law

• Understand the case

• Protect your reputation

23

Page 24: COMPUTER FORENSICS - ISSA-COS FORENSICS THIS IS NOT “CSI COLORADO SPRINGS” Frank Gearhart, ISSA Colorado Springs

ORGANIZATIONS:

• Digital Forensics Research WorkShop (http://www.dfrws.org//)

• Digital Forensics Association (http://www.digitalforensicsassociation.org/)

• Association of Digital Forensics, Security, and Law (http://www.adfsl.org/)

• American Society of Digital Forensics & E-Discovery (https://asdfed.com//)

EDUCATION & TRAINING: • University of Maryland - M.S. in Digital Forensics and Cyber Investigation

• SUNY Business School - B.S. in Digital Forensics

• SANS - Digital Forensics & Incident Response

24

CONTACT INFORMATION: [email protected]

RESOURCES