Computer Forensics Tim Louwers, Ph.D., CPA, CIA, CISA Kenny Reynolds, Ph.D., CISSP Louisiana State University Computer Crime Types of Computer Crimes – Hacking/cracking, network intrusion – Computer virii – Harassment and cyberstalking – Industrial espionage, insider crimes – Employee misconduct – Child porn – Pirated software Basically, any crime that is aided or abetted by a computer 2 Examples Hackers reroute phone lines to guarantee winning radio giveaway. – Two Porsches and $30,000 Network Program Designer unleashes $10 million computer “bomb.” – Bomb permanently deleted all of the company’s sophisticated software programs. Three Drexel frat brothers “fix” horse race – Prosecutors called it a real-life version of "The Sting" -- an insider exploiting a hole in computer security to create a surething horse racing bet worth more than $3 million. 3 Computer Forensics Defined “The employment of a set of predefined procedures to thoroughly examine a computer system using software and tools to extract and preserve evidence of criminal activity.” --The SANS (SysAdmin, Audit, Network, Security) Institute “The application of computer investigation and analysis techniques in the interests of determining potential legal evidence." -- Judd Robbins (Computer Forensics Investigator) “The science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media.” – The Federal Bureau of Investigation 4 Computer Forensics Computer is used as a storage media -evidence can be retrieved even when the data is deleted. Useful aid in law enforcement. – Tracking terrorists – Impeaching Presidents – Tracing computer virus creators Potential deterrent to computer criminals? 5 Evidence that can be found with Computer Forensic Techniques All existing data in the computer's directory structure. Any deleted files which have not yet been overwritten by the operating system. Deleted emails. Pages recently printed on the suspect's printer. Renamed files. Application software. Specific words, numbers, etc. Recently accessed web sites. Passwords to commonly used programs/websites. Password protected files. 6 I. Search and Seizure: 4th Amendment: "Reasonable Expectation of Privacy" A search is constitutional if it does not violate a person's "reasonable" or "legitimate" expectation of privacy. “Closed container” rule – The Fourth Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer without a warrant if it would be prohibited from opening a “closed container” (e.g., briefcase or file cabinet) and examining its contents in the same situation. 7 I. Search and Seizure: Intelligence Gathering Is there a computer in use? What kind of computer and operating system? What evidence do you want? How sophisticated is the suspect? 8 I. Search and Seizure: The Raid • Control the scene • Time the raid so that you have control. • Control individuals • Separate suspects from the equipment. • Control others present even if they are not suspects. • Identify potential evidence • Know what you are looking for. • Eliminate threats • Assess the possibility that the system can be controlled from a remote system... • Eliminate this threat immediately!!! 9 II. Processing the Scene CRIME SCENE CRIME SCENE CRIME SCENE 10 II. Processing the Scene (Continued) Document! Document!! Document!!! – The individual who occupies the office – The name of the employees that may have access to the office – The location of the computer system in the room – The state of the system (whether it is powered on, and what is visible on the screen) – The people present at the time of the raid – The serial number, models, and makes of the hard drives and components of the system – The peripherals attached to the systems 11 II. Processing the Scene (Continued) On-screen activity -- Power down or not? Is the activity destructive? – Yes -- Stops/Freezes further data loss if selfdestructing software in use Is there anything of evidentiary value? – No -- You will lose anything that’s in memory – Verify system info (date and time) – Capture process listings and open files 12 II. Processing the Scene (Continued) Wear surgical gloves Photograph – Books – Papers – Notes – Hardware Note position of all manuals Seize all manuals Sketch entire PC, including connections 13 II. Processing the Scene (Continued) Tag and label all physical components and record identifying information. Clearly label components with a "DON'T TOUCH OR OPERATE" warning! Only disassemble enough to facilitate transport. Pack and pad components in boxes with static resistant packing. 14 II. Processing the Scene (Continued) Identify Network connections (LAN, WAN, DSL, Cable) and disable. Tag both ends of all wires, even if one end of the wire is not connected to anything! Be aware of wireless networks. Disconnect phone and modem lines. – Mark each line so you know where it came from. – Do NOT unplug power for memory phones, fax machines, modems, caller ID boxes. 15 III. Preserving the Evidence Typical kinds of evidence in computer forensics – Computer log files • Successful and failed logins, website hits, access logs, error logs, etc. – Other access records • Phone records, physical access logs – E-mail communications – Electronic storage media • Hard drive, floppy disks, CDs, tapes, other media – Hardcopy records 16 III. Preserving the Evidence Evidence Life Cycle: – – – – – Collection and Identification Analysis Storage, Preservation, Transportation Presentation Return (if applicable) Thou shall not alter the evidence in any way. Ensure that: – No evidence is damaged, destroyed, or otherwise compromised. – Evidence is properly handled and protected – Information which must remain private does so: • Any client-attorney information that is inadvertently acquired • Information which would require a warrant must have one 17 III. Preserving the Evidence: Protecting data on the hard drive DON’T BOOT FROM THE HARD DRIVE – Boot from other media: • Boot from floppy or CD – Use new boot disks for each seizure – Access hard drive as slave in another machine – Use write-protecting software or device The only reason you will use the suspect hard drive: – To create an image of it. 18 III. Preserving the Evidence (Continued) Make a mirror image backup of the hard drive – Digital evidence can be duplicated with no degradation from copy to copy. – Authenticate the file system Seal and safeguard the originals and work with disk images 19 III. Preserving the Evidence: Examples of Imaging Tools HARDWARE SOFTWARE Tape Drives Removable Media (Zip, Jaz, etc.) Clone or Slave Drives Network Servers Optical Drives (CD-ROM, Magneto-Optical, DVD, Etc.) Disk Duplicators Byte Back Linux "dd" Norton Ghost SafeBack EnCase SnapBack DatArrest Anadisk/Teledisk Image Idiskdup 20 III. Preserving the Evidence: Examples of Imaging Tools (continued) EnCase (Guidance Software, Pasadena, CA) – Imaging program -- makes an exact image of the original hard drive. – Provides authentication of the file system – “THE” standard commercial computer forensic toolkit. Norton Ghost 21 III. Preserving the Evidence: Chain of Custody Chain of Custody – Who obtained it? – When / where was it obtained? – Who secured it and how? – Who controlled it after being secured? – Who accessed or handled it? – Fewer custodians is better – less to testify Evidence Tag 22 IV. Evidence Examination Use a systematic approach – Create an examination log – Keep detailed notes – Audio tape your examination Admissibility: – Must be relevant, reliable, permissible – Hearsay Rule 23 IV. Evidence Examination: Finding the needle … Discovering all files – including normal files, deleted yet remaining files, hidden files, password-protected files, and encrypted files. Recovering all (or as much as possible) of deleted files. Revealing the content of hidden files as well as temporary files – ones used in both the application programs and the operating system. Accessing the contents of protected and encrypted files – only if possible and legally appropriate. 24 IV. Evidence Examination: Finding the needle (continued) Analyze all possibly relevant data – items found in special and typically inaccessible areas of the disk – Unallocated space on a disk – currently used, but possibly the repository of previous data that is relevant evidence – Slack space in a file – the remnant area at the end of a file in the last assigned disk cluster, that is unused by current file data, but once again maybe a possible site for previously created and relevant evidence Print out an overall analysis of the subject computer system, as well as a listing of all possible relevant files and discovered data files 25 IV. Evidence Examination: Finding the needle: Deleted files Often, evidence that the suspect no longer believes is recoverable can be found on the suspect’s computer. File “Delete” does not necessarily remove the file itself An investigator can use the complete or incomplete portions of “deleted” files to obtain valuable evidence or leads in a case 26 IV. Evidence Examination: Deleted File Recovery Tools Software – Norton Un-erase – EnCase Hardware – Raw Disk Readers 27 EnCase 28 Summary Computer crime is more than hacking Just because it’s deleted doesn’t mean it’s gone Don’t touch that computer! DO NOT ACCESS FILES! – Make copies -- examine copied files Document EVERYTHING! Maintain chain of custody 29 Acknowledgements We would like to thank the following for their assistance in the preparation of this presentation: – LSU students and alumni • Patrick Blake, Erin Hopper, Jackson Kon, Eric Smith, Xiaotao Wang – LSU’s Computer Forensic Lab 30 Computer Forensics Resources Federal Guidelines for Search and Seizing Computers http://www.usdoj.gov/criminal/cybercrime/search_docs/toc.htm FBI Handbook of Forensic Services http://www.fbi.gov/hq/lab/handbook/intro.htm Updates and Supplementary DOJ Information http://www.usdoj.gov/criminal/cybercrime/searching.html Computer Crimes Criminal Justice Links http://www.co.pinellas.fl.us/bcc/juscoord/ecomputer.htm Computer and Internet Security Links http://www.virtuallibrarian.com/legal/ Forensics Science and Law Enforcement Links http://www.ssc.msu.edu/~forensic/links.html The National White Collar Crime Center PC Forensics http://www.pcforensics.com Computer Forensics, Inc. www.forensics.com SC Magazine www.scmagazine.com 31