Top Banner
elaw.com.au Forensic Computing Operational Procedures Allan Watt Dip Policing, BBS, PGDip Forensic, MSc (Hons), CFCE, CFE 5 August 2010
26

Forensics computing operational procedures

Jun 08, 2015

Download

Education

Overview for forensics computing operational procedures
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Forensics computing operational procedures

elaw.com.au

Forensic Computing Operational Procedures

Allan WattDip Policing, BBS, PGDip Forensic, MSc (Hons), CFCE, CFE5 August 2010

Page 2: Forensics computing operational procedures

Forensic Computing Operational Procedures

2

Overview

– Pre-seizure, ensuring you are prepared for deployment– Attendance at execution orders– Obtaining an accurate brief from the client– The pre-analysis plan– Conducting analysis – Case studies

Page 3: Forensics computing operational procedures

Pre-seizure, ensuring you are prepared for deployment

Forensic Computing Operational Procedures

3

• It’s about Criminal but also a lot about Civil

• Crime is only about 30%

• Civil you must know what the client wants

• What they want to spend

• What do they want as far as output (Report, affidavit etc)

• If they don’t get it they may not pay the bill

• Need to communicate constantly

Page 4: Forensics computing operational procedures

Problems

Forensic Computing Operational Procedures

4

• Bleeding to death scenario

• I need an ambulance now at any cost

• Less is more, well is costs more anyway

• A big problem when it is not there or easily retrievable

Page 5: Forensics computing operational procedures

Pre-deployment

Forensic Computing Operational Procedures

5

• Obtain as much information as you can pre-deployment, even if it is your client

• What type of case is it?

• Could affect the standard of evidence

• e.discovery vs e.forensics

• What is the client after, what evidence do they require?

• No point cloning the mail server if email is not involved

• Gather as much intel about what IT infrastructure

Page 6: Forensics computing operational procedures

Predeployment

Forensic Computing Operational Procedures

6

• Consider all possibilities with covert collections

• Have contingences available

• Back out plan

• Consider the masquerade

Page 7: Forensics computing operational procedures

Packing to go

Forensic Computing Operational Procedures

7

• What to take:

• Labels

• Notebook

• Receipts/ Exhibit sheets

• Sketching material – floor plans

• Still and video camera

• Security

• Transport

• Gloves

Page 8: Forensics computing operational procedures

Packing to go

Forensic Computing Operational Procedures

8

• Torch

• Cables

• Toolkit

• Tech sheets

Page 9: Forensics computing operational procedures

Forensic Computing Operational Procedures

9

• Decide whether to pull the plug or shut down• differing evidence for each approach

• Remember cable configuration• Remember to get the internal clock times off all devices• Remember drive configuration

• The RAID may not work• Remember to plug the drives back in

• It may sound stupid but it happens

Page 10: Forensics computing operational procedures

What to do when collection is restricted to onsite

Forensic Computing Operational Procedures

10

• Ensure you take:

• sufficient equipment

• Technology

• Knowledge

• Correct peripherals and blockers

• Don’t turn up with a bulldozer when you need a teaspoon

• With civil orders, the client still has a life to live and a business to run

Page 11: Forensics computing operational procedures

Onsite restrictions

Forensic Computing Operational Procedures

11

• Make sure you have enough donor media

• Make sure it is cleansed

• Consider security as well, hostilities can be a problem

• Interference or even theft of evidence

• Logistics support in the event you may be there for a long time

• 16 hours can be a long time watching the grass grow on an empty stomach

Page 12: Forensics computing operational procedures

Obtaining an accurate brief from the client

Forensic Computing Operational Procedures

12

• Outcome

• legal

• dismissal

• fishing expedition (Covert enquiry)

• Prevention

• Output

• what do they need or

• what is needed to obtain the outcome

Page 13: Forensics computing operational procedures

Obtaining an accurate brief from the client

Forensic Computing Operational Procedures

13

• What is needed to get the required data to provide this output

• What sources are required, does the client have access to them

• Get

• Dates

• Times

• location

Page 14: Forensics computing operational procedures

Forensic Computing Operational Procedures

14

• email addresses

• computer usage post incident

• who has had access, (pre and post)

• usernames and passwords

• names of persons involved

• legal privilege

• criminal post action

Page 15: Forensics computing operational procedures

The pre-analysis plan

Forensic Computing Operational Procedures

15

• You may end up in a sausage factory

• What flavour would you like?

• Horses for courses

• Sometimes you may need all of the following sometimes one

• Every case is different need to adjust to suit each case and may need to adjust on the way as the scene changes

Page 16: Forensics computing operational procedures

Investigations Categories

Forensic Computing Operational Procedures

16

• Four main categories

• Data movement

• Authentication of data

• System - User activity

• Content

Page 17: Forensics computing operational procedures

Data movement

Forensic Computing Operational Procedures

17

• Link files

• last access dates(check for AV)

• Registry

• USB CD etc,

• MRU

• Webmail

• Browser history

Page 18: Forensics computing operational procedures

Authentication of data

Forensic Computing Operational Procedures

18

• OS metadata

• app metadata

• Datetime.cpl

• link files

• MRU

• temp files – data carve

• lack of original files

Page 19: Forensics computing operational procedures

User activity

Forensic Computing Operational Procedures

19

• Registry

• last log in

• web history

• email, banking, trading, hobbies/sports–

• cookie dates,

• other unrelated computer evidence such as door access

• emails

Page 20: Forensics computing operational procedures

User activity

Forensic Computing Operational Procedures

20

• data carve web pages

• consider gaming interaction and logging

• event files

Page 21: Forensics computing operational procedures

Content

Forensic Computing Operational Procedures

21

• web history

• web content

• encrypted data

• text image data (scanned text)

• email parsing

• compressed/zip files

• Then keyword search (consider which to use benefits and drawbacks)

• live

• index

Page 22: Forensics computing operational procedures

Conducting analysis

Forensic Computing Operational Procedures

22

• Time is money in the outside world and the client won’t pay for time spent fishing for irrelevant information

• Browse the files and use your eyes, look through the trees and not at them and look for things that are out of place.

• Sort by,

• last accessed,

• Modified

• created and

• look at other activity around the same time

Page 23: Forensics computing operational procedures

Conducting analysis

Forensic Computing Operational Procedures

23

• Look for methods to directly locate what you are looking for but don’t shortcut so you miss the smoking gun

• Use the power of the tools and make them do the work and limit what you have to look at

• Stick to your plan

• Stick to your knitting

Page 24: Forensics computing operational procedures

Conducting analysis

Forensic Computing Operational Procedures

24

• Email – then process the email

• Image files then locate current and deleted image files

• User activity

• look for who was using it

• what and

• when within minutes

• check cookie times – good source of independent time assessment

• Can we really ever say who was or was not using the computer?

Page 25: Forensics computing operational procedures

Case studies

Forensic Computing Operational Procedures

25

• Tran

• Travel Agent

• Nth Syd Software Coy

• Yachting Architect

• Tainui

• Uncle Niece

• UNITEC

• Family Cases – Plane – Apartment – Dating sites

• Stolen laptop

• Breach of court order laptop

Page 26: Forensics computing operational procedures

Questions?

Allan Watt

[email protected]

(02) 9221 1366 Office

04 2356 7813 Mobile

Forensic Computing Operational Procedures

26