Digital Forensics for Attorneys - Part 2



Similar documents
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics. Larry Daniel

Cell Phone Forensics For Legal Professionals

Computer Forensic Capabilities

Where can I get help after a sexual assault?

Digital Forensic Techniques

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Hands-On How-To Computer Forensics Training

Community Legal Information Association of PEI, Inc. Sexual Assault

Open Source Digital Forensics Tools

YOUR CONTACT DETAILS (ADDRESS, PHONE, etc.):

MSc Computer Security and Forensics. Examinations for / Semester 1

TABLE OF CONTENTS. Homicide Case Flowchart...3. Overview of Homicide Trial...4. Location of Local Court Houses...5. General Courtroom Diagram...

Criminal Investigation CRJ141. Matthew McCarty

A Victim s Guide to Understanding the Criminal Justice System

To Catch a Thief: Computer Forensics in the Classroom

Austin Independent School District Police Department Policy and Procedure Manual

EC-Council Ethical Hacking and Countermeasures

Computer Hacking Forensic Investigator v8

YAVAPAI COUNTY PUBLIC DEFENDER 595 WHITE SPAR ROAD PRESCOTT, ARIZONA PHONE: (928) FAX: (928) INFORMATION BOOKLET

Stages in a Capital Case from

Victims of Crime Act

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Digital Forensics & e-discovery Services

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

The Witness and the Justice System in Alberta

The Rights of Crime Victims in Texas

OBJECTIVES CRIMINAL PROCESS- PROSECUTING ATTORNEY S OFFICE NAVIGATING THE CRIMINAL AND CIVIL PROCESS IN CHILD ABUSE AND NEGLECT CASES

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

Colorado Criminal Jury Instruction Chapter 1:04 and Chapter 3

Role Preparation. Preparing for a Mock Trial

Domestic Violence Case Management Plan

Where is computer forensics used?

Franklin County State's Attorney Victim Services

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

The Criminal Justice System The Police. I. The Police. II. Organization a. Most agencies located in counties, cities and towns

Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit

Purpose of the Victim/Witness Unit

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) e dhains@vincents.com.au w

How To Solve A Violent Home Invasion With A United Force

How will I know if I have to give evidence in court?

Victim Witness Assistance Program

System Overview ~~~~~ Presented by: Darcie McElwee

REPRESENTING THE ACCUSED COP KILLER (Lessons from the Trenches) STATE OF ALABAMA VS. MARIO DION WOODWARD 03-CC TMH (Mont. Co. Cir.

IN THE SUPREME COURT OF THE STATE OF DELAWARE

WILLIAM OETTINGER PHONE (702)

Immigration and Customs Enforcement Forensic Analysis of Electronic Media

Course Court Systems and Practices. Unit X Pre-trial

VOIR DIRE 2/11/2015 STATE OF TEXAS VS JANE DOE 1. CONVERSATION - ONLY TIME YOU CAN ASK THE LAWYERS QUESTIONS 2. NO RIGHT OR WRONG ANSWER

PROSECUTION DIVISION THE MISSION

MODEL CRIMINAL DEFENSE MENTORING PROGRAM Utah State Bar New Lawyer Training Program

grand larceny robbery vandalism arson victimless crimes white-collar crimes community policing probable cause arrest warrant own

What is DOMESTIC VIOLENCE?

Special Topics. Goals and Objectives

HOW A TYPICAL CRIMINAL CASE IS PROSECUTED IN ALASKA

Services. Computer Forensic Investigations

VI. Preparing for Successful Prosecution

Issue Brief. Arizona State Senate ARIZONA SEX OFFENDER REGISTRATION AND NOTIFICATION INTRODUCTION ADAM WALSH ACT. November 23, 2009.

JURY QUESTIONNAIRE [PLEASE PRINT]

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

DNA & CRIME VICTIMS: WHAT VICTIMS NEED TO KNOW

Teacher Assessment Blueprint. Criminal Justice. Test Code: 5269 / Version: 01. Copyright 2010 NOCTI. All Rights Reserved.

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

10 Victims and the law 57

The Business Case for ECA

INTRODUCTION DO YOU NEED A LAWYER?

Information for Crime Victims and Witnesses

Data Mining Minnesota Murder Victim s Cell Phone Reveals. Smoking Gun Evidence

Battling Current Technological Trends

Best Practices in Electronic Record Retention

Juvenile Offenders Crime Victims Rights Law Enforcement Responsibilities

DOMESTIC VIOLENCE

COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT STANDING ORDER NO (AMENDED)

the best defense R a t e d t o p 5 % U. S. L a w F i r m Exclusively Criminal Defense Former Los Angeles Prosecutors Immediate Response 24/7

SUMMARY OF RULES AND STATUTES REGARDING BAIL FOR INDICTABLE OFFENSES

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION

Responsible for prosecuting all criminal and traffic cases within Mecklenburg County

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

Authentication of Cell Phone Text Messages

Certified Digital Forensics Examiner

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews

CASCADE COUNTY ATTORNEY S OFFICE PARTNER/FAMILY MEMBER ASSAULT PROSECUTION PLAN

CRIMINAL LAW AND VICTIMS RIGHTS

Getting Physical with the Digital Investigation Process

Overview of Computer Forensics

Child Abduction Unit Request for Investigation Summary

Computer Forensics and What Is, and Is Not, There on Your Client s Computer. Rick Lavaty, Computer Systems Administrator, District of Arizona

TAXI and TLC-Licensee CASES

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

How to Use the California Identity Theft Registry

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

Transcription:

Lars Daniel, EnCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence

Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence Acquisition (Collection) and Preservation Part 2 Experts, Evidence and Analysis Understand Forensic Experts vs. Computer Experts Digital evidence: discovery and usage Overview of Digital Forensics Analysis Challenging Digital Evidence

Experts

Defendant as Expert

Why a Forensics Expert? Computer Forensics Expert Should have comparable or better training and experience than the other expert. Should have specific training and experience as a digital forensics expert Should have access to the same tools as the opposing expert Must be able to qualify as a forensic expert in court

Technical Expertise Comparison

Technical Expertise Comparison

Legal Expertise Comparison

Investigative Expertise Comparison Computer Experts No training in examination or investigation, as they do not need to. Digital Forensics Expert Digital Forensics Experts Examples: USB Device history, email authentication, internet history, data deletion, Peer to Peer cases, etc.

Selecting a Digital Forensics Expert

Reasonable Costs

Certifications

Forensic Tools Do they have appropriate forensic tools? - Required to perform many digital forensic functions - Computer Forensics (EnCase, FTK) - Cell Phone Forensics (CelleBrite, Paraben, Susteen) - Almost always needed to perform forensically sound acquisitions and examinations.

Selecting an Expert: Overview 1. Actual training in digital forensics and sub-disciplines? 2. Digital Forensics certifications? Or just computer based certifications? 3. Actual case experience? 4. Recommendation letters from other professionals, particularly attorneys?

Spotting a Problem Expert Attitude: How does the expert interact with your team? 1. Arrogant or superior? 2. Does he or she take the time to explain to properly explain technical concepts in easy to understand language? The Bull Factor 1. If an expert does not have the answer to a question, does he or she try to convince you that they do anyway? 2. Great risk when testifying. 3. Use of jargon to cover up ignorance.

Spotting a Problem Expert Appearance Matters 1. Expert should engage with others and dress in a way that conveys professionalism and competence. Aversion 1. Some experts will take cases they should not because they cannot emotionally handle the contents of the evidence. a. Particularly true with sex crimes cases and other defense related cases.

Spotting a Problem Expert Does the Examiner Have Time? 1. Does the examiner have time to work the case? Some cases (particularly Child Pornography) can require travel. Is Forensics a second job? Avocation?

Expectations of a Forensics Expert Computer Forensics Expert Expected to Anticipate testimony of opposing expert based on the forensic reports and discovery. Duplicate and verify the opposing expert s work. Assist the attorney in preparation for trial Advise the attorney as to the merits of the case in regards to the digital evidence presented.

Expectations of a Forensics Expert Computer Forensics Expert Expected to testify if needed as to: Various files on the client s computer. Ownership of the computer and files. Forensic processes used to extract and verify data. Handling and collection of the evidence. Specifics relating to software installed, dates and times of computer activities

Analysis

Analyzing the Case Approaching the case holistically Digital evidence can reach into all corners of a case:» Cell records» Email» Pictures» Timelines» Internet Activity

Analyzing the Case Always work the case like you are the primary examiner. Never assume anything. Check all the points in the case where mistakes are normally made: Chain of custody. Examination standard procedures. RTC verified for all evidence containing clocks. Evidence handling at the scene. Was everything examined. Claims made in the forensics report. Pay particular attention to keyword search results, internet history results, link files, etc. Placing the defendant at the computer.

Performing the Analysis Step one: Duplicate the other side s work. Verify the accuracy of their findings Did they represent their findings correctly? How thorough was the examination? Verify the completeness of their report Is everything they found in the report?» Why or why not? Was exculpatory evidence ignored or missed?

Establishing a framework for analysis Reading discovery documents Reading the computer forensics reports What claims are being made? What statements were made? What facts support the claims and which do not?

What clues can lead to a more thorough digital analysis? Defendant's statements Witness statements Police statements and interviews Call center records Search warrants and subpoenas Other supporting documents Law Enforcement's computer forensics report

Case Analysis Examples

Document Metadata Example

Picture Metadata Example

Internet History Before Clearing

Internet History After Clearing

Challenging the evidence Common mistakes that open digital evidence to challenges Failing to verify clock times Computer Clocks (Real Time Clock Setting) Affects everything related to time lines:» Internet history» Emails» Computer activity Digital Cameras Affects the metadata inside the digital images.

Challenging the evidence Is the evidence in the report allowed by the search warrant? Was a separate warrant obtained for searching the specific computers and devices? Did the language of the warrant restrict the search in any way? Was evidence obtained through a private party under the direction of law enforcement outside the warrant? Did a verbal request to preserve evidence outside a subpoena without subsequent paperwork cause the third party to become an agent and subject to 4 th amendment search restrictions?

Challenging the evidence Is there an attempt to place a person at a computer without adequate proof? How can you tell? Did the analyst check for unique user accounts with passwords? Is there evidence anyone else used the computer under that person s account or profile? Was the computer in a common area? Did others know the passwords to the user s account? Was access to the computer restricted by physical boundaries or location?

Challenging the evidence Games people play Stating facts out of context Keywords Keyword hits are not always relevant» Murder case example» Hits were found for the keywords murder (156), kidnapping (34), disposal (76), and death (273) on the subject s computer.

Challenging the evidence Games people play Stating facts out of context Keywords» Hits were found for the keywords murder (156), kidnapping (34), disposal (76), and death (273) on the subject s computer. Where can these hits come from? Lexicons, thesaurus, and spell check dictionaries News focused web pages (MSN, Newspaper sites, Television sties, CNN, etc.) When is a hit a hit?» Is 156 hits for murder meaningful?

Challenging the evidence Games people play Stating facts out of context Internet Searches» Murder case example» Searches were found for the keywords murder, kidnapping, disposal and death on the subject s computer.

Google Search Result Riehl World View: Murder, Kidnapping Alleged In Holloway Arrest The arrestee is held in Utrecht and suspected of kidnapping and murder.... Aruba is SURROUNDED by the ideal body disposal mechanism - the ocean.... www.riehlworldview.com/carnivorous_conservative/2006/05/murder_kidnappi.html - 86k - Cached - Similar pages - Note this #05-624: 11-22-05 Jose Padilla Charged With Conspiracy To Murder...... charges Padilla with conspiracy to murder, kidnap and maim individuals in a... every tool at our disposal in vigorously fighting the war on terrorism,... www.usdoj.gov/opa/pr/2005/november/05_crm_624.html - 5k - Cached - Similar pages - Note this The Agenda Kidnapping, murder, and holding - overpowering the kidnap victim,... Our capabilities and the means at our disposal - our capability of reaching the target... www.jafi.org.il/agenda/2001/english/wk3-38/2.asp - 17k - Cached - Similar pages - Note this David Coltart (Official Website)» Cain Nkala murder Deadly AK47 rifles have become the weapon of choice for thugs involved in murder, kidnapping and torture throughout Zimbabwe.... davidcoltart.com/archive/category/press-reports/cain-nkala-murder - 35k - Cached - Similar pages - Note this Supreme Court of Ohio / Public Information / Case Summaries McKnight was found guilty of the kidnapping, robbery and aggravated murder of 20 -year-old Kenyon College student Emily Murray in November 2000 and the... www.sconet.state.oh.us/communications_office/summaries/2005/1130/022130.asp - 12k - Cached - Similar pages - Note this [PDF] Jose Padilla Charged With Conspiracy To Murder Individuals... File Format: PDF/Adobe Acrobat - View as HTML demonstrates that we will use every tool at our disposal in vigorously... violent jihad, which would include acts of murder, kidnapping and maiming,... nefafoundation.org/miscellaneous/featureddocs/u.s._v_padilla_dojpr_ind.pdf - Similar pages - Note this

Challenging the evidence Games people play Playing the techie game Technical words no one understands Unallocated space Slack space Browser cache Typed URLs Gnutella and Limewire What does that mean?

Challenging the evidence Child porn example (State s forensics report) 35 images depicting child pornography were located on suspects hard drive. Details 1. Images were found in the browser cache at C:\user\documents and settings\internet history\hro5ij (10 images in all) 2. Images were found and extracted from C:\ drive unallocated space. (10 images in all) 3. Images were found in The BearShare Shared folder at C:\user\Program Files\BearShare\Shared (15) When presented with this kind of report, what do you do?

Challenging the evidence What does that mean? If it is in the browser cache, does that mean the user did it on purpose?» How browser caching works.

Challenging the evidence What the heck is unallocated space?» Unallocated space is areas on the hard drive that are available to store data.» When a file is deleted, it is only marked as deleted, so the old data remains on the hard drive in the unallocated space.» Forensic tools can recover files from this unallocated area of the hard drive.

Challenging the evidence Peer to Peer Software: It s in the shared folder right? MAC Times, Multi-select Program Installation (Default Sharing)

Multi-Select

Challenging the evidence Digital evidence can also be used to Help to establish the whereabouts of the defendant. Was the defendant doing something on the computer that matches his statements about his activities at a certain time? Establish mitigating circumstances Was something going on that can be found on the computer or cell phone that shows this? Disprove pre-meditation in a death penalty case? Real case example: Fake email account created after a murder to cover it up, versus before hand.

Contact Information: Email: lars@guardiandf.com Web: www.guardiandf.com Blog: www.exforensis.com Phone: 919-868-6281 Questions? Coming soon: Attorney Resource Center Online www.attorneyresourcecenteronline.com Book: Digital Forensics for Legal Professionals May 2011, Syngress Publishing Larry E. Daniel and Lars E. Daniel