Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory Why standards? • A scenario… Dagestan separatists • Supported by Islamic fundamentalists Send two teams: • Washington • London Wire transfer funds from: • Paris • Rome By means of PC banking Simultaneously explode two devices The crime scenes • • • • • • Subjects identified Computers recovered Reveal communications links Requests for investigations Additional digital evidence collected Digital evidence became the glue Digital Evidence Trail Critical issues… • How do we ask for what evidence? • Do we get what we thought we asked for? • Can we use what we received? Why standards? • Trans-jurisdictional • Exchange • Digital evidence What standards? • • • • • Definitions Principles Processes Outcomes Common language How it started • 1993 - 1st International Conference on Computer Evidence • 1995 - International Organization on Computer Evidence formed • 1997 - IOCE & G-8 independently decide to develop standards How it started - continued • 1998 - G-8 asks IOCE to undertake this initiative • 1998 - SWG-DE formed to pursue U.S. participation • 1998 - ACPO, FCG and ENSFI agree to participate • 1998 - INTERPOL is briefed on progress Where we are now • UK Good Practice Guide (ACPO) • ENSFI Working Group • SWG-DE draft standards – www.for-swg.org/swgdein.htm (under construction) • October 4-7, 1999 – IOCE, ACPO, FCG & ENSFI meet on European standards – www.ihcfc.com - results forthcomming Where we are going • First you must crawl… • Create foundation – definitions – principles – processes • Durable • Universal – all digital evidence types – mutually understood SWG-DE Definitions: Digital evidence • is information of probative value stored or transmitted in digital form (SWG-DE 7/14/98) • is acquired when information and/or physical items are collected and stored for examination purposes. (SWG-DE 8/18/98) SWG-DE Principle: Evidence Handling • ANY action which has the potential to alter, damage or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner (SWG-DE 3/12/99) SWG-DE Definitions: Evidence types • Original digital evidence - physical items and all the associated data objects at the time of acquisition SWG-DE Definitions: Evidence types cont. • Duplicates - an accurate reproduction of all data objects independent of the physical item • Copy - an accurate reproduction of the information contained in the data objects independent of the physical item. In Summary... • Nearly all computer crime is transjurisdictional • Standards for collection & processing evidence required to share evidence – Adopt standards - compare standards – DE Forensics is a specialty, distinct from computer investigations • Forensic Laboratories encouraged to lead effort to develop standards Questions? • Don Cavender • Mark M. Pollitt • Supervisory Special • Unit Chief Agent • mpollitt.cart@fbi.gov • dlcavender.cart@fbi.gov • • • • • Computer Analysis Response Team Room 4315 935 Pennsylvania Ave, NW Washington, DC 20535 USA 202.324.9307 Computer Investigative Skills • Digital Evidence Collection Specialist – First Responder – 2-3 days training – Seize & Preserve Evidentiary Computers/Media • Computer Investigator – Above experience + – Understanding of Internet/Networks/Tracing computer communications, etc. – 1 to 2 weeks specialized training • Computer Forensic Examiner – Examines Original Media – Extracts Data for Investigator to review – 4 - 6 weeks specialized training Digital evidence = Latent evidence: • • • • • • Is invisible Is easily altered or destroyed Requires precautions to prevent alteration Requires special tools and equipment Requires specialized training Requires expert testimony Forensic Model Protocols Services Provided by Computer Forensic Examiners • Exams – Computer and diskette exams – Other media - Jaz, Zip, MO, Tape backups – PDA’s • On site support of search warrants – Consultation with investigators and prosecutors • Expert testimony for results and procedures Additional Services • Recover deleted, erased, and hidden data • Password and encryption cracking • Determine effects of code – such as malicious virus CART Field Examiner (FE) Certification • • • • • • 4-5 weeks specialized in-service training 4 weeks commercial training Lab internship if desired or necessary One year for certification process $25,000 to train & equip a new examiner Also, annual re-certification and commercial training for FE’s - 3 year commitment Other Computer Forensic Certifications • SCERS - Treasury version of CART – also offered to Local LEA through FLETC • IACIS - LEA non profit association • Local LEO’s – State Labs • Some commercial and academic programs in early development Computer Forensic Training • IACIS - International Association of Computer Investigative Specialists - http://www.cops.org/ • Federal Law Enforcement Training Center (FLETC) Financial Fraud Institute - (SCERS Training) http://www.treas.gov/fletc/ffi/ffi_home.htm • HTCIA - High Technology Crime Investigation Association - http://htcia.org/ • SEARCH Group - http://www.search.org/ • National White Collar Crime Center http://www.cybercrime.org Computer Forensic Equipment • Examination Desktop $3,000 – Highest performance affordable – SCSI, DVD, Super Drive – Additional Large Hard Drive $ 500 – Printer $ 500 - $1500 • Search & Examination Notebook $ 3,000 – PCMCIA SCSI & Network Cards $ 300 – Additional Large Hard Drive $ 500 • External Backup (MO, Jaz or Tape Drive) $ 500 - $ 2,000 – Parallel to SCSI Adapter $150 • CD Writer $ 500 • Forensic Software $ 1,500 $2,500 • Cables/Adapters $ 200 - $ 300 • Cases $ 150 - $ 300 • PC Tool Kit $ 10 - $ 300 • Media $ 20 - $500 per examination • Range Total $ 10, 000 - $ 15,000 prior to media Common challenges faced by Computer Forensic Programs • Volume of Exams – Proliferation of computers • Training & Staffing – Enhancements to Computer Crime Investigations w/o enhancements to Computer Forensic Program • Equipment – 3 years to obsolescence – Supplies • Back up media, CD’s, hard drives, misc. hardware, viewing stations • Space – Secure work/storage area • Request for assistance by Other Agencies – Travel