31
Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory

Digital Evidence Standards Don Cavender Computer Analysis Response Team FBI Laboratory

Embed Size (px)

Citation preview

Digital Evidence Standards

Don Cavender

Computer Analysis Response Team

FBI Laboratory

Why standards?

• A scenario…

Dagestan separatists

• Supported by Islamic fundamentalists

Send two teams:

• Washington • London

Wire transfer funds from:

• Paris • Rome

By means of PC banking

Simultaneously explode two devices

The crime scenes

• Subjects identified

• Computers recovered

• Reveal communications links

• Requests for investigations

• Additional digital evidence collected

• Digital evidence became the glue

Digital Evidence Trail

Critical issues…

• How do we ask for what evidence?

• Do we get what we thought we asked for?

• Can we use what we received?

Why standards?

• Trans-jurisdictional

• Exchange

• Digital evidence

What standards?

• Definitions

• Principles

• Processes

• Outcomes

• Common language

How it started

• 1993 - 1st International Conference on Computer Evidence

• 1995 - International Organization on Computer Evidence formed

• 1997 - IOCE & G-8 independently decide to develop standards

How it started - continued

• 1998 - G-8 asks IOCE to undertake this initiative

• 1998 - SWG-DE formed to pursue U.S. participation

• 1998 - ACPO, FCG and ENSFI agree to participate

• 1998 - INTERPOL is briefed on progress

Where we are now

• UK Good Practice Guide (ACPO)

• ENSFI Working Group

• SWG-DE draft standards– www.for-swg.org/swgdein.htm (under construction)

• October 4-7, 1999– IOCE, ACPO, FCG & ENSFI meet on European

standards – www.ihcfc.com - results forthcomming

Where we are going

• First you must crawl…

• Create foundation– definitions– principles– processes

• Durable

• Universal– all digital evidence types– mutually understood

SWG-DE Definitions:Digital evidence -

• is information of probative value stored or transmitted in digital form (SWG-DE 7/14/98)

• is acquired when information and/or physical items are collected and stored for examination purposes. (SWG-DE 8/18/98)

SWG-DE Principle:Evidence Handling

• ANY action which has the potential to alter, damage or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner (SWG-DE 3/12/99)

SWG-DE Definitions:Evidence types

• Original digital evidence - physical items and all the associated data objects at the time of acquisition

SWG-DE Definitions:Evidence types cont.

• Duplicates - an accurate reproduction of all data objects independent of the physical item

• Copy - an accurate reproduction of the information contained in the data objects independent of the physical item.

In Summary...

• Nearly all computer crime is trans-jurisdictional

• Standards for collection & processing evidence required to share evidence– Adopt standards - compare standards– DE Forensics is a specialty, distinct from computer

investigations

• Forensic Laboratories encouraged to lead effort to develop standards

Questions?

• Mark M. Pollitt

• Unit Chief

[email protected]

• Don Cavender

• Supervisory Special Agent

[email protected]

• Computer Analysis Response Team

• Room 4315

• 935 Pennsylvania Ave, NW

• Washington, DC 20535 USA

• 202.324.9307

Computer Investigative Skills• Digital Evidence Collection Specialist

– First Responder– 2-3 days training– Seize & Preserve Evidentiary Computers/Media

• Computer Investigator– Above experience +– Understanding of Internet/Networks/Tracing computer communications, etc.– 1 to 2 weeks specialized training

• Computer Forensic Examiner– Examines Original Media– Extracts Data for Investigator to review– 4 - 6 weeks specialized training

Digital evidence = Latent evidence:

• Is invisible

• Is easily altered or destroyed

• Requires precautions to prevent alteration

• Requires special tools and equipment

• Requires specialized training

• Requires expert testimony

Forensic Model

People

Equipment

Protocols

Services Provided by Computer Forensic Examiners

• Exams– Computer and diskette exams– Other media - Jaz, Zip, MO, Tape backups– PDA’s

• On site support of search warrants– Consultation with investigators and prosecutors

• Expert testimony for results and procedures

Additional Services

• Recover deleted, erased, and hidden data

• Password and encryption cracking

• Determine effects of code– such as malicious virus

CART Field Examiner (FE) Certification

• 4-5 weeks specialized in-service training• 4 weeks commercial training• Lab internship if desired or necessary• One year for certification process• $25,000 to train & equip a new examiner• Also, annual re-certification and commercial

training for FE’s - 3 year commitment

Other Computer Forensic Certifications

• SCERS - Treasury version of CART

– also offered to Local LEA through FLETC

• IACIS - LEA non profit association

• Local LEO’s– State Labs

• Some commercial and academic programs in early development

Computer Forensic Training• IACIS - International Association of Computer

Investigative Specialists - http://www.cops.org/

• Federal Law Enforcement Training Center (FLETC) Financial Fraud Institute - (SCERS Training) http://www.treas.gov/fletc/ffi/ffi_home.htm

• HTCIA - High Technology Crime Investigation Association - http://htcia.org/

• SEARCH Group - http://www.search.org/

• National White Collar Crime Center - http://www.cybercrime.org

Computer Forensic Equipment

• Examination Desktop $3,000– Highest performance

affordable– SCSI, DVD, Super Drive– Additional Large Hard Drive

$ 500– Printer $ 500 - $1500

• Search & Examination Notebook $ 3,000– PCMCIA SCSI & Network

Cards $ 300– Additional Large Hard Drive

$ 500

• External Backup (MO, Jaz or Tape Drive) $ 500 - $ 2,000– Parallel to SCSI Adapter $150

• CD Writer $ 500• Forensic Software $ 1,500 - $2,500• Cables/Adapters $ 200 - $ 300• Cases $ 150 - $ 300• PC Tool Kit $ 10 - $ 300 • Media $ 20 - $500 per examination• Range Total $ 10, 000 - $ 15,000

prior to media

Common challenges faced by Computer Forensic Programs

• Volume of Exams– Proliferation of computers

• Training & Staffing– Enhancements to Computer Crime Investigations w/o enhancements to Computer

Forensic Program

• Equipment– 3 years to obsolescence

– Supplies• Back up media, CD’s, hard drives, misc. hardware, viewing stations

• Space– Secure work/storage area

• Request for assistance by Other Agencies– Travel