Top Banner
Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory
31

Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Dec 23, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Digital Evidence Standards

Don Cavender

Computer Analysis Response Team

FBI Laboratory

Page 2: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Why standards?

• A scenario…

Page 3: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Dagestan separatists

• Supported by Islamic fundamentalists

Page 4: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Send two teams:

• Washington • London

Page 5: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Wire transfer funds from:

• Paris • Rome

By means of PC banking

Page 6: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Simultaneously explode two devices

Page 7: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

The crime scenes

• Subjects identified

• Computers recovered

• Reveal communications links

• Requests for investigations

• Additional digital evidence collected

• Digital evidence became the glue

Page 8: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Digital Evidence Trail

Page 9: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Critical issues…

• How do we ask for what evidence?

• Do we get what we thought we asked for?

• Can we use what we received?

Page 10: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Why standards?

• Trans-jurisdictional

• Exchange

• Digital evidence

Page 11: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

What standards?

• Definitions

• Principles

• Processes

• Outcomes

• Common language

Page 12: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

How it started

• 1993 - 1st International Conference on Computer Evidence

• 1995 - International Organization on Computer Evidence formed

• 1997 - IOCE & G-8 independently decide to develop standards

Page 13: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

How it started - continued

• 1998 - G-8 asks IOCE to undertake this initiative

• 1998 - SWG-DE formed to pursue U.S. participation

• 1998 - ACPO, FCG and ENSFI agree to participate

• 1998 - INTERPOL is briefed on progress

Page 14: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Where we are now

• UK Good Practice Guide (ACPO)

• ENSFI Working Group

• SWG-DE draft standards– www.for-swg.org/swgdein.htm (under construction)

• October 4-7, 1999– IOCE, ACPO, FCG & ENSFI meet on European

standards – www.ihcfc.com - results forthcomming

Page 15: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Where we are going

• First you must crawl…

• Create foundation– definitions– principles– processes

• Durable

• Universal– all digital evidence types– mutually understood

Page 16: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

SWG-DE Definitions:Digital evidence -

• is information of probative value stored or transmitted in digital form (SWG-DE 7/14/98)

• is acquired when information and/or physical items are collected and stored for examination purposes. (SWG-DE 8/18/98)

Page 17: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

SWG-DE Principle:Evidence Handling

• ANY action which has the potential to alter, damage or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner (SWG-DE 3/12/99)

Page 18: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

SWG-DE Definitions:Evidence types

• Original digital evidence - physical items and all the associated data objects at the time of acquisition

Page 19: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

SWG-DE Definitions:Evidence types cont.

• Duplicates - an accurate reproduction of all data objects independent of the physical item

• Copy - an accurate reproduction of the information contained in the data objects independent of the physical item.

Page 20: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

In Summary...

• Nearly all computer crime is trans-jurisdictional

• Standards for collection & processing evidence required to share evidence– Adopt standards - compare standards– DE Forensics is a specialty, distinct from computer

investigations

• Forensic Laboratories encouraged to lead effort to develop standards

Page 21: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Questions?

• Mark M. Pollitt

• Unit Chief

[email protected]

• Don Cavender

• Supervisory Special Agent

[email protected]

• Computer Analysis Response Team

• Room 4315

• 935 Pennsylvania Ave, NW

• Washington, DC 20535 USA

• 202.324.9307

Page 22: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Computer Investigative Skills• Digital Evidence Collection Specialist

– First Responder– 2-3 days training– Seize & Preserve Evidentiary Computers/Media

• Computer Investigator– Above experience +– Understanding of Internet/Networks/Tracing computer communications, etc.– 1 to 2 weeks specialized training

• Computer Forensic Examiner– Examines Original Media– Extracts Data for Investigator to review– 4 - 6 weeks specialized training

Page 23: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Digital evidence = Latent evidence:

• Is invisible

• Is easily altered or destroyed

• Requires precautions to prevent alteration

• Requires special tools and equipment

• Requires specialized training

• Requires expert testimony

Page 24: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Forensic Model

People

Equipment

Protocols

Page 25: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Services Provided by Computer Forensic Examiners

• Exams– Computer and diskette exams– Other media - Jaz, Zip, MO, Tape backups– PDA’s

• On site support of search warrants– Consultation with investigators and prosecutors

• Expert testimony for results and procedures

Page 26: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Additional Services

• Recover deleted, erased, and hidden data

• Password and encryption cracking

• Determine effects of code– such as malicious virus

Page 27: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

CART Field Examiner (FE) Certification

• 4-5 weeks specialized in-service training• 4 weeks commercial training• Lab internship if desired or necessary• One year for certification process• $25,000 to train & equip a new examiner• Also, annual re-certification and commercial

training for FE’s - 3 year commitment

Page 28: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Other Computer Forensic Certifications

• SCERS - Treasury version of CART

– also offered to Local LEA through FLETC

• IACIS - LEA non profit association

• Local LEO’s– State Labs

• Some commercial and academic programs in early development

Page 29: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Computer Forensic Training• IACIS - International Association of Computer

Investigative Specialists - http://www.cops.org/

• Federal Law Enforcement Training Center (FLETC) Financial Fraud Institute - (SCERS Training) http://www.treas.gov/fletc/ffi/ffi_home.htm

• HTCIA - High Technology Crime Investigation Association - http://htcia.org/

• SEARCH Group - http://www.search.org/

• National White Collar Crime Center - http://www.cybercrime.org

Page 30: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Computer Forensic Equipment

• Examination Desktop $3,000– Highest performance

affordable– SCSI, DVD, Super Drive– Additional Large Hard Drive

$ 500– Printer $ 500 - $1500

• Search & Examination Notebook $ 3,000– PCMCIA SCSI & Network

Cards $ 300– Additional Large Hard Drive

$ 500

• External Backup (MO, Jaz or Tape Drive) $ 500 - $ 2,000– Parallel to SCSI Adapter $150

• CD Writer $ 500• Forensic Software $ 1,500 - $2,500• Cables/Adapters $ 200 - $ 300• Cases $ 150 - $ 300• PC Tool Kit $ 10 - $ 300 • Media $ 20 - $500 per examination• Range Total $ 10, 000 - $ 15,000

prior to media

Page 31: Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory.

Common challenges faced by Computer Forensic Programs

• Volume of Exams– Proliferation of computers

• Training & Staffing– Enhancements to Computer Crime Investigations w/o enhancements to Computer

Forensic Program

• Equipment– 3 years to obsolescence

– Supplies• Back up media, CD’s, hard drives, misc. hardware, viewing stations

• Space– Secure work/storage area

• Request for assistance by Other Agencies– Travel