Handling of Digital Evidence Pertemuan-3
Dosen :Kundang K Juman
Welcome
Welcome
Information Systems
Information Systems
Security Association
Security Association
May 8, 2007
May 8, 2007
FBI Update FBI Update
Agenda
Agenda
Case UpdateCase Update
FBI ActivitiesFBI Activities
FBI Cyber Investigations
FBI Cyber Investigations
Computer Intrusion MattersComputer Intrusion Matters
Innocent Images National InitiativesInnocent Images National Initiatives
Intellectual Property Rights MattersIntellectual Property Rights Matters
Computer Intrusion Matters
Computer Intrusion Matters
Financial InstitutionsFinancial Institutions
Phishing schemesPhishing schemes ManufacturingManufacturing
Installation of Warez siteInstallation of Warez site USB HacksawUSB Hacksaw
UniversitiesUniversities
Innocent Images National Initiative
Innocent Images National Initiative
Undercover OperationsUndercover Operations
TravelersTravelers DistributorsDistributors
Intellectual Property Rights
Intellectual Property Rights
Theft of Trade Secret InvestigationsTheft of Trade Secret Investigations
Organizations need to protect information in Organizations need to protect information in
accordance with legal requirements (Title 18 accordance with legal requirements (Title 18
US Code Section 1832) US Code Section 1832)
Recording Industry Association of America Recording Industry Association of America
(RIAA) (RIAA)
Motion Picture Industry Association of Motion Picture Industry Association of
America (MPAA) America (MPAA)
Internet Fraud
Internet Fraud
Click Fraud InvestigationClick Fraud Investigation
Regional Cyber Action Team
Regional Cyber Action Team
Mission
Mission
Respond to significant computer intrusions which threaten national Respond to significant computer intrusions which threaten national
critical infrastructures or impact the national economy or security. critical infrastructures or impact the national economy or security.
Provide expertise and resources to assist affected Field Offices.Provide expertise and resources to assist affected Field Offices. Augment ResourcesAugment Resources
Harvest data during the investigation and analyze that data to derive Harvest data during the investigation and analyze that data to derive
useful intelligence. useful intelligence.
Strategic intelligenceStrategic intelligence Operational intelligence Operational intelligence
Coordinate the Computer Intrusion Program’s major cases and Coordinate the Computer Intrusion Program’s major cases and
initiatives from FBIHQ. initiatives from FBIHQ.
Botnet InitiativeBotnet Initiative Top Ten HackersTop Ten Hackers
DOE/FBI Working GroupDOE/FBI Working Group
Typical CAT Deployment
Typical CAT Deployment
SSA (2)SSA (2)
Team LeadersTeam Leaders
Experienced cybercrime agentsExperienced cybercrime agents DeployabilityDeployability
Intelligence Analysts (2)Intelligence Analysts (2) Operational intelligenceOperational intelligence
Conduct toll analysis, linkage analysis, public records searches, Conduct toll analysis, linkage analysis, public records searches,
financial analysis, ACS and other database mining
financial analysis, ACS and other database mining
Interface with Information Sharing & Analysis Section (ISAS) to Interface with Information Sharing & Analysis Section (ISAS) to
produce assessments and bulletins, develop cases when not
produce assessments and bulletins, develop cases when not
deployed in support of Field
deployed in support of Field ITS (2)ITS (2)
Technically trained specialistsTechnically trained specialists
Interacts with Technical PersonnelInteracts with Technical Personnel Review technical data/evidenceReview technical data/evidence
Assists in creation of technical solutions to house and analyze data Assists in creation of technical solutions to house and analyze data
within CATU
Regional
Regional
CAT
CAT
46** members from four regions46** members from four regions NortheastNortheast
Southeast Southeast CentralCentral
WestWest
Augments CATAugments CAT ““Cadre” conceptCadre” concept
Specialized training, equipment, communication with Specialized training, equipment, communication with
HQ….within Field Office
HQ….within Field Office
Disclaimer
Disclaimer
Do not attempt this without first seeking Do not attempt this without first seeking
appropriate legal advice and documenting appropriate legal advice and documenting
a legal opinion. a legal opinion.
Each and every situation is unique and Each and every situation is unique and
should be handled on a case by case should be handled on a case by case
basis. basis.
All cases must be handled in accordance All cases must be handled in accordance
with a legal framework consistent with with a legal framework consistent with
Objectives
Objectives
What is Digital EvidenceWhat is Digital Evidence
Considerations with Digital EvidenceConsiderations with Digital Evidence
Guidelines for Seizing Digital EvidenceGuidelines for Seizing Digital Evidence
Guidelines for Seizing Live Digital Guidelines for Seizing Live Digital
Evidence Evidence
Typical Legal Process
Typical Legal Process
Incident OccursIncident Occurs
Determine Nature and ScopeDetermine Nature and Scope
Policy Violation or Criminal ConductPolicy Violation or Criminal Conduct Investigation InitiatedInvestigation Initiated
Internal Corporate InvestigationInternal Corporate Investigation Referral to Law EnforcementReferral to Law Enforcement Evidence is CollectedEvidence is Collected
Digital Evidence vs. Physical EvidenceDigital Evidence vs. Physical Evidence
Follow Legal Protocol for Collection and PreservationFollow Legal Protocol for Collection and Preservation Interviews are ConductedInterviews are Conducted
Direct Witnesses or VictimsDirect Witnesses or Victims
Third Party Witnesses Such as ISPsThird Party Witnesses Such as ISPs Legal Action is InitiatedLegal Action is Initiated
Criminal or CivilCriminal or Civil
Administrative Sanctions Such as Employee DismissalAdministrative Sanctions Such as Employee Dismissal
Computer Security Incident
Computer Security Incident
Response Team
Response Team
Establish User Policies – Implementable, Establish User Policies – Implementable,
Enforceable and Function as Expected Enforceable and Function as Expected
Establish a CSIRT to Respond to Incidents Establish a CSIRT to Respond to Incidents
Within Organizations and Support External Within Organizations and Support External
Requests Requests
Identify Operational Elements – Team Identify Operational Elements – Team
Rules Governing Evidence
Rules Governing Evidence
Collection
Collection
US ConstitutionUS Constitution
44thth Amendment – Reasonable Expectation of Privacy Amendment – Reasonable Expectation of Privacy
Is Government Action Involved?Is Government Action Involved?
The Wiretap ActThe Wiretap Act
Omnibus Crime Control and Safe Streets Act of 1968 Omnibus Crime Control and Safe Streets Act of 1968
(18 USC Section 2501)
(18 USC Section 2501)
Electronic Communications Privacy ActElectronic Communications Privacy Act 18 USC Section 270118 USC Section 2701
What is Digital Evidence?
What is Digital Evidence?
Any kind of storage deviceAny kind of storage device
Computers, CD’s, DVD’s, floppy disks, hard Computers, CD’s, DVD’s, floppy disks, hard
drives, thumb drives drives, thumb drives
Digital cameras, memory sticks and memory Digital cameras, memory sticks and memory
cards, PDA’s, cell phones cards, PDA’s, cell phones
Fax machines, answering machines, cordless Fax machines, answering machines, cordless
phones, pagers, caller-ID, scanners, printers phones, pagers, caller-ID, scanners, printers
and copiers and copiers
Considerations with Digital
Considerations with Digital
Evidence
Evidence
Digital evidence is fragileDigital evidence is fragile
Recognizing potential evidenceRecognizing potential evidence The role of the computer in the The role of the computer in the
crime/violation crime/violation
Guidelines for Seizing Digital
Guidelines for Seizing Digital
Evidence
Evidence
Secure the sceneSecure the scene
Guidelines for Seizing Digital
Guidelines for Seizing Digital
Evidence
Evidence
Determine if any information in Determine if any information in
the memory is important the memory is important
If computer is “OFF” do NOT If computer is “OFF” do NOT
turn “ON”. turn “ON”.
Photograph Monitor & Photograph Monitor &
Document active programs Document active programs
Disconnect Internet/Ethernet Disconnect Internet/Ethernet
Access Access
Guidelines for Seizing Digital
Guidelines for Seizing Digital
Evidence
Evidence
Take all peripheralsTake all peripherals
Obtain passwords, if possibleObtain passwords, if possible
Photograph scenePhotograph scene
Process scene for other Process scene for other
storage devices
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
Four Phases of Incident ResponseFour Phases of Incident Response11
PreparationPreparation
Detection/AnalysisDetection/Analysis
Containment, Eradication, and RecoveryContainment, Eradication, and Recovery Post-Incident ActivityPost-Incident Activity
1
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
PreparationPreparation
Capability to respondCapability to respond Preventing incidentsPreventing incidents Response ToolsResponse Tools
Contact listContact list
Communication equipmentCommunication equipment Software/HardwareSoftware/Hardware
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
Detection and AnalysisDetection and Analysis
Most challenging part to detect and assessMost challenging part to detect and assess
SoftwareSoftware
Problems users reportProblems users report Obvious signsObvious signs
AssessmentAssessment
Determine if incident needs attentionDetermine if incident needs attention
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
Containment, Eradication, and RecoveryContainment, Eradication, and Recovery Develop containment strategyDevelop containment strategy
Will vary based on the type of incidentWill vary based on the type of incident
Need to consider when to containNeed to consider when to contain
Document every stepDocument every step
Evidence should be accounted for at all timesEvidence should be accounted for at all times
Consider screen captures before copying evidenceConsider screen captures before copying evidence After acquiring volatile data, make disk imageAfter acquiring volatile data, make disk image
Eradication and RecoveryEradication and Recovery
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
Post-Incident ActivityPost-Incident Activity
Perform debriefingPerform debriefing
Lessons learnedLessons learned
Evidence RetentionEvidence Retention
ProsecutionProsecution
Will need to clear with legal/law enforcementWill need to clear with legal/law enforcement
Policy on data retentionPolicy on data retention
90 days, 180 days, etc for future incidents90 days, 180 days, etc for future incidents
CostCost
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence
Evidence
Document EverythingDocument Everything
Attach Another Device or use Open Attach Another Device or use Open
Network Connection Network Connection
Record System Date/TimeRecord System Date/Time
Determine LogonDetermine Logon
Guidelines for Seizing Live Digital
Guidelines for Seizing Live Digital
Evidence (cont.)
Evidence (cont.)
List Socket ProcessesList Socket Processes List Running ProcessesList Running Processes List Systems ConnectedList Systems Connected Record Steps TakenRecord Steps Taken
Save all Pertinent Data to External DeviceSave all Pertinent Data to External Device Minimal Commands to Acquire Digital Minimal Commands to Acquire Digital
Evidence Evidence
Cause the Least Amount of Damage as Cause the Least Amount of Damage as
Preparing Your Case
Preparing Your Case
Documentation
Documentation
Documentation is a Reflection of Your Documentation is a Reflection of Your
Case Case
Problems Arise When Shortcuts are TakenProblems Arise When Shortcuts are Taken
Conditions of All Evidence Needs to be Conditions of All Evidence Needs to be
Documented Documented
Preservation
Preservation
If Preservation Poor, Your Handling/Collecting If Preservation Poor, Your Handling/Collecting
Techniques Become Questionable. Techniques Become Questionable.
Maintain Chain of CustodyMaintain Chain of Custody
Eliminate ANY Possibility of ContaminationEliminate ANY Possibility of Contamination CollectionCollection
TransportationTransportation StorageStorage
Authentication
Authentication
If Authentication is Poor, Everything Comes into If Authentication is Poor, Everything Comes into
Question. Question.
MD5 or SHA algorithmMD5 or SHA algorithm
Ensure bit-by-bit copy of originalEnsure bit-by-bit copy of original
Ensure evidence unalteredEnsure evidence unaltered
Need to Demonstrate Evidence is…Need to Demonstrate Evidence is… What you say it is.What you say it is.
Came from where you say it did.Came from where you say it did.
Has not been modified in any way since you last handled it.Has not been modified in any way since you last handled it.
General Do’s and Don’ts of
General Do’s and Don’ts of
Evidence
Evidence
Minimize Handling/Corruption of Original DataMinimize Handling/Corruption of Original Data
Account for Any Changes and Keep Detailed Logs of Your Actions Account for Any Changes and Keep Detailed Logs of Your Actions
Maintain a detailed log of who handled the evidence and where stored and when Maintain a detailed log of who handled the evidence and where stored and when
transferred transferred
Comply with the Five Rules of Comply with the Five Rules of EvidenceEvidence
AdmissibleAdmissible AuthenticAuthentic CompleteComplete ReliableReliable
Believable (Criminal - Reasonable Doubt? Civil – Preponderance of the Believable (Criminal - Reasonable Doubt? Civil – Preponderance of the
Evidence) Evidence)
Do Not Exceed Your Knowledge Do Not Exceed Your Knowledge
Follow Your Local Security Policy and Obtain Written Permission Follow Your Local Security Policy and Obtain Written Permission Capture as Accurate an Image of the System as Possible Capture as Accurate an Image of the System as Possible
Be Prepared to Testify Be Prepared to Testify
Ensure Your Actions are Repeatable Ensure Your Actions are Repeatable
Proceed From Volatile to Persistent Proceed From Volatile to Persistent EvidenceEvidence Don't Run Any Programs on the Affected System Don't Run Any Programs on the Affected System
Resources
Resources
Digital Evidence in the Courtroom: A Guide for Digital Evidence in the Courtroom: A Guide for
Preparing Digital Evidence for Courtroom Preparing Digital Evidence for Courtroom
Presentation – The National Center for Forensic Presentation – The National Center for Forensic
Science Science
Handbook for Computer Security Incident Handbook for Computer Security Incident
Response Teams – CERT Coordination Center Response Teams – CERT Coordination Center
Searching and Seizing Computers and Searching and Seizing Computers and
Obtaining Electronic Evidence in Criminal Obtaining Electronic Evidence in Criminal
Investigations – US Department of Justice, Investigations – US Department of Justice,
Cybercrime.gov/searchmanual.htm Cybercrime.gov/searchmanual.htm
Computer Security Incident Handling Guide – Computer Security Incident Handling Guide –
Many Thanks To:
Many Thanks To:
Sgt. Aaron DeLashmuttSgt. Aaron DeLashmutt
Iowa State University Police Iowa State University Police
168 Armory Building 168 Armory Building
Ames, IA 50011 Ames, IA 50011
Presented at: Presented at:
InfraGard – Des Moines, IAInfraGard – Des Moines, IA