How to Triage Computer Evidence New Articles

Transcription

How to Triage Computer Evidence New Articles
Evidence Technology Magazine - How to Triage Computer Evidence
1 of 4
HOME
ABOUT
SUBSCRIBE
New Articles
ISSUES
VENDORS
RESOURCES
http://www.evidencemagazine.com/index.php?option=com_content&ta...
NEWSLETTERS
CONTACT
TRAINING CALENDAR
How to Triage Computer Evidence
Written by David Kennedy and David Sun
High-Accuracy Wireless
Location
Tool Kit: Microscopy Tools
Online data explosion brings
new forensic collection
techniques
Applied CSI Training Leaves its
Mark in the Field
Interview: Donna Kelley
How to Triage Computer Evidence:
Tackle Moore’s Law with Less
ADVERTISE
Username
Password
Remember me
Lost Password?
No account yet? Register
Latest News
How To: Logging In to ETM
Online
Find ETM on Facebook
Follow ETM on Twitter
ETM Now on Your iPhone or
iPad
Free Translation Cards
RSS Feed
IF YOU PROCESS digital evidence on a day-to-day basis, chances are those days
are booked up for weeks to come. How long, on average, does it take your team to
analyze the data in a new case? Security, law enforcement, and corporate computerforensics departments are stretched beyond their resources; reported backlogs of
digital evidence vary but they are often in the eight- to 12-month range or more.
Take a quick glance at why these backlogs exist, and it becomes obvious that things
will not get better by simply doing more of the same. The rapid growth of digital
devices is readily apparent as netbooks, smart phones, and flash drives have joined
desktop computers and laptops as standard computing fare. Underneath the plastic
and metal bits is the true, less discernible reason for the backlog scramble: the
storage capacity of these devices has grown exponentially. Traditionally, the more
storage capacity a device has, the longer it takes to analyze it thoroughly.
Blame Moore’s Law—Sort Of
You may have heard of Moore’s Law. Originally, it was a prediction made 45 years
ago by Intel co-founder Gordon E. Moore, regarding the growing number of
transistors that engineers could cram onto a microchip. Over the years, the
interpretation of Moore’s Law has expanded to generally describe other long-term
trends in computer development—specifically, computer capacity. The amount of
processing speed, memory, and digital-storage capacity per dollar spent have
approximately doubled every two years.
Let that settle in for a moment:
Digital-storage capacity has approximately doubled every two years.
If a corporate or law-enforcement department with four computer-forensics
specialists was able to keep up with new evidence in a timely manner four years
ago, it would have required nearly double the manpower two years later to do the
same work in the same amount of time. In other words, that department would now
require eight employees. Fast-forward another two years, and that same department
would need 16 computer-forensics experts to handle the same load. Assuming a
status-quo approach to the problem, in another two years, you will need 32 experts
to perform in the same capacity.
How many departments have computer-forensics budgets that can keep up with an
800-percent increase in personnel over a six-year period? It simply is not feasible,
which is why we are where we are today.
Eenie-meenie-miney-Moore:
Triage away the irrelevant
If storage capacity creates a problem for thoroughly analyzing evidence, it may be
time to analyze less evidence—or at least prioritize the evidence to determine what
gets attention first. Among the piles of laptops, desktops, and netbooks, which
device is most likely to contain the critical details needed to build your body of
evidence?
Hospitals and medical clinics have managed a very similar problem. In high-volume
periods of time, care providers are forced to ask, “Who needs valuable resources
first?” Patients’ symptoms are assessed as soon as they walk though the door.
Patients are not seen by doctors on a first-in, first-out basis. How often does
someone who needs earwax removed see a doctor ahead of the guy with the broken
arm? Chances are a clogged ear will not find its way to a doctor at all; the nurses
are more available and they can readily handle this case. Patients are sorted by the
severity of their condition, and resources are applied first where they are needed
most.
Digital-Image
Management at Mass
Gravesites
SKELETONIZED REMAINS that were
carefully unearthed from the desert
sands of Iraq tell their own story: the
bones of an adult, still dressed in a
woman’s apparel, lie supine. The skull
is perforated by a bullet hole. Tucked
in the space between the ribs and the
left humerus is a much smaller
skeleton, bones in the skull un-fused,
and the fully clothed body partially
swaddled in a blanket.
Read more...
This is triage in action.
Out of the hospital...
3/5/2013 6:07 PM
Evidence Technology Magazine - How to Triage Computer Evidence
2 of 4
http://www.evidencemagazine.com/index.php?option=com_content&ta...
and back to the crime scene
Ready to tackle that computer-evidence backlog? With a triage procedure and the
right tools in place, first responders can perform a preliminary review on site. With an
ideal tool, investigators can prioritize evidence by likelihood of relevancy.
Consider a crime scene that has 20 computers. If only three of those computers
contain relevant data, a well-executed triage will prioritize those three above the
others for a computer-forensics analyst’s precious time back in the lab. Seventeen of
those computers may never need more than the preliminary triage.
There are a couple of tools already on the market that are being leveraged for
different computer-evidence triage strategies. Many factors go into crafting a triage
procedure. From here on out, this article will focus on considerations for choosing
the tools for your new computer-evidence preliminary-assessment plan.
A quick disclaimer: We are operating under the assumption that installing software
on the computer about to be examined is a bad idea. While conventional free
software (Google Desktop, for example) enables some of the search and preliminary
analysis capabilities we are about to talk about, installing software directly onto a
suspect machine may overwrite the evidence you are trying to capture. Other
options that do not “leave a trace” are rapidly dropping in price with new players on
the field, making it increasingly easier to avoid software installation on evidentiary
media simply as a means of cutting costs.
BitFlare, by SunBlock Systems, is a freely available CD that can be
downloaded directly from their website. Suspect machines are booted off of this
CD. Extracted evidence is saved on standard, readily available external USB
hard drives. There are no up-front software license fees; users are able to
perform a high-level examination for free, and only pay to document and extract
relevant results. www.bitflare.com
COFEE (Computer Online For-ensic Evidence Extractor), by Micro-soft, is a
USB-drive solution that is available for law enforcement. After registering, you
can download the program and save it on as many USB flash drives as you
would like. It is essentially a collection of tools available publicly for download
from the Microsoft website enabling the collection of files and operating-system
data from the computer. www.microsoft.com
EnCase Forensic, by Guidance Soft-ware, has been used in the past by trained
forensic investigators in “Preview Mode” on site to assist with triage. The
computer-forensics product is aimed at professionals and is a staple in the
industry. However, some consider it ill-suited for onsite triage, as the license
dongle is limited to one machine at a time. www.guidancesoftware.com
EnCase Portable was recently released by Guidance Software, partially to
address the first-responder limitations of EnCase Forensic. Users can purchase
an EnCase Portable package that includes USB Hub, CD, and dongle kit.
www.guidancesoftware.com
Triage-ID is one component of several offerings from ADF Solutions. Groups
can license copies of the software. The license itself resides on a USB dongle.
Much like BitFlare, suspect machines can be booted off a CD. Unlike EnCase
Portable, the dongle is not limited to one machine at a time.
www.adfsolutions.com
Qualities to consider
when choosing your triage toolkit
A triage tool needs to allow for preliminary analysis. Welcome to our most obvious
requirement: You must be able to quickly assess what is on the machine! You will
want to be able to leverage the machine’s computing power itself. To simplify the
process, you will want to avoid removing the hard drive. Key-word searching and
file-metadata analysis are typical tools found in computer forensic software, and your
triage tool should offer no less than these capabilities.
Several options are designed for you to run the software directly on the computer.
BitFlare and Triage-ID each contain their own operating systems and boot off of a
CD. After inserting the disk and powering it up, the suspect computer will serve as
your triage platform onsite or back at the laboratory. EnCase Portable can be run on
the machine while it is running, or you can boot up the suspect computer with an
included CD. Traditionally, while some computer-forensics teams have been
dabbling in triage and have used EnCase Forensic in Preview mode, the industry
(and Guidance Software itself, with its release of EnCase Portable) should move
past this. This method requires you to install the program onto the suspect
computer’s hard drive, or remove the hard drive and connect it to another machine.
Given the ever-increasing amounts of data on hard drives, keyword search-ing is a
critical component of sifting through the bytes. Keywords also play a crucial role in
triaging an incident. If you are investigating a kidnapping and are triaging 100
computers in a school, which ones will you review? Try search-ing for the
individual’s e-mail address on each one. If only one or two computers contain hits for
that keyword, you have very effectively narrowed your scope.
More powerful keyword searches, called regular expressions, can locate patterns of
data, such as Social Security, credit card, and phone numbers. This additional
search feature is commonly available in new computer-forensics triage software, but
it is worth noting this feature in the event that it is missing from your triage software
of choice.
Reviewing file listings and associated metadata can quickly build a general overview
of what has been happening recently on a machine. Metadata includes
characteristics such as file type, the number of times the file was modified or
accessed, file size, and where on the computer the file is located. If you are
responding to an incident that occurred that day, could files deleted that morning be
of interest? If you are interested in utilizing this capability in the field, neither EnCase
Portable nor Microsoft’s COFEE allow for in-situ review of the entire drive. BitFlare
will, and provides broad categories to filter by such as image and video files, or
Microsoft Office files.
Quickly access the “forensic” areas of digital evidence. You may already know that a
good deal of the data on a computer hard drive is not merely found in files. While a
3/5/2013 6:07 PM
Evidence Technology Magazine - How to Triage Computer Evidence
3 of 4
http://www.evidencemagazine.com/index.php?option=com_content&ta...
myriad of technical terms such as slack space, unallocated space, and boot
partitions define specific areas of a hard drive not defined by the file system, we can
generally bundle them all together and refer to them as forensic areas. Ignoring
these forensic areas has been one approach some have taken when looking to
improve turnaround times. Analyzing this information is becoming easier and easier.
Do not pass it up!
There is a laundry list of potentially relevant data in these forensic areas. When a
file is deleted, oftentimes pieces of it are left on the hard drive—and sometimes
several copies are scattered about. Many Internet browsers create temporary files
when viewing a web page, only to delete them later. These webpage fragments can
contain key information, including banking statements as well as e-mails read and
sent over popular web-mail services. If you are in computer forensics, you have
likely run across many suspects who turn to web mail for its perceived privacy.
Currently, neither EnCase Portable nor COFEE accesses this part of the hard drive;
BitFlare and Triage-ID offer keyword searches aimed primarily at carving data from
these forensic areas.
Your tool should not limit the scope of your triage. When it comes to triage-capable
software options, there are several different licensing models available. Depending
on the volume of evidence and your triage-procedure goals, differing models can
impact your ability to work. Most dongle-based licensed products, such as EnCase
Forensic or EnCase Portable, will limit the number of machines you can analyze at
one time by the number of licenses you purchase. As long as the machines you are
triaging are in the same location, Triage-ID does allow for parallel processing; its
software dongle is only required at boot-up. BitFlare operates completely
dongle-free and is limited only by the number of BitFlare CDs available (or CD-Rs, if
you have a burner on hand).
Triage with your nurses, not your doctors. In the old days, doctors made house calls:
one patient examined by one doctor. The triage approach at hospitals works so well
because positions requiring less training—such as front-desk receptionists or nurses
or students-in-residency—help handle patients’ needs when they do not require the
doctor’s attention. When implementing electronic-evidence triage, you will want to
leverage less resource-intensive employees, as well.
Many of the newer computer-forensic triage tools on the market today are
specifically aimed at minimizing the amount of training needed for usage. Most
solutions have been designed to easily deploy the solution on the evidentiary
machine, regardless of the user’s level of training.
BitFlare’s interface is even wizard-driven: it uses a step-by-step process for
extracting data, complete with Next and Back buttons. Data extraction is driven by
selecting Evidence Discovery Packs, or EDPs, off of their website. The website
builds the queries customized for the matter on hand. The process is about as
complicated as adding a video to a NetFlix queue.
Forensic-imaging capability is a must. Triaging a situation will not always be perfect.
Ongoing investigations continually generate new leads and relationships.
If you cannot always seize and store all of the computers throughout the duration of
your investigation, you will need a tool that will forensically preserve the computer. A
forensic preservation creates a perfect copy of the data, including forensic areas,
just as it is on the computer in question.
BitFlare, Triage-ID, EnCase Portable, and EnCase Forensic will all allow you to
create forensic copies on-site. EnCase Portable produces images in its proprietary
EWF format, and generally requires EnCase Forensic or another Guidance Software
tool for further analysis. BitFlare’s images are produced in an encrypted format,
enabling security of data during transit and third-party verification of evidence.
Defense, defense, defense!
As with any evidence, be sure that your tool is properly documenting what evidence
it extracts and that all of the files extracted are verifiable. Without a strong chain of
custody, what good is having the evidence? This is especially true when handling
extracted files as computer evidence. For example, consider a confession as
evidence. If someone writes it out by hand, can you tell if someone added the word
“not” to the sentence “I did do it”? If the evidence is an extracted text file, can you tell
if someone made the same change?
Nearly all tools that were specifically designed for computer forensics do this to
some degree. Ensure that digital signatures (such as MD5 or SHA-256) are
calculated for all extracted files.
What next?
Choosing the right set of tools is only a part of a successful triage strategy. Different
organizations are going to have different needs and resources available, and new
tools may be available on the market even as this article is hitting the press. Your
computer-forensics experts already on hand will offer valuable insight into the
challenges their particular group faces. If you are in law enforcement, is it acceptable
to use an approach that does not fully examine all evidence? If you are working with
a team that investigates issues within your corporation, is it a viable solution to bring
IT staff from outside to assist with a triage?
The problem can be a big one to tackle, and different groups will ultimately deploy
different policies that will mature over time and with experience. The nature of digital
evidence, however, is unlikely to change. It will merely continue to explode, and a
strong understanding of desired qualities for a triage tool will aid you regardless of
other tactical decisions that may be made going forward.
About the Authors
David Sun is the founder and president of SunBlock Systems, a privately held
computer-forensics and investigation firm. Sun holds numerous certifications in
computer forensics and information security, and has conducted hundreds of
computer examinations all over the world. He is also an adjunct professor at George
Mason University, and he holds multiple patents for inventions in the field of
3/5/2013 6:07 PM
Evidence Technology Magazine - How to Triage Computer Evidence
4 of 4
http://www.evidencemagazine.com/index.php?option=com_content&ta...
computer forensics. To learn more about Sun and SunBlock Systems visit:
www.sunblocksystems.com
David Kennedy, a certified computer examiner, has been in the computer-security
and software-development industries since 2001. During the last nine years, he has
overseen the development and launch of products in the e-discovery and voice over
IP fields, while actively conducting computer and other digital investigations during
the last six years. Kennedy’s e-mail address: dkennedy@sunblocksystems.com
Return to April 2010 Featured Products & Services
ORIGINALLY PUBLISHED:
"How to Triage Computer Evidence," written by David Kennedy and David Sun
March-April 2010 (Volume 8, Number 2)
Evidence Technology Magazine
Buy Back Issue
< Prev
[ Back ]
©Copyright 2008 EVIDENCE TECHNOLOGY MAGAZINE
All Rights Reserved
Kansas City Web Design
3/5/2013 6:07 PM