COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San...

22
COMPUTER FORENSICS COMPUTER FORENSICS Erin E. Kenneally Erin E. Kenneally San Diego Supercomputer Center San Diego Supercomputer Center University of California San University of California San Diego Diego erin @ sdsc.edu erin @ sdsc.edu
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    216
  • download

    0

Transcript of COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San...

Page 1: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

COMPUTER FORENSICSCOMPUTER FORENSICS

Erin E. KenneallyErin E. Kenneally

San Diego Supercomputer CenterSan Diego Supercomputer Center

University of California San DiegoUniversity of California San Diego

erin @ sdsc.eduerin @ sdsc.edu

Page 2: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally2

ESSENCE OF ALL FORENSIC SCIENCESESSENCE OF ALL FORENSIC SCIENCES

• Principles applied to the Principles applied to the

Detection, Collection, Preservation, Analysis

of evidence to ensure its admissibility in legal proceedings

Page 3: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally3

Different Realms…. Same PrinciplesDifferent Realms…. Same Principles

• http://host/cgi-bin/http://host/cgi-bin/helloworld? helloworld? type=AAAAAAAAAAAAAAAtype=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAA AAAAAAAAA AAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

Page 4: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally4

Computer Forensics: The ‘New’ Kid Computer Forensics: The ‘New’ Kid on the Blockon the Block

• Compare to established Forensic SciencesCompare to established Forensic Sciences

Fundamental assumptions the same…start with intense variability among large # variables/attributes

Advances aim to develop meaningful/probative value from variables

identifyingidentifying characterizingcharacterizing correlativecorrelative

Properties Properties of evidence sourcesof evidence sources

Page 5: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally5

(...Compare to established Forensic Sciences)(...Compare to established Forensic Sciences)

Techniques to enhance the I/C/C properties : more precisely

more accurately

faster/less time

requiring less evidence

/ex/  Digital Data v. Biological Data– A/B/O typing --> rH factors --> DNA typing via RFLP

--> DNA typing via PCR– Hash libraries (to ID data); File signature (match

name & file type); Mirror imaging software

Page 6: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally6

(...Compare to established Forensic (...Compare to established Forensic Sciences)Sciences)

• ““What we observe is not Science, but Science’s What we observe is not Science, but Science’s answer to our questions”answer to our questions”

Question : existence of evidence

ability to uncover & contextualize evidence

Challenge: Where look ? What technique to make apparent ? Is it admissible ?

Page 7: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally7

Analogize: ::Analogize: ::

DIGITAL EVIDENCE DNA EVIDENCE

WHERE

Media (HD, floppy, CD,PDA, DVD)

Location (server logs,IDS, firewall logs)

Clothing, cigarette butts, weapon

Blood, saliva, hair shaft

WHATTECHNIQUE

Software / Hardware torecover deleted data, fileslack, unallocated space,swap files

PCR

RFLP

STR

ADMSSBLTY

Technology to recoverdeleted data Accepted

SW recovery Challenged (inclusiveness)

DNA technology Accepted

STR technique Challenged

Page 8: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally8

Digital Evidence - Search & Seizure Digital Evidence - Search & Seizure IssuesIssues

• Shifting ParadigmsShifting Paradigms

Resource challenges

Defining “Reasonableness”

Modification/Destruction of Evidence

Page 9: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally9

Search & Seizure - Resource IssuesSearch & Seizure - Resource Issues

• TraditionalTraditional approach:approach: seize everything seize everything

• Problem:Problem: collect ability >>>>> analysis ability collect ability >>>>> analysis ability

a lot of junk; case backlogs

economic infeasibility: storage capacity; human/time resources

/ex/ network search: image 100’s of Gb’s???

/ex/ C3D create “FMD-ROM” = 140 Gb– compare: cd= 650 Mb; DVD= 6Gb

/ex/ IBM- 73 Gb HD

Page 10: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally10

Search & Seizure - Resource IssuesSearch & Seizure - Resource Issues

Page 11: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally11

Search & Seizure - Defining Search & Seizure - Defining ReasonablenessReasonableness

• What is unlawful S & S in Cyberspace?What is unlawful S & S in Cyberspace?

4th A violations judged by notions of “reasonableness”

Search Warrant Issuance standard = PC PC = Reasonableness Reasonable Narrow & Particular

Realize: Time & Scope variables with intangible, digital evidence

judges focus on disruption to business assume narrow Scope by Time allotted BUT, shorter Time = wider Scope Result: Breadth of search is >>>>

Page 12: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally12

Search & Seizure - Defining Search & Seizure - Defining ReasonablenessReasonableness

Search Warrant Parameters

Anywhere reasonably find evidence– s/w for gun precludes looking in a cell phone case

BUT, Digital Evidence - no physical limits

– can hide/compress large amounts of data anywhere

– file labels no reflect search subject matter

Page 13: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally13

Search & Seizure - Evidence Search & Seizure - Evidence Modification ChallengesModification Challenges

• Benign actions ……. Probative consequencesBenign actions ……. Probative consequences

Truth:Truth:

Turning on computer: Win95 system opened 417 files (8%) of files on hard drive just to boot (primarily .LNK and antivirus files)

Consequence:Consequence: 417 access dates altered  

So what?:So what?: Timestamps crucial 

Page 14: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally14

So what?:So what?: Timestamps crucial Timestamps crucial  

• Charge:Charge: possession kiddie porn possession kiddie porn

Digital EvidenceDigital Evidence on Defendant’s Computer: large collection of on Defendant’s Computer: large collection of adult porn; couple dozen kid porn images.adult porn; couple dozen kid porn images.

Defense:Defense: downloads adult porn via IRC; some of the kid porn was downloads adult porn via IRC; some of the kid porn was ‘unintentionally’ downloaded with adults.‘unintentionally’ downloaded with adults.

Computer Forensics:Computer Forensics: Timestamps show adult pics viewed (access Timestamps show adult pics viewed (access date) after downloaded (creation date), but kid porn have same date) after downloaded (creation date), but kid porn have same timestampstimestamps

Destruction of exculpatory evidence:Destruction of exculpatory evidence: seizing officer boots seizing officer boots machine and rifles through pics …….. machine and rifles through pics ……..

Page 15: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally15

Jurisdictional ChallengesJurisdictional Challenges

• Substantive Laws inconsistentSubstantive Laws inconsistent

Hackers route through various countries, hoping lack of victim discourage investigation & prosecution coordination

/ex/ Love Bug Virus?

CFAA- $5K minimum -->reward corp’s whose house is in disarray.…easier to add up damages

ECPA- affords > protection for wire v. electronic communications

problems given convergence of voice (wire) & non-voice data in same data stream

USA-PATRIOT Act has changed this !!!!!!!

Page 16: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally16

(jurisdictional challenges)(jurisdictional challenges)

• Procedural LawsProcedural Laws(The Law responds to technology……) (The Law responds to technology……) /ex/ Fraud case

victim: NV perp: website owner in FL NV prosecutors issue subpoena for records from FL co.

No formal mechanism for service Accomplish via pro courtesy……no guarantee serve or

enforce NV could refer case to FL counterparts

– but, if no FL victim……..will it go forward?

USA-PATRIOT to the rescue

Page 17: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally17

Coordination ChallengesCoordination Challenges

• /ex//ex/ Cyberstalker sends threatening email to pty Cyberstalker sends threatening email to pty in OHin OH

routes through 4 countries

LE in OH would have to go through Office of Intntl Affairs, LE in various cntrys, just to trace back to perp in OH

Timing is crucial……..crook long gone by time these procedures exhausted

Page 18: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally18

Contrast: Computer Forensics v. Contrast: Computer Forensics v. Traditional Forensic SciencesTraditional Forensic Sciences

• Qualifying Cyber Experts under Daubert/Kumho

Shifting paradigm

What is ‘general acceptance’

academic credentials – CS curricula short academic tradition– high academic credentials << commercial/industrial

value

quantifying experience – no certification standards– diverse knowledge-base

Page 19: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally19

CONTRAST DIGITAL EVIDENCECONTRAST DIGITAL EVIDENCE

PAPER-BASED EVIDENCE DIGITAL EVIDENCE

STORAGE Document storage canbe cumbersome

Computers can store largeamounts

/ i.e./ 1 Gb = 14 floors textpages

organized unorganized (by humanstandards)

/ why/ - sequence or location ofdata irrelevant if takes seconds tofind any

search clarity *context relativelyapparent

search hurdles * document may be stored inpieces …individually no context

Page 20: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally20

PAPER-BASED EVIDENCE DIGITAL EVIDENCE

PROCESSING

*COPYING

‘back-ups’ not routine

copies maintained

copies usually mimicoriginal

deliberate

‘perfect’

back-ups common

copies scattered

copies show various‘stages’ of document creation

often inadvertent /i.e./ file slack, swap ‘imperfect’

Page 21: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally21

PAPER-BASED EVIDENCE DIGITAL EVIDENCE

*Transmission

traditional methods: *snail mail *physical delivery *fax

1-to-1 messaging

defined boundaries

limited distribution -transceiver doesn’tretain copies

controlled

Internet; Email; Telnet; FTP;etc. mutable (alteration proof?)

multifaceted- directed broadcast

complex- data on single host

accessed & commingledwith any number of userson the network

distributed -single transmission handledby many carriers, spanningmultiple countries

automated

Page 22: COMPUTER FORENSICS Erin E. Kenneally San Diego Supercomputer Center University of California San Diego erin @ sdsc.edu.

(C) 2001 Kenneally22

PAPER-BASED EVIDENCE DIGITAL EVIDENCE

SECURITY Boundaries:- time, distance, physical

locale- separate people and

forged social identities

- define perimeters forsecuring people andpaper-based info

Boundaries:- time, space, location no

longer define perimeter- between you & I;

or, between my proprietarybusiness database and yourprivate email

- integration of data &communications*Inet phone calls

- applications & services * ASP’s