Title: Jim Christy, Special Agent ret
1- Jim Christy, Special Agent (ret)
- Director, Futures Exploration (FX)
- Defense Cyber Crime Center
2Overview
- Legal issues
- What is digital evidence
- How powerful is it
- Digital Forensics Evolving discipline
- Operations
- DoD Cyber Crime Conference
- Training
- DCISE
- NCIJTF
3DC3 Mission Environment
Opposite of Nuclear Attack
4DC3 Mission Environment
Cyber Attack
5DC3 Mission Environment
US Law Enforcement Jurisdiction
Military Intel Community Exclusion Zones
6First Part of Problem
Speed Counts!
7The Second Part of Problem
The Legal Environment is Geo-Centric
8The Internet Everybodys Using It
Company B
Company D
The Govts here to helpWhats that Im stepping
in?
Company A
Company C
Government A
Government B
Courtesy Mongabay Photo
9The InternetAint it Beautiful !
Courtesy John H. Fields Photo
10Â But Its a Jungle Out There !!!!
11Are They In Your Network?
12Thats a Rhetorical Question..
13DC3 Mission Environment
Confounds Traditional Investigations
Crosses
Jurisdictions
Exploits Policy Gaps
14Digital Proliferation
Drives Requirements Policy, Staff,
Infrastructure, Training
15DNA
- DNA analysis has made appearances in U.S.
courtrooms since 1987 - Used in less than 1 of all criminal cases
- DNA can provide the WHO
Although it shows up in 90 of All TVs Cases
16Power of Digital Forensics
- Digital Evidence can potentially provide
- Who?
- What?
- When?
- Where?
- Why?
- How?
Not Processed in 10 Minutes Like TV
17Your Digital Trail
- When you left your house and set the alarm
- Your drive to work
- How you paid for your gas and how much
- When you paid for it
- Where you were when it was purchased
- Digital surveillance video of you and car
- Your bank
- Your financial status
- What ATM you used and how much you withdrew
- Digital surveillance video
- Credit card statements
- Your car
- When your car was serviced
- Maybe how fast you went (black boxes)
- GPS records where you went and when
- Red light cameras
18Your Digital Trail
- Your job
- When you arrived and departed badge reader
- When you logged on and off network
- All of your email traffic
- What files you touched and when
- What websites you frequent and how often
- What you searched for with search engines
- Who you called and duration of phone calls
- Trade secrets
- Drive home
- What you purchased at the grocery store
- Detailed shopping list
- GPS provides actual route taken
- OnStar????
19Your Digital Trail
- Your cell phone calls
- Who called you
- Who you called
- Your contacts info
- IMs sent received
- Pictures
- When you arrived home and deactivated alarm
- Who called you on home phone
- When you opened your refrigerator
- What your DVR/TiVo recorded for you
- Your taxes
Powerful Evidence
20Your Digital Trail
- Your medical records
- Doctors notes
- Prescriptions
- Appointments
- Camera
- Pictures
- Videos
- PC
- When you checked you email
- What you deleted and when
- Who tried to access your system (firewall logs)
Powerful Evidence
21Your Digital Trail
- Social Networking Sites
- Facebook
- MySpace
- Dating Sites
- eHarmony
- Match.com
- Chemistry.com
- Yahoo Personals
- Second Life
Powerful Evidence
22Tools of the Trade
- Youre an Executive, Criminal, Spy, or Terrorist
- You need reliable communication
- You need your documentation/plans
- You need your partners contact information
- You need to be able to do business wherever you
are - You need to be mobile
- What tools would you select?
- Internet?
- Smart phones?
- Laptops?
Powerful Evidence
23Steganography
Steganography the art and science of writing
hidden messages Covert communication
Hard to Detect Harder to Extract
24Steganography
25Steganography
Systems Administrator Encrypts and stegs
document In website picture
26Steganography
Sys Adm Replaces Original Picture On
Website With Loaded Picture
27Steganography
Bad Guy Goes to Website And Right Clicks
on Picture to Copy Image To Their System
28Steganography
Bad Guy Extracts And Decrypts Payload
Hard to Detect Harder to Extract
29Steganography
Literally Hundreds of Freeware Steg Programs
Available
30Technological Challenges
31Power of Digital Forensics
VOLUME!!!!!
32Common Frame of Reference
- Legend
- 1 Page (pure text) 4800 characters
- 80 character per line
- 60 lines per page
- Ream (500 pages 2,400,000 characters)
- File cabinet drawer (10 reams or 24,000,000
characters) - 5 drawer file cabinet (120,000,000 or 120 GB)
33Media Volume
Volume Continues to Grow Dramatically Each Year
34PC Hard Drive Capacities
Size Continues to Shrink Each Year
35Typical Household Plus Work Site?
Over 1 Terabyte
or 8333 File Cabinets Â
36DC3 Mission Environment Digital Fingerprints
37DC3 Operations - Synergistic Capabilities
- Defense Computer Forensics Laboratory (DCFL)
Accredited Digital Forensics Laboratory - Defense Cyber Investigations Training Academy
(DCITA) Cyber Investigative Training
Certification - Defense Cyber Crime Institute (DCCI) Digital
Forensics RDTE - National Cyber Investigative Joint Task Force
Analytical Group (NCIJTF-AG) All Source Cyber
Analytical Fusion for Cyber Investigations /
Operations - DoD-DIB Collaborative Information Sharing
Environment (DCISE) Protection of the Defense
Industrial Base info on unclassified networks
38DC3 - Confluence of Many Key Communities
CNA
Law Enforcement
Homeland Defense
Information Assurance
Safety
CNE
Intelligence
CND
Forensics
Counterintelligence
Counterespionage
Counterterrorism
Critical Infrastructure Protection
And Many Lanes in the Road.
39DC3 Present - DoD People Processes
DCFL
Supports ALL Investigations Operations (Complex
Targeted)
Computer Crime Investigator
Supports Complex Cyber Investigations
DCCI RDTE
DCITA - Training
Conduct Investigations
AGENTS
DC3 CCI Digital Examiner Certifications
40Forensic Ops 101
- MEDIA IMAGING
- High Speed
- Integrity
- Hash Verification
0110001010
Mirror Image
Multiple Copies
Seized Media In Every Format
- Admissible
- Evidence
- Clues
- Leads
- Forensic
- Report
- Testimony
SCIENCE APPLIED FOR LEGAL PURP0SE
- Filtering
- Known Files
- Deleted Files
- Hidden Files
- Slack Space
- Unallocated Space
- Cross-Linked Files
- Encryption
- Meta Data
- Analysis of Suspicious Data
- Content Review
- String Search
- Data File Recovery
- Password Cracking
- Decryption
- ??
41DC3 Background - A Cyber Center
- World class accredited digital forensics lab
FY08 789 exams 221 terabytes 100 people - Accelerated exams for Natl Security cases
- Best choice for authoritative, deep digital
analyses - Superior cyber inves / digital examiner training
- 8,200 trained cyber inves / forensic analysts /
NSA - DoD Certification Program launched Jun 06
- Not sterile lecture tool exploitation to solve
cyber scenarios exam reqd, college credit
eligible - Natl benchmark software test validation
- Crucial predicate for valid / reliable /
repeatable forensic results sustains DoD
objectives
Lab, Training Academy, RD Creates Synergy
42Defense Computer Forensics Laboratory
Worlds Largest Accredited Digital Forensics
Lab ASCLD/LAB
43DC3 Operations DCFL Terabytes, Time, Totals
UNCLASSIFIED - FOUO
of Cases Days
(Eff 30 Sep 08)
UNCLASSIFIED - FOUO
44Disk and Tape Repair
- Repair of torn or cut Floppy Disks
- Technique developed by AF Lab in 1991
- Murder Case
- Technique has been improved over the last 10
Years - About 4-5 cases per year
- Media Dryer (No Heat)
Homicide Case
45Disk and Tape Repair
Victim Stabbed 42 Times
46Disk and Tape Repair
Put 2 Disks Together Like Jigsaw Puzzle
47Iron Wrinkles From Platters
- To remove wrinkles a modified soldering iron used
with a piece of brushed aluminum tubing.
Ironing the Disk Fragments
48Spray Platters
- To reveal tracks and sectors spray each piece
with a Magnetic Tape Developer.
Make Tracks Sectors Visible
49Find Starting Index
- The starting index is a single line preceding two
small lines which indicates the starting point of
the first sector. - The arrows indicates the location of a starting
index on a disk platter.
3 ½ inch Disk
50Top Side and Bottom Side
- Magnetic Tape Developer used to determine the
sides of a disk - The sides of a disk are not directly aligned over
each other but are offset 4 to 8 tracks.
Top Bottoms Different
51Court TVs - Forensics Files
Documentary - 2005
52Hard Disk Repair
53Audio and Video Enhancement
- Audio
- Reduce Noise
- Identify Voice
- DTMF Telephone Numbers Dialed
- Decode Fax Transmissions
- Video
- Reduce Noise
- Image Stabilization
- Increasing Size of Image
- Frame Averaging
- Recover Damaged Media
54Damaged Media - Aircraft Mishap
55Damaged Media - Aircraft Mishap
F-18 Video Recorder
56Damaged Media - Aircraft Mishap
F-18 Video Recorder
57Damaged Media - Aircraft Mishap
F-18 Video Recorder
58Recover Information from Damaged Video
F-18 Video Recorder
59Recover Information from Damaged Video
F-18 Heads-Up Display (HUD)
60Recover Information from Damaged Video
F-18 Heads-Up Display (HUD)
61Safety Support
F-15 Fleet Grounded - November 2007
62Special Operations Support
- Analyzed the first computer media of Operation
Iraqi Freedom - DC3 was the first computer forensics team in
Baghdad
Iraqi Theatre
63Special Operations Support
- DC3 seized and analyzed several hundred
gigabytes of information - Team conducted multiple sensitive site
exploitation missions
Iraqi Theatre
64On Site Support
- Support Operations
- Court Appearance
- Searches Seizures
- Task Forces
- CI/CE Ops
- Special Ops
65Futures Exploration
668th Annual DoD Cyber Crime Conference
- When 23-30 January 2009
- Where St Louis, MO
- Who - Systems Administrators Info Assurance
- - LE/CI Investigators/Forensic Examiners
- - Prosecutors
www.dodcybercrime.com
67Hand-on Training
Exporting 250 Node Training Network
68The Best Cheapest Training Around
2-Day 150 2-2-Day 300
69Conference Stats
Total Attendance 1,079 Speakers 175 Tracks
14 Hand-on Training 400 Classified
Session 169
70Jeff Moss Dark Tangent
71We Finally Got Him!
72Mock Trial
73Mock Trial
74DC3 Dispatch
- Categories
- Cybercrime
- Intrusions
- Law
- New Technology
- Viruses/Vulnerabilities
To Subscribe to the FX DISPATCH Send Email
Dispatch_at_dc3.mil
75(No Transcript)
76Purpose
DC3 Digital Forensic Challenge
- Solve current trends and issues facing the
digital forensics community - To develop new tools, techniques, and
methodologies for the Digital Forensics' community
77Prize
DC3 Digital Forensic Challenge
- The winning team won a free trip to the DoD Cyber
Crime Conference in St. Louis, Missouri - Airfare
- Lodging
- Meals
- Conference Fees
- A Plaque
Prize St Louis in the Winter
782006 Challenges
DC3 Digital Forensic Challenge 2006
- Steganography Using S-Tools
- Audio Steganography
- Password Cracking
- Image Analysis Real vs. CG
- Data Carving Linux LVM Interpretation
- Data Acquisition Boot a dd Image
- Data Acquisition Boot a Split dd Image
- Media Recovery Compact-Disc
- Media Recovery Broken Floppy-Diskette
- Keylog Cracking
- Metadata
79Results
DC3 Digital Forensic Challenge 2006
- Damaged CD Challenge was solved by 11 Teams
- Team AccessData
- Team 0x28 Thieves
- Team The Professionals
- Team HoyaHaxa
- Team Hacker Factor
- Team SRS
- Team CodeMonkeys
- Team NUCIA
- Team DFAT
- Team Backbone Security
- Team Pirate
802008 Challenge
81DC3 Digital Forensic Challenge 2008
- 1 Feb Start Accepting applications
- 1 Mar Shipping Challenge packages
- 1 Nov Submissions due
- 1 Dec Winners announced
- Jan 2010 - Awards presented at 2010 DOD Cyber
Crime Conference
The DC3 Challenge Team Tel (410)
981-1169 challenge_at_dc3.mil www.dc3.mil
82DC3 Digital Forensic Challenge 2008
Approved Team Affiliation
Approved Team Affiliation
The DC3 Challenge Team Tel (410)
981-1169 challenge_at_dc3.mil www.dc3.mil
83DC3 Digital Forensic Challenge 2008
Approved Team Affiliation
Participating Countries - 24
Countries US, ES, CH, IN, BE, UK, AU, AR, CL,
NZ, TN, CA, MX, RU, UY, CN, IT, FR, GB, BR, SG,
KR, FX, DE
Participating States - 39
States AL, AR, AZ, CA, CO, CT, DC, DE, FL, GA,
IA, ID, IL, KS, KY, LA, MA, MD, ME, MI, MN, MO,
MS, NC, NJ, NY, OH, OK, PA, SC, TN, TX, UT, VA,
VT, WA, WI, WV, WY
The DC3 Challenge Team Tel (410)
981-1169 challenge_at_dc3.mil www.dc3.mil
842008 Challenge Awards
85DC3 Digital Forensic Challenge 2009
Approved Team Affiliation
Registered Team Affiliation
The DC3 Challenge Team Tel (410)
981-1169 challenge_at_dc3.mil www.dc3.mil
862008 Challenge
Now Co-Sponsoring
87(No Transcript)
88DCITA FY-09 Course Map
DoD Certified
Basic Computer Crime Investigator
DoD Certified Basic Digital Forensic Examiner
DoD Certified Basic Digital Media Collector
Computer Incident Responders Course CIRC - 10
days
Introduction to Networks and Computer Hardware
INCH - 10 days
Basic Cyber Investigations Course BCIC - 5 days
Network Monitoring Course NMC - 5 days
Large Data Set Acquisitions LDSA - 5 days
Wireless Technology WT - 5 days
Deployable Forensics DEF - 10 days
Network Exploitation Techniques NET - 5 days
Managing Computer Investigations MCI - 3 days
Advanced Log Analysis ALA - 5 days
Advanced Deployable Forensics ADEF - 5 days
CE-Online Linux CEOL Self Paced
Intro to Computer Search and Seizure ICSS - 3
days
Live Network Investigations LNI - 10 days
Macintosh Forensic Examinations McFE - 10 days
LEGEND
EnCase Examinations ENCASE - 3 days
Online Undercover Techniques OUT - 5 days
DoD Certifications
Technology Track
Basic Digital Media Collector INCH, CIRC
Responders Track
Forensic Tool Kit FTK - 3 days
Forensic Track
Basic Digital Forensic Examiner INCH, CIRC, WFE-E
or WFE-FTK
Network Investigations Track
Data Recovery DR - 5 days
Basic Computer Crime Investigator INCH, CIRC,
WFE-E or WFE-FTK, BCIC, (1) F-Course, FLETC (or
equivalent)
Red Border No Prerequisites
89Are They In Your Network?
90Nations Critical Infrastructures
- Communication
- Information Technology
- Banking Finance
- Commercial Facilities
- Government Facilities
- Water
- Energy
- Dams
- Nuclear
- Food Agriculture
- Healthcare and Public Health
- Chemical
- Emergency Services
- Defense Industrial Base
- Transportation Systems
- Postal Shipping
- National Monuments Icons
- Manufacturing
91Comprehensive National Cybersecurity Initiative
(NSPD 54/HSPD23)
92DoD/DIB Collaborative Info Sharing Environment -
DCISE
UNCLASSIFIED - FOUO
- Front door for DIB partners
- Fusing law enforcement/CI, CND, intelligence data
for threat information products - Unique all source deconfliction process
- Leverages expertise of analysts collocated with
NCIJTF-AG Lab - Protection of Department of Defense information
held on Defense Industrial Base unclassified
networks - Products shared within interagency (i.e. JTF-GNO,
NSA/NTOC etc)
UNCLASSIFIED - FOUO
Fusion Center for Cyber Investigative - Intel -
CND Info
93DCISE Role Support DHS Crit Infra Protect
Reporting Response Process
Defense Cyber Crime Center (DC3)
DIB Collab Info Sharing Env (DCISE)
Investigative Op Gp Chantilly VA
Analytical Gp DC3
Natl Cyber Investigative JTF (NCIJTF)
UNCLASSIFIED - FOUO
94NCIJTF
- 2005 CIJTF concept proposed by DoD and accepted
- Engaged FBI and accepted
- Two parts
- Operational FBI lead
- Analytical DC3 lead
- Now called Nation Cyber Investigative Joint Task
Force (NCIJTF)
National Cyber Investigative Joint Task Force
95NCIJTF
- Now joined by gt 20 agencies
- Emphasis on CI investigations/operations
- Focused on all US national security threats posed
by cyber - Not limited in scope to 1 agency or department
- LE/CI Lead
- Information gleaned via LE/CI authorites
- Search warrants, subpoenas, etc
- Bridges gap between intel, net defense and LE/CI
- LE/CI case operational coordination
National Cyber Investigative Joint Task Force
96DC3 - Confluence of Many Key Communities
Law Enforcement
Homeland Defense
Information Assurance
Safety
CNA
CNE
Critical Infrastructure Protection
CND
Intelligence
Forensics
Counterintelligence
Counterespionage
Counterterrorism
And Many Lanes in the Road.
97Closing the Gaps - Suite of Capabilities
Legal Community
Net Defenders
Legal Community
NetDefenders
DC3
Warfighters
SpecialAgents
SpecialAgents
Warfighters
Confluence of Key Communities
98Contact Information
Defense Cyber Crime Center www.dc3.mil
DoD Cyber Crime Conference www.dodcybercrime.com
To Subscribe to the DISPATCH Send Email
Dispatch_at_dc3.mil
Digital Forensics Challenge Send Email
Challenge_at_dc3.mil
Jim Christy, Special Agent (Ret)
410-981-6699 James.Christy_at_dc3.mil
99Jim Christy, Special Agent (Ret) Director,
Futures Exploration 410-981-6699 James.Christy_at_dc3
.mil