Académique Documents
Professionnel Documents
Culture Documents
Larry Daniel
Introduction
• A recent research report from The Yankee
Group found that 67.6 percent of US households
in 2002 contained at least one PC
• The investigators foresee three-quarters of all
US households containing PCs by 2007.
Introduction
• The UCLA study found that surprising numbers
of households have more than one PC.
• In cases where more than one PC is present,
the home computers are often networked.
• As of December of 2005, 71.4% of US
households have computers.
Some Famous Criminal Cases
• Scott Peterson
– Internet history showing searches for dump sites.
• Michelle Theer
– Email and other documents. (Over 20 thousand
documents)
• Michael Jackson
– Internet history and Email.
• BTK Killer
– Used to trace letter back to church computer.
Different Sides – Different Roles
• Prosecution Side
– Sworn Law Enforcement Officer
• Writes Search Warrants
• Receives Evidence Computers, etc.
• Acquires Images, Analyzes Data
• Presents findings to Prosecutors and Detectives
• May not be involved again until arrest is made or case goes
to trial.
Different Sides – Different Roles
• Defense Side
– Private Expert
• Receives Evidence from Law Enforcement Agency.
• Consults with Attorney on Relevant Facts
• Active Member of Defense Team
• May Review Other Evidence to Enhance Computer Analysis
• May Interview Defendant
• May Work with Other Experts.
Some Basics
Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations
Fragile Nature of Digital Evidence
• Fragile data are those things stored on the hard drive but
that can be easily altered, especially by a first responder
trying to determine if an incident has occurred.
• These could include access dates on files or temporary
files. Once these files have been altered by a first
responder, there is no way to recover the original data.
Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations
Fragile Nature of Digital Evidence
Source: Preservation of Fragile - Digital Evidence by First Responders - Special Agent Jesse Kornblum -Air Force Office of Special Investigations
Files In Original Condition
Files After Opening and Viewing
General Guidelines
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
General Guidelines for Seizing Computers and Digital Evidence
Source: Maryland State Police - Criminal Enforcement Command -Computer Crimes Unit
Preservation
• Once digital evidence is seized it must be
handled carefully to preserve and protect the
evidence.
– Everything should be tagged.
– No one should operate or preview any evidence on
writable media without proper tools and training.
– Forensically sound copies of all original evidence
must be made before analysis.
– Records must be kept.
Analysis
• Analysis involves recovering and analyzing
evidence for relevance to the case.
– Accepted tools should be used.
– Search and analysis must be within the scope of the
warrant.
– Bench notes should be kept by the examiner.
What are you looking for?
• E-Mail • PDF Files
• Pictures • Suspiciously Renamed
• Internet History Files
• Documents • Yahoo Messenger, AOL
• Spreadsheets Chat, MSN Messenger,
Internet Relay Chat
• Internet Chat Logs
• Many Others
• Financial Data
Hiding The Evidence
• Deleting Files • Using On-Line E-Mail
• Deleting Internet History – Hotmail
– Yahoo Mail
• Formatting Drives
• Re-Partitioning Drives • IPods and personal
storage devices that can
• Physically Destroying be overlooked.
Hard Drives and Floppies
• Passwords
Recovering The Evidence
• Find Deleted Files
• Un-Format Drives
• Rebuild Partitions
• Recover Passwords
• Find hidden files and folders.
• Re-construct web pages.
• Locate deleted Email
Analysis
• Metadata
– Many types of files contain metadata.
• Metadata is information embedded in the file itself that
contains information about the file.
– Microsoft Office Documents
• Computer name
• Total Edit Time
• Number of editing sessions.
• Where printed.
• Number of times saved.
– Digital camera pictures.
• Make and model of camera
• Dates and times
Document Metadata
Picture Metadata
Internet History – Before Clearing
Internet History – After Clearing
Presentation
• Court presentation for a jury must be simple and
straightforward.
– Timelines
– Emails
– Documents
– Pictures
How Computer Evidence is Used
– Verify Alibis
– Establish Relationships Between Defendant and
Victim or Accomplices
– Establish Documentation of Events
– Establish Mitigating Circumstances
– Documents for use by Forensic Psychologists
– Document Time Lines
Discovery
• Officer’s investigator’s notes
• Forensic investigator’s bench notes
• Search warrant
• Forensically sound copies of all imaged media
• Forensics report
Questions?