Week 8 Flashcards

1
Q

Determining data to collect & analyze
involves:

A

The nature of the case: Criminal or
civil/corporate
▪ The suspected incident surrounding the
analysis to be conducted
▪ The requests of the primary investigator or
responder in the case
▪ The legal considerations of what to gather,
from whom and why
▪ Consent vs. Search warrant/Court order
▪ Corporate assets & acceptable use policy

Mobile or Computer evidence? Or both?
▪ Appropriate measures to ensure that the
data will not be destroyed
▪ Physical signal-blocking devices, anti-static
packaging, etc.
▪ Tools to be used for collection of the data –
need to be appropriate for the data storage
medium
▪ Tools to be used for analysis of the data –
computer vs. mobile vs. specialized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Don’t Forget!

A

Target media should be wiped & validated
 Forensic copies of media should be created
and validated
▪ Validation is done by hash value
comparison/match
▪ Original evidence then stored in secure storage with
documentation
 For mobile devices, item should be isolated from
the network immediately upon seizure and
documented
 Photograph evidence both at time of seizure & at
lab prior to data acquisition
▪ Document all in your case file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acquisition and Analysis Considerations

A

Inventory the HARDWARE on the suspect
computer –Written & photographed
 Remove drive from computer in “deadbox” acquisitions
 Record HOW (i.e., by what means) you
acquired the data from the drive
 Add acquired evidence to tool – validate
again if necessary
 Process the data in your tool methodically
▪ List files/folders
▪ Start with root of directory & work down

Ensure the data your analyzing is covered in
your legal authorization
 For any password-protected files, ensure to
document how you attempted to circumvent
these measures
 Consider using NSRL has sets to exclude
irrelevant data (National Software Reference
Laboratory)
▪ Hash sets available from National Institute
of Standards & Technology (NIST)
▪ Updated frequently: NIST.gov
 Maintain control of all evidence & document
all findings of interest/relevance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refining Your Analysis

A

Not all analysis will focus on the same data
 Does your case involve…
▪ Disputed text messages from a phone
▪ Application usage data
▪ Application chat data
▪ Pictures/Videos
▪ Geo-location data
▪ Emails
▪ Internet connection location, dates, times, IP
addresses etc.
▪ Questioned electronic documents
▪ Allegations of “hacking” or malware attacks
 All of these present different challenges &
require different approaches, tools, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Specialized Analysis

A

Many cases call for targeted or specialized
analysis
 Specialized analysis can involve use of thirdparty tools to analyze the specific category of
data
 These specific categories often involve…
▪ Mobile device and/or computer application
databases
▪ Emails and email databases from computers
▪ Encrypted or password-protected files
▪ EXIF Metadata analysis from pictures & videos
▪ Enhanced Windows Registry analysis
▪ Enhanced Mac extended metadata analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analysis Tips and Tricks

A

Don’t let the circumstances of the case as they
are presented to you skew your analysis
▪ A good analyst should be in the pursuit of the
TRUTH, not to prove your “side” was right
 Learn how to problem-solve. This is
applicable from seizure to acquisition to
analysis
 Gather resources that will help you as your
analysis progresses – online, list serve,
colleagues, etc.
 Be flexible in your approach. Rigidity can lead
to bad/erroneous results
 Cover all the bases – your findings, reputation
& integrity are on the line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do we validate?

A

No single tool is all-encompassing or will do ALL of the
work in most cases (exceptions)
▪ Automated tools make work easier & more efficient, but
ultimately the answers lie within the data
▪ Our findings have to meet Rule 702 (FRCP) standard for (TEST)
expert testimony (even if you don’t think you’ll be
testifying)
▪ Your scientific, technical or other specialized knowledge will
help the trier of fact to understand the evidence or determine
a fact at issue
▪ Your testimony is based on sufficient facts or data
▪ Your testimony is the product of reliable principles & methods
▪ You have reliably applied the principles & methods to the facts
of the case

Will you be providing an opinion based upon the analysis &
findings? (So we need to validate findings to distill facts)
▪ The Daubert case provides guidance in case law
▪ Results need to be defensible & repeatable
▪ This applies to ALL forensic sciences in which there may be
expert testimony, conclusions, opinions or other findings
 Validation helps us…
▪ Provide a foundation for our findings and opinions
▪ Ensure that those findings are correct
▪ Provides a road map for any other expert who may seek to
duplicate our findings, even if they use alternative
methods (i.e., tools)
▪ Adds credibility to opinions offered based upon those
findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process of Validation

A

Use of another tool to come to same conclusion(s)
▪ Manual analysis (complex)
▪ Export and analyze files outside of the forensic environment (export email box out of forensic environment and examine in native environment)
▪ Use of hexadecimal editors to validate using file headers & signatures
▪ Comparing hash values of known files from other sources to files that we have recovered or found during analysis

Look over lab exercise related to this (our was kind of backwards but point still stands)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encoded data

A

data that is displayed in a
particular pattern or scheme that is generally
obfuscated from normal language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is encoding data important?

A

 Encoding data is used by every electronic device in
use in the modern era
 Encoding data allows different operating systems,
applications & programs to interpret certain data in
a particular way that the system, application or
program is designed for
 Not a “programming language” per se, but another
way to display data which requires knowledge skills
and tools to decode to human-readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common Encoding Schemes

A

When Hexadecimal is put together in strings,
can be displayed in numerous ways…
▪ Base-32
▪ Base-32 reverse nibble
▪ Base-64
▪ Base-64 reverse or encoded
 Many applications store data this way
 Not all forensic tools are programmed to decode
this data automatically because it can be
application-specific
 Recognizing these encodings takes time, experience
and knowledge… and a little bit of math skill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common Encoding Schemas (2)

A

Unicode
▪ Used because ASCII is:
▪ Based in American/English characters
▪ Does not allow for enough specialized characters
▪ Unicode Defined: An international encoding
standard for use with different languages and
scripts, by which each letter, digit, or symbol is
assigned a unique numeric value that applies
across different platforms and programs
▪ A programming language that is universal across all
operating systems, data storage mediums, countries,
etc.
▪ Unicode.org has exhaustive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time Encoding

A

Time Encoding & timestamps
▪ Used in computing applications across the spectrum
▪ Various formats including…
▪ Epoch time and…
▪ Unix time (seconds, microseconds & milliseconds)
▪ Windows file time
▪ Apple/Mac OS time
▪ GPS time
▪ Chromium time
▪ Other case-specific examples
▪ I.e., Ring doorbell and TikTok time
▪ Some of these may require decoding in multiple
steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Common Time Encoding Schemes

A

Epoch time – Number of Seconds that have elapsed since
January 1, 1970
▪ Unix time is the same, but can incorporate milliseconds or
microseconds
▪ Windows time: Number of 100-nanosecond intervals that have
elapsed sine 12:00 AM Jan. 1, 1601 (A.D.)
▪ Apple (or Cocoa) time: Number of nanoseconds since January
1, 2001
▪ GPS time: Number of weeks since January 6, 1980
▪ Chromium time – a 64-bit value since January 1, 1601
▪ Ring/TikTok time stamp: Involves taking the 8 most significant
bytes of the integer value, converting them to decimal, then
translating to Epoch time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one tool for decoding/encoding time? Is it free or paid?

A

D-code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is time so important in computing?

A

Most, if not all cases involve some date/time stamping of
evidence
▪ Most, if not all cases involve data traveling over the internet,
which encompasses many time zones

As a general rule in digital investigations, we use
Coordinated Uniform Time or UTC as a basis for all time
and time offsets
▪ UTC is essentially Greenwich Meantime or GMT
▪ All time stamps are then offset to show local time zone
▪ E.G. Eastern Daylight Time (EDT) is UTC - 0400
 Local time zone attribution is VITAL in most cases. If the
time is off, we could put a target of an investigation in
the wrong light with regard to the evidence

When it comes to time stamps, the devil is in
the details…
▪ We’ve already discussed file write/read/access times generally,
but
▪ Offsets are also of key importance
▪ Certain areas of the US don’t participate in Daylight Savings
Time
▪ Certain programs only log time in UTC
▪ When targets of investigation travel, this can be even more
tricky
▪ Knowing how US and worldwide time zones work is crucial in
most electronic investigations
▪ For encoding, recognizing the format is most vital step, then
figuring out how to convert that encoding