CSI Crime Scene Investigations



Similar documents
Comprehensive Digital Forensic Solutions

Design and Implementation of a Live-analysis Digital Forensic System

EC-Council Ethical Hacking and Countermeasures

Computer Hacking Forensic Investigator v8

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Certified Digital Forensics Examiner

Information Technologies and Fraud

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

MSc Computer Security and Forensics. Examinations for / Semester 1

Digital Forensics. Larry Daniel

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Mac Marshal: A Tool for Mac OS X Operating System and Application Forensics

CERTIFIED DIGITAL FORENSICS EXAMINER

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Mobile Device Forensics. Rick Ayers

Computer Forensics introduction part A

Live System Forensics

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Where is computer forensics used?

Course Title: Computer Forensic Specialist: Data and Image Files

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Scene of the Cybercrime Second Edition. Michael Cross

Digital Forensics for Attorneys Overview of Digital Forensics

Incident Response and Computer Forensics

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

Review of Cell Phone Technology

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Computer Forensic Tools. Stefan Hager

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Hands-On How-To Computer Forensics Training

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

Computer Forensic Capabilities

Case Study: Mobile Device Forensics in Texting and Driving Cases

How To Get A Computer Hacking Program

Mobile Operating Systems. Week I

Running head: DIGITAL EVIDENCE: 1

Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS

Chapter 7 Securing Information Systems

NCIS Overview. Prevent Terrorism Protect Secrets Reduce Crime

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

PORTABLE OPERATING SYSTEMS AND INFORMAITON SECURITY RISKS

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Linux in Law Enforcement

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

Forensic Acquisition and Analysis of VMware Virtual Hard Disks

Open Source and Incident Response

Case Study: Smart Phone Deleted Data Recovery

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

Digital Forensic Techniques

Open Source Data Recovery

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

Computer Forensics. Securing and Analysing Digital Information

An Example of Mobile Forensics

Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology

Digital Forensics & e-discovery Services

Cell Phone Operating Systems

BYOD Mobile Device Chart

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

Validating Tools for Cell Phone Forensics

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

Computer Forensics using Open Source Tools

A Survey on Mobile Forensic for Android Smartphones

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

TECHNICAL OPERATIONS DIVISION LESSON PLAN

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Design and Implementation of Forensic System in Android Smart Phone

C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY

KINDLE FORENSICS: ACQUISITION & ANALYSIS

Best Practices. For Seizing Electronic Evidence. v.3 A Pocket Guide for First Responders. United States Secret Service

Paraben s P2C 4.1. Release Notes

Tech Times. Back-up and Storage

Best Practice Document Hints and Tips

Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Design and Implementation of Digital Forensics Labs:

Computer Forensics and What Is, and Is Not, There on Your Client s Computer. Rick Lavaty, Computer Systems Administrator, District of Arizona

Modern Digital Forensics!!

Copyright

Best Practices for Incident Responders Collecting Electronic Evidence

Game-based Forensics Course For First Year Students

What is Digital Forensics?

Blackberry Forensics. Shafik G. Punja Cindy Murphy. SANS DFIR Summit 2014 Austin TX. June-9-14 Copyright QuByte Logic Ltd

Transcription:

CSI Crime Scene Investigations Did Jack do it?

Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession

Case Summary:

CSI-Forensic Process 1. Evidence Collection 2. Evidence Preservation 3. Analysis 4. Reporting

What are the different forensics? ipod Computer Forensics 1. Storage device requiring file system 2. Device is static 3. Larger storage capacity 4. Forensic: Bit Stream Imaging Cell Phone & PDA Handheld Forensics 1. Embedded systems 2. Device is active 3. Smaller on board storage capacity 4. Forensic: Active Memory Imaging

CSI-Evidence Collection Check all areas for potential evidence. Nothing is what it seems Always wear gloves! Biological evidence is still available.

Our Evidence

What are potential risks to evidence. Suspect Detain Suspect Friends of Suspect Protect Evidence

CSI-Evidence Collection/Preservation Must maintain proper control of evidence Faraday Cage all wireless devices Maintain Power on all devices

StrongHold Faraday

StrongHold Faraday Time in a Tent

Prioritize Your Exam Power Volatile Data First PDA Risk Volatile Data Second Cell/Mobile Phone Static Data Last ipod

The BIG Questions What was Jack Grove was up to? Who were his accomplices? Do we have the evidence to prosecute? What is the verdict?

The BIG Questions What was Jack Grove was up to? Where to start? What was last time devices had interaction? Were the time stamps consistent with provider records? How do you get provider records?

Last Interaction with Suspect Device Timestamp Virtual BlackBerry

Last Interaction with Suspect Device Timestamp Not always conclusive

Last Interaction with Suspect Device Timestamp

What do providers keep

Subscriber Database Subscriber Databases are keep by the cellular networks (with some exceptions and additions depending on the carrier) Subscriber name and address Billing information Telephone Number (MDN MIN) IMSI IMEI/ESN SIM serial (if applicable located on card itself) PIN/PUK Subsidy lock Services *Prepaid services are not required to be identified

CDRs Call Detail Records are produced every time a customer makes a call or sends a text message. DATA THAT CAN BE OBTAINED Cell Sites utilized (Origination and Termination) Originating MDN Termination MDN Dates and times of calls Duration of Call Direction of Call Switch (Base station) of Origination

Obtaining Provider Data Methods are dependant as to information you are requesting. Letter of Preservation (90 days) Subscriber information and billing information SUBPOENA, 2703(d),SW Call History including date and times (Historical) Subpoena, 2703(d), SW Towers, GPS, Live (SMS,MMS,Convo) 2703(d) or SW

CDR Applied

The BIG Questions Who were his accomplices? Where to start? Address Books Text Messages Instant Messaging E-mail Call Records

The BIG Questions Do we have the evidence to prosecute? Where to start? Acquisition Cross Reference Evidence Where do they link together?

Types of ipods ipod ipod Mini ipod Shuffle ipod Photo ipod Nano ipod Video

Software Default Software itunes is the default software for controlling your ipod Other Software Anapod is software that can be used to control your ipod but has some added features Default Software Various other software can be found by googling ipod software

File Systems Default File Systems run on the ipod HFS+ (Macintosh s Hierarchical File System) FAT32 (Microsoft s File Allocation Table) Alternate File Systems FAT16 (Microsoft s File Allocation Table) Ext2, Ext3 (Extended File System)

How This Effects Law Enforcement ipods Can Contain Evidence Photos Trade Secrets / Espionage Hidden Files Hacking Tools Sky is the Limit

Podcasting What is a Podcast? A Podcast can be either video or audio file that has been pre-recorded and plays on the ipod How is this relevant to law enforcement? Evidence can be hidden in a podcast or be the podcast itself

Linux Boot CDs and ipod Linux Boot CDs Can be used with the ipod. Linux Boot CDs leave no trace on HD Can create persistent home directory on ipod Popular boot CDs Knoppix STD Helix Ubuntu

Hacking Tools on the ipod Hacking tools can be run from the ipod. Metasploit Exploits Evidence can be brought back to the ipod for safe keeping.

Small Linux Distributions Flavors of bootable Linux under or 50mb can run on the ipod Damn Small Linux Runt Puppy

Response Ways of Imaging the ipod Write Blocking Device USB Registry Hack Linux DCFLDD / DCCIDD Forensic Imaging Tools Paraben Forensic Replicator Encase AccessData FTK Imager

Forensic Tools for Analysis Forensic tools for analyzing ipods Brian Carrier s Sleuthkit and Autopsy Guidance Software EnCase AccessData FTK Paraben P2

Baseline: What is Normal Files typically found on the ipod Calendar Contacts Notes ipod_control ipod_prefs itunes

What is Not Normal? Mismatched file extensions File extensions that don t match the file type Hidden or improper named Files Files named something innocuous Suspiciously named files such as hax0r Too many partitions ipods with more than 2 partitions could be suspicious Non-standard file systems File systems other than FAT32 or HFS could be suspicious

Do we have a verdict? Amber Schroader amber@paraben.com & Tyler Cohen tylercohen78@gmail.com