Benefits of Professional Forensics Methodology
Benefits of Professional Forensics Methodology
PRIMARY USES
• Used to create evidence-grade backups of hard disk drives on Intel-based
computer systems.
• Used to exactly restore archived SafeBack images to another computer hard
disk drive of equal or larger storage capacity.
• Used as an evidence preservation tool in law enforcement and civil litigation
matters.
• Used as an intelligence gathering tool by military agencies.
PROGRAM FEATURES AND BENEFITS
• DOS based for ease of operation and speed.
• Provides a detailed audit trail of the backup process for evidence
documentation purposes.
• Checks for possible data hiding when sector cyclic redundancy checks
(CRCs) do not match on the target hard disk drive. These findings are
automatically recorded in the SafeBack audit log file.
• Allows the archive of non-DOS and non-Windows hard disk drives (Unix
on an Intel-based computer system).
• Allows for the backup process to be made via the printer port.
• Duplicate copies of hard disk drives can be made from hard disk to hard
disk in direct mode.
• SafeBack image files can be stored as one large file or separate files of
fixed sizes. This feature is helpful in making copies for archive on CDs.
• Tried and proven evidence-preservation technology with a 10 years
legacy of success in government agencies.
TROJAN HORSE PROGRAMS
• The computer forensic expert should be able to
demonstrate his or her ability to avoid destructive programs
and traps that can be planted by computer users bent on
destroying data and evidence.
• Such programs can also be used to covertly capture
sensitive information, passwords, and network logons.
COMPUTER FORENSICS DOCUMENTATION
• Without proper documentation, it is difficult to present
findings.
• If the security or audit findings become the object of a
lawsuit or a criminal investigation, then documentation
becomes even more important.
FILE SLACK
• Slack space in a file is the remnant area at the end of a file in the last
assigned disk cluster, that is unused by current file data, but once again,
may be a possible site for previously created and relevant evidence.
• Techniques and automated tools are used by the experts to capture and
evaluate file slack.
DATA-HIDING TECHNIQUES
• Trade secret information and other sensitive data can easily be secreted
using any number of
techniques. It is possible to hide diskettes within diskettes and to hide
entire computer hard disk
drive partitions.
• Computer forensic experts should understand such issues and tools
that help in the identification of such anomalies.
ANADISK - DISKETTE ANALYSIS TOOL
It is primarily used to identify data storage anomalies on floppy diskettes
and generic hardware in the form of floppy disk controllers; bios are
needed when using this software
PRIMARY USES
• Security reviews of floppy diskettes for storage anomalies
• Duplication of diskettes that are nonstandard or that involve storage
anomalies
• Editing diskettes at a physical sector level
• Searching for data on floppy diskettes in traditional and non traditional
storage areas
• Formatting diskettes in non traditional ways for training purposes and to
illustrate data-hiding techniques
PROGRAM FEATURES AND BENEFITS
DOS-based for ease of operation and speed.
No software dongle. Again, software dongles get in the way and they are
restrictive.
Keyword searches can be conducted at a very low level and on diskettes that
have been formatted with extra tracks. This feature is helpful in the
evaluation of diskettes that may involve sophisticated data-hiding techniques.
All DOS formats are supported, as well as many non-DOS formats (Apple
Macintosh, Unix TAR, and many others). If the diskette will fit in a PC floppy
diskette drive, it is likely that AnaDisk can be used
to analyze it.
Allows custom formatting of diskettes with extra tracks and sectors.
Scans for anomalies will identify odd formats, extra tracks, and extra sectors.
Data mismatches, concerning some file formats, are also identified when file
extensions have been changed in an attempt to hide data.
This software can be used to copy almost any diskette, including most copy-
protected diskettes.
E-COMMERCE INVESTIGATIONS
Net Threat Analyzer can be used to identify past Internet browsing
and email activity done through specific computers. The software
analyzes a computer’s disk drives and other storage areas that are
generally unknown to or beyond the reach of most general
computer users. Net Threat Analyzer avail-able free of charge to
computer crime specialists, school officials, and police.
DUAL-PURPOSE PROGRAMS
Programs can be designed to perform multiple processes and tasks
at the same time. Computer forensics experts must have hands-on
experience with these programs.
TEXT SEARCH TECHNIQUES
Tools that can be used to find targeted strings of text in files, file
slack, unallocated file space and Windows swap files.
TEXT SEARCH PLUS
This software is used to quickly search hard disk drives, zip disks, and floppy diskettes for key
words or
specific patterns of text.
PRIMARY USES
•Used to find occurrences of words or strings of text in data stored in files, slack,
and unallocated file space
•Used in exit reviews of computer storage media from classified facilities
•Used to identify data leakage of classified information on non-classified computer
systems
•Used in internal audits to identify violations of corporate policy
•Used by Fortune 500 corporations, government contractors, and government
agencies in security reviews and security risk assessments
•Used in corporate due diligence efforts regarding proposed mergers
•Used to find occurrences of keywords strings of text in data found at a physical
sector level
•Used to find evidence in corporate, civil, and criminal investigations that involve
computer-related evidence
•Used to find embedded text in formatted word processing documents (Word-
Perfect and fragments of such documents in ambient data storage areas)
PROGRAM FEATURES AND BENEFITS
• DOS-based for ease of operation and speed.
• No software dongle. Software dongles get in the way and they restrict your ability
to process several computers at the same time.
• Small memory foot print (under 60 KB), which allows the software to run on even
the original IBM PC.
• Compact program size, which easily fits on one floppy diskette with other forensic
software utilities.
• Searches files, slack, and erased space in one fast operation.
• Has logical and physical search options that maintain compatibility with
government security review requirements.
• User-defined search configuration feature.
• User configuration is automatically saved for future use.
• Embedded words and strings of text are found in word processing files.
• Alert for graphic files (secrets can be hidden in them).
• Alert for compressed files.
• The current version allows for up to 120 search strings to be searched for at one
time.
FUZZY LOGIC TOOLS USED TO IDENTIFY UNKNOWN TEXT
• Computer evidence searches require that the computer
specialist know what is being searched for. Many times not
all is known about what may be stored on a given computer
system.
• In such cases, fuzzy logic tools can provide valuable leads as
to how the subject computer was used.
INTELLIGENT FORENSIC FILTER - FILTER_G/FILTER_I
• This forensic filter utility is used to quickly make sense of
nonsense in the analysis of ambient data sources (Windows
swap/page files, file slack, and data associated with erased
files).
• It is used to quickly identify patterns of English language
grammar in ambient data files.
PRIMARY USES
• Used as an intelligence gathering tool for quick assessments of a Windows
swap/page file to identify past communications on a targeted computer
• Used as a data sampling tool in law enforcement, military, and corporate
investigations
• Used to quickly identify patterns of English language grammar in ambient
data sources
• Used to identify English language communications in erased file space
PROGRAM FEATURES AND BENEFITS
• DOS-based for speed.
• Automatically processes any data object (a swap file, a file constructed
from combined file slack, a file constructed from combined unallocated
space, or a Windows swap/page file.
• Provides output in an ASCII text format that is ready for import into any
word processing application.
• Capable of quickly processing ambient data files that are up to 2 gigabytes
in size.
2. Disk Structure
• Computer forensic experts must understand how computer hard
disks and floppy diskettes are structured and how computer evidence
can reside at various levels within the structure of the disk.
• They should also demonstrate their knowledge of how to modify the
structure and hide data in obscure places on floppy diskettes and
hard disk drives.
3. Data Encryption
Computer forensic experts should become familiar with the use of
software to crack security associated with the different file structures.
4. Matching a Diskette to a Computer
Specialized techniques and tools that make it possible to conclusively
tie a diskette to a computer that was used to create or edit files
stored on it. Computer forensic experts should become familiar how
to use special software tools to complete this process.
5. Data Compression
Computer forensic experts should become familiar
with how compression works and how compression
programs can be used to hide and disguise sensitive
data and also learn how password protected
compressed files can be broken.
6. Erased Files
Computer forensic experts should become familiar
with how previously erased files can be recovered by
using DOS programs and by manually using data-
recovery technique & familiar with cluster chaining.
7. Internet Abuse Identification and Detection
• Computer forensic experts should become familiar with how to
use specialized software to identify how a targeted computer
has been used on the Internet.
• This process will focus on computer forensics issues tied to data
that the computer user probably doesn’t realize exists (file slack,
unallocated file space, and Windows swap files).
8. The Boot Process and Memory Resident Programs
• Computer forensic experts should become familiar with how the
operating system can be modified to change data and destroy
data at the whim of the person who configured the system.
• Such a technique could be used to covertly capture keyboard
activity from corporate executives, for example. For this reason,
it is important that the experts understand these potential risks
and how to identify them.
TYPES OF BUSINESS COMPUTER FORENSIC
TECHNOLOGY
The following are different types of business computer
forensics technology:
REMOTE MONITORING OF TARGET COMPUTERS
• Data Interception by Remote Transmission (DIRT) is a
powerful remote control monitoring tool that allows
stealth monitoring of all activity on one or more target
computers simultaneously from a remote command center.
• No physical access is necessary. Application also allows
agents to remotely seize and secure digital evidence prior
to physically entering suspect premises.
CREATING TRACKABLE ELECTRONIC DOCUMENTS
• Binary Audit Identification Transfer (BAIT) is a
powerful intrusion detection tool that allows
users to create trackable electronic documents.
• BAIT identifies (including their location)
unauthorized intruders who access, download,
and view these tagged documents.
• BAIT also allows security personnel to trace the
chain of custody and chain of command of all
who possess the stolen electronic documents.
THEFT RECOVERY SOFTWARE FOR LAPTOPS AND PCS
What it really costs to replace a stolen computer:
• The price of the replacement hardware & software.
• The cost of recreating data, lost production time or instruction time, reporting
and investigating the theft, filing police reports and insurance claims,
increased insurance, processing and ordering replacements, cutting a check,
and the like.
• The loss of customer goodwill.
• If a thief is ever caught, the cost of time involved in prosecution.
PC PHONEHOME
• PC PhoneHome is a software application that will track and locate a lost or
stolen PC or laptop any-where in the world. It is easy to install. It is also
completely transparent to the user.
• If your PC PhoneHome-protected computer is lost or stolen, all you need to do
is make a report to the local police and call CD’s 24-hour command center.
CD’s recovery specialists will assist local law enforcement in the recovery of
your property.
BASIC FORENSIC TOOLS AND TECHNIQUES
• Many computer forensics workshops have been created
to familiarize investigators and security personnel with
the basic techniques and tools necessary for a
successful investigation of Internet and computer-
related crimes.
• Workshop topics normally include: types of computer
crime, cyber law basics, tracing email to its source,
digital evidence acquisition, cracking passwords,
monitoring computers remotely, tracking online activity,
finding and recovering hidden and deleted data,
locating stolen computers, creating trackable files,
identifying software pirates, and so on.
FORENSIC SERVICES AVAILABLE
Services include but are not limited to:
• Lost password and file recovery
• Location and retrieval of deleted and hidden files
• File and email decryption
• Email supervision and authentication
• Threatening email traced to source
• Identification of Internet activity
• Computer usage policy and supervision
• Remote PC and network monitoring
• Tracking and location of stolen electronic files
• Honeypot sting operations
• Location and identity of unauthorized software users
• Theft recovery software for laptops and PCs
• Investigative and security software creation
• Protection from hackers and viruses
Computer Forensics Evidence and Capture
1. Image Copy
• BRS contains an Image Copy component to help manage your image
copy process. BRS can takebatch, on-line (fuzzy), or incremental image
copies; Snapshot copies; or Instant Snapshot copies.
• The Image Copy component of BRS offers a variety of powerful
features: dynamic allocation of all input and output data sets, stacking
of output data sets, high performance access methods (faster I/O),
copying by volume, compression of output image copies, and
database group processing--- all while interfacing with DBRC and
processing asynchronously.
2. Change Accumulation
• The BRS Change Accumulation component takes
advantage of multiple engines, large virtual storage
resources, and high-speed channels and controllers
that are available in many environments.
• Use of multiple tack control block (TCB) structures
enables overlapping of as much processing as
possible, reducing both elapsed and CPU time.
3. Recovery
• The BRS Recovery component, which functionally replaces the IMS
Database Recovery utility for nullfunction (DL/I) databases and data-
entry databases (DEDBs), allow recovery of multiple databases with
one pass of the log and change accumulation data sets while
dynamically allocating all data sets required for recovery.
• BRS recovers multiple databases to any point in time. BRS can
determine the best choice for a Point-inTime (PIT) recovery. Full
DBRS support includes:
– Recovery manager
– Pointer checking
– Index rebuild
– Recovery advisor
₋ RECOVERY MANAGER
• Recovery Manager component lets you automate and
synchronize recoveries across applications and databases by
creating meaningful groups of related databases and creating
optimized JCL to perform the recovery of these groups.
• Recovery Manager component provides a positive response for
the IMS commands that are used to deallocate and start your
databases.
• Recovery Manager component fully automates the process of
cleaning the RECON data sets for restart following a disaster
recovery.
• Recovery Manager component also allows you to test your
recovery strategy and notifies you when media errors have
jeopardized your recovery resources.
₋ POINTER CHECKING
BRS offers the capability to verify the validity of database pointers
through the Concurrent Pointer Checking function for both full-
function databases and Fast Path data-entry databases (DEDBs).
₋ INDEX REBUILD
If indexes are ever damaged or lost, the Index Rebuild function of
BRS allows you rebuild them rather than recover them.
₋ RECOVERY ADVISOR
The Recovery Advisor component of BRS allows you to monitor the
frequency of your image copies and change accumulations.
It helps you to determine whether all your databases are being
backed-up.
By using any number of back-up and recovery tools available, you can
better manage your world and be ready to recover!