Date/Time:
Tuesday 24 January 2006
Speaker:
Russell May, Manager of Special and Partner Projects, Guidance Software Inc.
Description:
Some eighty people attended our first talk of the New Year. Russell May, introduced himself and gave a quick summary of his background, which included twenty-eight years experience in the West Midlands police force culminating in a spell as head of the High-Tech Crime Unit. Russell now works for Guidance Software, which specialises in developing software to assist in retrieving digital information for forensic purposes.
Russell then outlined the basic rules that must be followed when examining computers and other digital devices. These basic principles that must be abided by are enshrined in the ACPO (Association of Chief Police Officers) Guidelines on Computer Evidence. They are used in countries other than the UK, including the United States. These guidelines MUST be followed for evidence to be accepted in court.
A forensic analyst will make a bit-by-bit copy of the contents of the storage medium. The original should then be sealed and stored in a safe place while all analysis is carried out on the copy. If it is necessary to power up the machine, the analyst will either use a copy of the machine’s hard drive or use a virtual machine. On many operating systems, the act of booting the machine leads to many files being created or modified on the machine’s hard disc, and this could mean violating Principle 1 if the original hard disc is used.
The analyst will retrieve evidence and present it in a readable form, suitable for use in court. The contents of the machine will be examined for other evidence, such as money, keys, or drugs concealed in the machine, or additional hard discs that have been disconnected so that a casual user of the machine would not know that they existed.
It is important to ensure that the suspect device cannot be written to; this can be a problem with Windows machines as they will not recognise read-only hard discs, so a hardware write-blocking device needs to be used. Disc images are examined for hidden or deleted files and partitions; these can be recovered and data that may be of value can be retrieved.
Photographic evidence is also collected - this would be photographs of the computer hardware, how it was laid out, and how the various components were connected to one another. This is used to a) document how a system had been set up (such as evidence of a facility for mass-producing illegal copies of CDs or DVDs) and b) to re-create the configuration of components if they have been disconnected.
One of the key messages from this talk was that forensics should not be taken in isolation - it is part of the body of evidence that has to be amassed for a prosecution to be brought.
Following this explanation, Russell explained some of the ways in which information and illicit images might be concealed and used the EnCase tool to demonstrate their retrieval.
Some key points from the demonstration were: