computer evidence - ARMA International, Birmingham Chapter

advertisement
Digital Evidence
Alton Sizemore Jr.
Summerford Accountancy, PC
CYBER CRIME and
Civil Litigation
DIGITAL EVIDENCE
COLLECTION AND
ISSUES
Introduction


Speaker: Alton Sizemore Jr.
Qualifications
–
–
–
–
–
Univ. of Alabama BS in Accounting
CPA in Florida and Alabama
Certified Fraud Examiner
FBI Agent for 25 years (Retired)
Previously assigned to the Jacksonville,
Kansas City, Philadelphia Field Offices,
FBIHQ and Birmingham
– Summerford Accountancy, PC - Director of
Investigations
Professional Associations





American Institute of CPAs
Alabama Society of CPAs
Florida Institute of CPAs
Certified Fraud Examiners Assoc.
Professional Advisory Board
Culverhouse School of Accountancy
University of Alabama
Proper Seizure and
Collection of
Digital Evidence




What is Computer Crime
What is Digital Evidence
How do you properly seize and
collect digital evidence
But First………
ICE FISHING
What is Computer Crime
Computer Crime

Use of computers to commit crime, store illegal information
or data, or target critical infrastructures
– Obtaining information without authorization
– Obtaining classified information without
authorization
– Access to any non-public computer
– Access to a protected computer**
**Defined as a computer used by a
financial institution or the U.S.
Government.
TYPES OF CYBER CRIME
• Computer Intrusions
• Identity Theft
• Intellectual Property Right Matters
• Credit Card Fraud
• Child Pornography
• Online Extortion
• Growing Internationally Spawned Matters
Since 1996 . . . Trends Indicate?

Pending cases increased 130%

Informations and indictments increased 110%

Arrests UP 950%

Convictions increased 88%
* FBI Case Statistics
IFCC INTERNET
COMPLAINTS





2001
2002
2003
2004
2005
49,863
75,063
124,509
207,449
231,493
Internal
1999
Remote
Internet
57%
28%
1998
51%
54%
24%
1997
44%
35%
47%
52%
38%
39%
1996
0%
10%
20%
30%
40%
% of Respondents Reporting Attack
CSI/FBI 1999 Computer Crime and Security Survey
Source: Computer Security Institute
54%
50%
60%
2005 COMPUTER CRIME
AND SECURITY SURVEY






56% OF 693 RESPONDENTS DETECTED
SECURITY BREACHES IN THE LAST 12
MONTHS
693 RESPONDENTS REPORTED $130
MILLION IN LOSSES
TOP LOSS : VIRUS $43 MILLION
UNAUTHORIZED ACCESS $31 MILLION
THEFT OF PROPRIETARY INFO $31
MILLION
FINANCIAL FRAUD $3 MILLION
COST OF RECENT MAJOR
CYBER ATTACKS AND
INVESTIGATIONS

SLAMMER WORM : $945M - $1.2B
CODE RED : 2.6 BILLION
LOVE BUG : 10 BILLION

(ALL BASED ON WORLDWIDE ESTIMATES)


This is a Denial of Service
ATTACK …
Where do you start?
Computer Evidence

From a technical standpoint,
“computer evidence” is any data
recovered from a computer, piece of
digital media or other form of
“magnetized” media that store data
in electronic or binary format.
– Computer Evidence and Digital
Evidence are one and the same
Digital evidence:

is information of probative value
stored or transmitted in digital form
(*SWG-DE 7/14/98)*Scientific Working Group on Digital
Evidence
Digital Evidence is Latent



Invisible to the naked eye
Easily destroyed, altered, or
otherwise tainted
Can be processed only by specially
trained and equipped individuals
Criminal Use of Personal
Computers

Computers allow
criminals several
benefits that allow
them to avoid
detection
 Remoteness from
crime scene
 Anonymity
– Hiding your identity

Data encryption
Where Computer Evidence
May Be Located

Why is this important?
– Computers as the target of the crime

System intrusions
– Computers as the instruments of the crime


How was it used to commit the crime?
Solicitation of Minors, Harassment, Prescription
Fraud, Identity Theft, Counterfeiting
– Computers as the repository of the evidence


Does this hold the evidence needed?
Fraud, Embezzlement, Child Pornography, Homicide,
Bank Robbery
Computer Crimes








Email Extortion
Threats
On-line Child
Pornography
On-line Gambling
Offshore Money
Laundering Websites
Organized Crime
Cyber-Terrorism
Infrastructure Attacks
Hate Crimes








On-line
Threats/Stalking
On-line Narcotic Sales
Computer Component
Theft
Viruses/Worms
Telecommunication
Fraud
Chip Fraud
Counterfeiting
Securities Fraud
The computer can be the tool, target, or storage medium
Types of Cases - 2002
CR NIPC MISC
1%
1% 5%
NFIP
25%
DT
2%
VCMO
40%
OC
3%
NFIP – National Foreign Intelligence Program
DT – Domestic Terrorism
WCC – White Collar Crime
OC – Organized Crime
VCMO – Violent Crimes & Major Offenders
CR – Civil Rights
NIPC – National Infrastructure Protection Computer
MISC - Miscellaneous
WCC
23%
NFIP
DT
WCC
OC
VCMO
CR
NIPC
MISC
Files and Location of
Evidence

Files Generated by the Computer
– Swap Files
– Internet History Files
– Cookie Files
– Log Files
– Print Spool Files
– Temporary Files
Files and Location of
Evidence

Secured and Hidden Files
– Encrypted Files
– Compressed Files
– Password Protected
– “Hidden” Files
– Steganography
– Files with Changed File Extension
Files and Location of
Evidence

Other Locations of Evidence
– Windows Registry
– Deleted Files
– Hidden Partitions
– RAM Slack & Disk Slack
– Enhanced Metafiles
– Bad and Lost Clusters
– Unallocated Space
Hardware

The computer
components
– Central Processing
Unit (CPU)
– Monitor
– Keyboard
– Mouse
– Internal cards
– RAM
– Hard Drive Trays
Peripheral Devices

Printers
Peripheral Devices






Zip drive
DAT tape drive
Magneto optical drive
Scanners
Hubs
Digital Cameras
– And there are many
types
What Does Digital Evidence
Look Like?

Typical hard drive
from a desktop
computer
– Numerous types,
sizes, models and
brands
What Does Digital Evidence
Look Like?

Inside of the desktop hard
drive
What Does Digital Evidence
Look Like?

Floppy Diskette
– 3 ½ inch
What Does Digital Evidence
Look Like?

Zip disk cartridge
What Does Digital Evidence
Look Like?


DDS (Digital Data
Storage) Cartridge
DAT (Digital Audio
Tape) Tape
What Does Digital Evidence
Look Like?

CD – ROM
What Does Digital Evidence
Look Like?

Magneto Optical
cartridge
What Does Digital Evidence
Look Like?



Cellular
phones
Digital
cameras
Pagers
What Does Digital Evidence
Look Like?

Personal
Digital
Assistants
What Does Digital Evidence
Look Like?

Thumb drives are
portable hard
drives that fit on a
key ring and can
store (today) about
2 gigabytes of data
– Many allow
biometrics data
encryption
What Does Digital Evidence
Look Like?
Search Operations Search Steps






Secure the Location
Secure the Computers
Site Survey
Sketch & photograph site
Conduct Interviews
Data Seizure
– Shut Down
– Attach external media
– Reboot w/ write
protection
– Attach to Network?





Bag & Tag
– Shut Down
– Label Connections
– Dismantle
Equipment
“Hard Copy” Evidence
Transportation of
Evidence
Storage of Evidence
Documentation
E-Discovery




90% of American Corps. Are involved
in litigation
Avg. $1B Corp. faces 147 cases at
any given time
Litigation costs these firms $8
million annually
E discovery - top litigation burden
New Rules for E-Discovery
Rule 16: The Pre-Trial
Conference






(ESI) electronically stored information
Partied in civil litigation must meet within
30 days of the filing of the lawsuit
Identify what data is “accessible”
Which records will be shared
What format (usually original format)
Establish ground rules for sharing data
New Rules for E-Discovery
Rule 26 Privilege, Disclosure,
Discovery Scope &
Limitations


Parties must disclose ESI and
hard copies that may be used to
support it’s claims or defenses.
Parties must produce ESI that is
Relevant, nor Privileged and
reasonably accessible
What is not Reasonably
Accessible?






Magnetic Backup
Unintelligible legacy data
Fragmented data after deletion
Unplanned output from databases
different from designed uses
Requirement: Save this data anyway
Not knowing contents – is not
unreasonably accessible
Exceptions to Not Reasonably
Accessible



If the requesting party can show “Good
Cause” for getting it.
The requesting party must be able to
show its need outweighs the burden
and cost to retrieve and produce the
information.
The judge Orders it!
Rule 26 (f) (3)
Create a Discovery Plan






Where data is located
How ESI is preserved
Time and Cost involved in retrieving
ESI
How ESI can be searched and
retrieved
What data is privileged
In what format ESI can be produced
Rule 34
ESI Production and Forms



ESI is equal to paper documents
Parties must produce documents in
the form they are ordinarily kept or a
“Reasonably usable format”
Parties must state the form they
intend to use
Rule 37
Safe Harbor Provisions



Parties should establish a routine
good-faith operation of an
information system
Courts can’t impose sanctions if data
is lost and a good-faith routine
operating system was in place.
CANNOT delete information in
anticipation of litigation
What to do





Your entire organization should be
committed to meeting litigation
requirements
Document your ESI retention policy in
writing
Employ systems to control your data
Identify “Reasonably Accessible” ESI
Manage information as potential evidence
What to do - continued




Store only data you need
Know what and where your data is
Ensure outside council knows your
policies
Establish a scheduled, predictable
routine for retention and deletion that
is tied to records management policy
Examples of data seizure


1993 World Trade
Center Bombing
Two computers of
data
Examples of data seizure


1995 OK City
bombing
If printed, data
would fit into
footlocker
Examples of data seizure


9/11/2001
More data seized
than in the Library
of Congress
Gigabytes Processed Per
Year
120000
100000
80000
60000
40000
20000
0
FY 1998
FY 1999
FY 2000
FY 2001
FY 2002
IT AINT OVER TILL IT’S
OVER


Don’t assume just because a System
has been damaged that the Digital
Evidence may be irretrievable….
Seeing is believing
IT AIN’T OVER TILL IT’S
OVER
IT AIN’T OVER TILL IT’S
OVER
GOOD INTENTIONS
Final Comment


Digital Evidence is some of the most
fragile and complex evidence you
will come in contact with
If ever in doubt contact a Computer
Forensics Examiner for advice
QUESTIONS ?
Download